Anomaly detection in cyber security attacks on networks using MLP deep learning

被引:0
|
作者
Teoh, T. T. [1 ]
Chiew, Graeme [1 ]
Franco, Edwin J. [1 ]
Ng, P. C. [1 ]
Benjamin, M. P. [1 ]
Goh, Y. J. [1 ]
机构
[1] Univ Technol & Design, Singapore, Singapore
关键词
Multilayer Perceptron (MLP); cyber security; information security; machine learning; deep learning; big data; decision trees; WEKA; J48; C4.5; ID3;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Malicious traffic has garnered inure attention in recent years, owing to the rapid growth of information technology in today's world. In 2(1417 alone, an estimated loss of 13 billion dollars was made from task are attacks. Malware data in today's contest is massive. To understand such information using primitive methods would be a tedious task, In this publication we demonstrate some of the most advanced deep learning techniques available, multilayer perceptron (MLP) and J48 (also known as C4.5 or ID3) on our selected dataset, Advanced Security Network Metrics & Non-Payload-Based Obfuscations (ASNM-NPBO) to show that the answer to managing cyber security) threats lie in the fore-mentioned methodologies.
引用
收藏
页数:5
相关论文
共 50 条
  • [21] Anomaly based network intrusion detection for IoT attacks using deep learning technique
    Sharma, Bhawana
    Sharma, Lokesh
    Lal, Chhagan
    Roy, Satyabrata
    COMPUTERS & ELECTRICAL ENGINEERING, 2023, 107
  • [22] Detection of Botnet using deep learning algorithm: application of machine learning in cyber-security
    Sivakumar, A.
    Rubia, J. Jency
    Vijayan, Hima
    Sivakumaran, C.
    INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2024, 16 (02) : 213 - 222
  • [23] Federated-Learning-Based Anomaly Detection for IoT Security Attacks
    Mothukuri, Viraaji
    Khare, Prachi
    Parizi, Reza M.
    Pouriyeh, Seyedamin
    Dehghantanha, Ali
    Srivastava, Gautam
    IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (04) : 2545 - 2554
  • [24] A vector convolutional deep autonomous learning classifier for detection of cyber attacks
    Amma, N. G. Bhuvaneswari
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2022, 25 (05): : 3447 - 3458
  • [25] A Deep Learning Ensemble for Network Anomaly and Cyber-Attack Detection
    Dutta, Vibekananda
    Choras, Michal
    Pawlicki, Marek
    Kozik, Rafal
    SENSORS, 2020, 20 (16) : 1 - 20
  • [26] Evaluation of Deep Learning Techniques in PV Farm Cyber Attacks Detection
    Hassan, Ghufran F.
    Ahmed, Oday A.
    Sallal, Muntadher
    ELECTRONICS, 2025, 14 (03):
  • [27] A vector convolutional deep autonomous learning classifier for detection of cyber attacks
    N. G. Bhuvaneswari Amma
    Cluster Computing, 2022, 25 : 3447 - 3458
  • [28] Cyber Security Intrusion Detection and Bot Data Collection using Deep Learning in the IoT
    Alotaibi, Fahad Ali
    Mishra, Shailendra
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2024, 15 (03) : 421 - 432
  • [29] Enhancement of email spam detection using improved deep learning algorithms for cyber security
    Samarthrao, Kadam Vikas
    Rohokale, Vandana M.
    JOURNAL OF COMPUTER SECURITY, 2022, 30 (02) : 231 - 264
  • [30] Integrated Anomaly Detection for Cyber Security of the Substations
    Hong, Junho
    Liu, Chen-Ching
    Govindarasu, Manimaran
    IEEE TRANSACTIONS ON SMART GRID, 2014, 5 (04) : 1643 - 1653