Providing a Hybrid Approach for Detecting Malicious Traffic on the Computer Networks Using Convolutional Neural Networks

被引:2
|
作者
Pakanzad, Seyed Navid [1 ]
Monkaresi, Hamed [1 ]
机构
[1] Razi Univ, Dept Comp Engn, Kermanshah, Iran
关键词
Convolutional Neural Networks; Deep Learning; Intrusion Detection Systems; Long Short Term Memory;
D O I
10.1109/icee50131.2020.9260686
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
With the growth of the Internet, computer networks have become an important tool for communication between human societies. Nowadays, all the activities of the people, especially financial, medical and military activities are carried out over the Internet and that has made cyber attacks a significant improvement. Hackers' motivation has also shifted to network-based activities. Therefore, one of the major challenges is detecting and preventing network-based cyber attacks. Given the remarkable ability of deep learning algorithms, the purpose of this study is to present a hybrid approach using Convolutional Neural Network (CNN) and Long Short Term Memory networks (LSTM) to improve the performance of Intrusion Detection Systems (IDS). In previous studies, whilst discriminating between normal and abnormal traffic has been achieved reasonable accuracy the precision of multi-class classification was not optimal. The aim of this study is to provide a method to accurately classify malicious traffics according to attack types. In this study, the results are validated on NSL-KDD and CICIDS2017 datasets. Multiple classification accuracy for the NSL-KDD and CICIDS2017 datasets are 98.1 and 96.7, respectively.
引用
收藏
页码:1189 / 1194
页数:6
相关论文
共 50 条
  • [1] Detection of Malicious Network Traffic using Convolutional Neural Networks
    Chapaneri, Radhika
    Shah, Seema
    [J]. 2019 10TH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND NETWORKING TECHNOLOGIES (ICCCNT), 2019,
  • [2] Neural Networks Ensemble Approach for Detecting Attacks in Computer Networks
    Bukhtoyarov, Vladimir
    Semenkin, Eugene
    [J]. 2012 IEEE CONGRESS ON EVOLUTIONARY COMPUTATION (CEC), 2012,
  • [3] Detecting Computer Generated Images with Deep Convolutional Neural Networks
    de Rezende, Edmar R. S.
    Ruppert, Guilherme C. S.
    Carvalho, Tiago
    [J]. 2017 30TH SIBGRAPI CONFERENCE ON GRAPHICS, PATTERNS AND IMAGES (SIBGRAPI), 2017, : 71 - 78
  • [4] Detecting Malicious PowerShell Commands using Deep Neural Networks
    Hendler, Danny
    Kels, Shay
    Rubin, Amir
    [J]. PROCEEDINGS OF THE 2018 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (ASIACCS'18), 2018, : 187 - 197
  • [5] Detecting Malicious Blockchain Transactions Using Graph Neural Networks
    Jeyakumar, Samantha Tharani
    Yugarajah, Andrew Charles Eugene
    Hou, Zhe
    Muthukkumarasamy, Vallipuram
    [J]. DISTRIBUTED LEDGER TECHNOLOGY, SDLT 2023, 2024, 1975 : 55 - 71
  • [6] Detecting Periodontal Disease Using Convolutional Neural Networks
    Aberin, Shannah Therese A.
    de Goma, Joel C.
    [J]. 2018 IEEE 10TH INTERNATIONAL CONFERENCE ON HUMANOID, NANOTECHNOLOGY, INFORMATION TECHNOLOGY, COMMUNICATION AND CONTROL, ENVIRONMENT AND MANAGEMENT (HNICEM), 2018,
  • [7] A practical approach for detection and classification of traffic signs using Convolutional Neural Networks
    Aghdam, Hamed Habibi
    Heravi, Elnaz Jahani
    Puig, Domenec
    [J]. ROBOTICS AND AUTONOMOUS SYSTEMS, 2016, 84 : 97 - 112
  • [8] Traffic sign recognition using convolutional neural networks
    Boujemaa, Kaoutar Sefrioui
    Bouhoute, Afaf
    Boubouh, Karim
    Berrada, Ismail
    [J]. 2017 INTERNATIONAL CONFERENCE ON WIRELESS NETWORKS AND MOBILE COMMUNICATIONS (WINCOM), 2017, : 374 - 379
  • [9] Classification of Traffic Signs using Convolutional Neural Networks
    Vaikole, Shubhangi
    Bhalerao, Makarand
    Nimbalkar, Parth
    Moghe, Soham
    [J]. JOURNAL OF ALGEBRAIC STATISTICS, 2022, 13 (02) : 1764 - 1769
  • [10] Autonomous Malicious Video Content Categorization Using Convolutional Neural Networks
    Patel, Karthik D.
    Siddesh, M. G.
    Agarwal, Ayushi
    Nihalani, Akshay
    Nirmala, M. B.
    Kavitha, H.
    [J]. PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND CONTROL SYSTEMS (ICICCS 2020), 2020, : 533 - 537