Detecting network attacks Model based on a long short-term memory LSTM

Main Article Content

Teba Ali Jasim Ali
Muna M. Taher Jawhar

Abstract

Nowadays, network-connected devices such as mobile phones and IoT devices are increasing, the types and numbers of these devices are increasing, the impact of successful attacks is increasing and the fear is growing due to the security effects when using them. In addition, a broader attack surface is available to identify and respond to these network attacks, different systems are used to prevent and stop Some of these systems consist of two layers, the first layer which provides Security and Intrusion Prevention is the firewall, while the second layer is the network intrusion detection system or attack detection system, if only the first layer represented by the firewall is used we cannot prevent attack, that's why attack detection or malware detection systems are used along with a firewall.


 


fig-1.jpg


Article Details

How to Cite
Jasi, T. A., & Jawhar, M. M. T. (2022). Detecting network attacks Model based on a long short-term memory LSTM. Technium: Romanian Journal of Applied Sciences and Technology, 4(8), 64–72. https://doi.org/10.47577/technium.v4i8.7225
Section
Articles

References

S. N. Nguyen, V. Q. Nguyen, J. Choi, and K. Kim, “Design and implementation of intrusion detection system using convolutional neural network for DoS detection,” ACM International Conference Proceeding Series. pp. 34–38, 2018. doi: 10.1145/3184066.3184089.

B. N. 6ORCID andWilliam J. B. 1ORCID by Andrew Churcher 1ORCID, Rehmat Ullah 2,*ORCID, Jawad Ahmad 1ORCID, Sadaqat ur Rehman 3ORCID, Fawad Masood 4, Mandar Gogate 1, Fehaid Alqahtani 5ORCID, “Sensors _ Free Full-Text _ An Experimental Analysis of Attack Classification Using Machine Learning in IoT Networks.pdf.” p. 32, 2021.

A. Khurshid and G. A. Khan, “Online Machine Learning-based Framework for Network Intrusion Detection,” 2018.

Y. Tang, L. Gu, and L. Wang, “Deep stacking network for intrusion detection,” Sensors, vol. 22, no. 1, 2022, doi: 10.3390/s22010025.

M. Abdullahi et al., “Detecting Cybersecurity Attacks in Internet of Things Using Artificial Intelligence Methods: A Systematic Literature Review,” Electron., vol. 11, no. 2, pp. 1–27, 2022, doi: 10.3390/electronics11020198.

A. Albayati, N. F. Abdullah, A. Abu-Samah, A. H. Mutlag, and R. Nordin, “A Serverless Advanced Metering Infrastructure Based on Fog-Edge Computing for a Smart Grid: A Comparison Study for Energy Sector in Iraq,” Energies, vol. 13, no. 20, 2020, doi: 10.3390/en13205460.

A. Janagam and S. Hossen, “Analysis of network intrusion detection system with machine learning algorithms (deep reinforcement learning algorithm).” 2018.

Z. Cui, F. Xue, X. Cai, Y. Cao, G. G. Wang, and J. Chen, “Detection of Malicious Code Variants Based on Deep Learning,” IEEE Transactions on Industrial Informatics, vol. 14, no. 7. pp. 3187–3196, 2018. doi: 10.1109/TII.2018.2822680.

C. Yin, Y. Zhu, J. Fei, and X. He, “A Deep Learning Approach for Intrusion Detection Using Recurrent Neural Networks,” IEEE Access, vol. 5. pp. 21954–21961, 2017. doi: 10.1109/ACCESS.2017.2762418.

J. Kim, Y. Shin, and E. Choi, “An Intrusion Detection Model based on a Convolutional Neural Network,” Journal of Multimedia Information System, vol. 6, no. 4. pp. 165–172, 2019. doi: 10.33851/jmis.2019.6.4.165.

P. Lin, K. Ye, and C.-Z. Xu, “Dynamic network anomaly detection system by using deep learning techniques,” in International conference on cloud computing, 2019, pp. 161–176.

R. I. Farhan1, A. T. Maolood2, and NidaaFlaih Hassan3, “Performance analysis of flow-based attacks detection on CSE-CIC-IDS2018 dataset using deep learning.” Indones. J. Electr. Eng. Comput. Sci., vol. 20, pp, p. 6, 2020. doi: doi: 10.11591/ijeecs.v20.i3.pp1413-1418.

R. Abdulhammed, H. Musafer, A. Alessa, M. Faezipour, and A. Abuzneid, “Features dimensionality reduction approaches for machine learning based network intrusion detection,” Electron., vol. 8, no. 3, 2019, doi: 10.3390/electronics8030322.

L. D’hooge, T. Wauters, B. Volckaert, and F. De Turck, “Classification hardness for supervised learners on 20 years of intrusion detection data,” IEEE Access, vol. 7, pp. 167455–167469, 2019.

A. Hafid, S. Benouar, M. Kedir-Talha, F. Abtahi, M. Attari, and F. Seoane, “Full impedance cardiography measurement device using raspberry PI3 and system-on-chip biomedical instrumentation solutions,” IEEE J. Biomed. Heal. informatics, vol. 22, no. 6, pp. 1883–1894, 2017.

I. Sharafaldin, A. H. Lashkari, and A. A. Ghorbani, “Toward generating a new intrusion detection dataset and intrusion traffic characterization.,” ICISSp, vol. 1, pp. 108–116, 2018.

V. Jaganathan, P. Cherurveettil, and P. Muthu Sivashanmugam, “Using a prediction model to manage cyber security threats,” Sci. World J., vol. 2015, 2015.

D. Ravikumar, Towards Enhancement of Machine Learning Techniques Using CSE-CIC-IDS2018 Cybersecurity Dataset. Rochester Institute of Technology, 2021.

A. H. Mirza and S. Cosan, “Computer network intrusion detection using sequential LSTM neural networks autoencoders,” in 2018 26th signal processing and communications applications conference (SIU), 2018, pp. 1–4.

A. Sherstinsky, “Fundamentals of recurrent neural network (RNN) and long short-term memory (LSTM) network,” Phys. D Nonlinear Phenom., vol. 404, p. 132306, 2020.

Similar Articles

<< < 4 5 6 7 8 9 10 11 12 13 > >> 

You may also start an advanced similarity search for this article.