Dr CYBER ATTACK ANALYSIS USING ARTIFICIAL NEURAL NETWORKS

Main Article Content

Article Sidebar

Published Oct 22, 2021
Fahmina Taranum

Abstract

In today's world one of the great challenges is the development of a successful and automatic cyber attack detection. This project present Artificial Intelligence techniques for cyber threat detection. The proposed methodology transforms crowd of assembled security events to individual event profiles and usage of deep learning based cyber attack recognition approach. For this aim, the event profiling of data for data preparation, pre-processing also various Artificial Neural Networks such as CNN and LSTM is developed. The benchmark dataset NSLKDD is considered for appraisal. For assessing the performance in contrast to the existing approaches, various experiments will be conducted using conventional machine learning methods (SVM, k-NN, RF, NB, and DT). Thus, the evaluation outcome of the study assure that proposed approach has potential to be operated as learning-based models for network intrusion-detection and exhibit that performance exceed the standard machine learning approaches.

How to Cite

Taranum, F. (2021). Dr CYBER ATTACK ANALYSIS USING ARTIFICIAL NEURAL NETWORKS. SPAST Abstracts, 1(01). Retrieved from https://spast.org/techrep/article/view/2921
Abstract 125 |

Article Details

Keywords

Cyber security, Network Security, Artificial Intelligence, Deep Neural Networks

References
[1] S. Naseer, Y. Saleem, S. Khalid, M. K. Bashir, J. Han, M. M. Iqbal, K. Han, "Enhanced Network Anomaly Detection Based on Deep Neural Networks," IEEE Access, vol. 6, pp. 48231-48246, 2018.
[2] B. Zhang, G. Hu, Z. Zhou, Y. Zhang, P. Qiao, L. Chang, "Network Intrusion Detection Based on Directed Acyclic Graph and Belief Rule Base", ETRI Journal, vol. 39, no. 4, pp. 592-604, Aug. 2017
[3] W. Wang, Y. Sheng and J. Wang, "HAST-IDS: Learning hierarchical spatial-temporal features using deep neural networks to improve intrusion detection," IEEE Access, vol. 6, no. 99, pp. 1792-1806, 2018.
[4] M. K. Hussein, N. Bin Zainal and A. N. Jaber, "Data security analysis for DDoS defense of cloud based networks," 2015 IEEE Student Conference on Research and Development (SCOReD), Kuala Lumpur, 2015, pp. 305-310.
[5] S. Sandeep Sekharan, K. Kandasamy, "Profiling SIEM tools and correlation engines for security analytics," In Proc. Int. Conf. Wireless Com., Signal Proce. and Net.(WiSPNET), 2017, pp. 717-721.
[6] N.Hubballiand V.Suryanarayanan,‘‘False alarm minimization techniques in signature-based intrusion detection systems: A survey,’’ Comput. Commun., vol. 49, pp. 1-17, Aug. 2014.
[7] A. Naser, M. A. Majid, M. F. Zolkipli and S. Anwar, "Trusting cloud computing for personal files," 2014 International Conference on Information and Communication Technology Convergence (ICTC), Busan, 2014, pp. 488-489.
[8] Y. Shen, E. Mariconti, P. Vervier, and Gianluca Stringhini, "Tiresias: Predicting Security Events Through Deep Learning," In Proc. ACM CCS 18, Toronto, Canada, 2018, pp. 592-605.
[9] Kyle Soska and Nicolas Christin, "Automatically detecting vulnerable websites before they turn malicious,", In Proc. USENIX Security Symposium., San Diego, CA, USA, 2014, pp.625-640.
[10] K. Veeramachaneni, I. Arnaldo, V. Korrapati, C. Bassias, K. Li, "AI2: training a big data machine to defend," In Proc. IEEE BigDataSecurity HPSC IDS, New York, NY, USA, 2016,pp. 49-54
[11] Mahbod Tavallaee, Ebrahim Bagheri, Wei Lu and Ali A. Ghorbani, "A detailed analysis of the kdd cup 99 data set," In Proc. of the Second IEEE Int. Conf. Comp. Int. for Sec. and Def. App., pp. 53-58, 2009.
[12] I. Sharafaldin, A. H. Lashkari, A. A. Ghorbani, "Toward generating a new intrusion detection dataset and intrusion traffic characterization", Proc. Int. Conf. Inf. Syst. Secure. Privacy, pp. 108-116, 2018.
[13] [online] Available: http://www.takakura.com/Kyoto_data/
[14] R. Vinayakumar, Mamoun Alazab, K. P. Soman, P. Poornachandran, Ameer Al-Nemrat and Sitalakshmi Venkatraman, "Deep Learning Approach for Intelligent Intrusion Detection System," IEEE Access, vol. 7, pp. 41525-41550, Apr. 2019.
[15] F. A. Khan, A. Gumaei, A. Derhab and A. Hussain, "A Novel Two-Stage Deep Learning Model for Efficient Network Intrusion Detection," in IEEE Access, vol. 7, pp. 30373-30385, 2019.
[16] Y. Liao and V. Vemuri, "Use of K-nearest neighbor classifier for intrusion detection,'' Comput. Secur., vol. 21, no. 5, pp. 439-448, Oct. 2002.
[17] A. Oprea, Z. Li, T. Yen, S. H. Chin and S. Alrwais, "Detection of Early-Stage Enterprise Infection by Mining Large-Scale Log Data," 2015 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, Rio de Janeiro, 2015, pp. 45-56.
[18] Ke Zhang, J. Xu, M. R.Min, G. Jiang, K. Pelechrinis, and Hui Zhang. "Automated IT system failure prediction: A deep learning approach," In Proc. IEEE Int. Conf. Big Data (IEEE BigData), Washington, DC, USA, Dec. 2016, pp. 1291-1300
Section
GE3- Computers & Information Technology