International Journal of Engineering Technology and Management Sciences

2023, Volume 7 Issue 4

Comparative Study of Deep Learning Models for Network Intrusion Detection

AUTHOR(S)

Reeja Susan Reji, Anjitha Raj, Riya Raju, Manya, Sunandha Rajagopal

DOI: https://doi.org/10.46647/ijetms.2023.v07i04.043

ABSTRACT
In this paper, we present a relative assessment of profound learning ways to deal with network interruption recognition. An Organization Interruption Recognition Framework (NIDS) is a basic part of each and every Web associated framework due to likely goes after from both outer and inside sources. A NIDS is utilized to distinguish network conceived goes after like Forswearing of Administration (DoS) assaults, malware replication, and interlopers that are working inside the framework. Various profound learning approaches have been proposed for interruption identification frameworks. We assess three models, a vanilla profound brain net (DNN), self-trained learning (STL) approach, and Repetitive Brain Organization (RNN) based Long Present moment Memory (LSTM) on their exactness and accuracy. Their exhibition is assessed utilizing the organization interruption dataset given by Information Disclosure in Data sets (KDD). This dataset was utilized for the third global Information Revelation and Information Mining Devices contest held related with KDD Cup 1999. The outcomes were then contrasted with a standard shallow calculation that utilizes multinomial strategic relapse to assess if profound learning models perform better on this dataset.

Page No: 313 - 322

References:

Evans, D.: The Internet of Things How the Next Evolution of the Internet Is Changing Everything (2011)
Gers, F.: Long Short-Term Memory in Recurrent Neural Networks (2001)
Niyaz, Q., Sun, W., Javaid, A.Y., Alam M..: A Deep Learning Approach for Network Intrusion Detection System (2015)
Amad, B., Jian, W., Hassan , B., Rehmatullah , S.: Hybrid Intrusion Detection Method to Increase Anomaly Detection by Using Data Mining Techniques. International Journal of Database Theory and Application (2017) 231-240
W. Lee and B. Rotoloni, Emerging Cyber Threats, Trends & Technologies Report. Georgia Tech Institue for Information Security & Privacy (2004)
Bruneau, G.: The History and Evolution of Intrusion Detection. https://www.sans.org/reading-room/whitepapers/detection/history-evolution-intrusiondetection-344 (2001)
Bunel, P.: An introduction to Intrusion Detection Systems. London, England: SANS Institute. https://www.giac.org/paper/gsec/4227/introduction-intrusion-detectionsystems/106775 (2017)
Paliwal, S., Gupta, R.: Denial-of-Service, Probing & Remote to User (R2L) Attack Detection using Genetic Algorithm, 60th ed. International Journal of Computer Applications (2017)
ACM Code of Ethics and Professional Conduct, Acm.org (2017)
Chew, J.: Marissa Mayer Just Fired Dozens of Yahoo Employees By Accident. Fortune (2016)
Trainer, D.: Four Reasons Executives Manipulate Earnings. Forbes (2017)
Dong B., Wang X.: Comparison Deep Learning Method to Traditional Methods Using for Network Intrusion Detection (2016)
Kruegel, C., Mutz, D., Robertson, W., Valeur. F.: Bayesian event classification for intrusion detection. Proc. 19th Annual Computer Security Applications Conference (2003) 14-23  
Sinclair, C., Pierce, L., Matzner, S.: An application of machine learning to network intrusion detection. Proc. 15th Annual Computer Security Applications (1999) 371-377  
Zhang, J., Zulkernine, M.: A hybrid network intrusion detection technique using random forests. Proc. First International Conference on Availability, Reliability and Security (ARES'06), April (2006) 8-16  
Yang, J., Deng, J., Li, S., Hao, Y.: Improved traffic detection with support vector machine based on restricted Boltzmann machine. Soft Computing, vol. 19 (2015) 1-12
M. Lincoln Labs. DARPA Intrusion Detection Evaluation. http://www.ll.mit.edu/IST/ideval (1999)
Hinton, G.E.: The "wake-sleep" algorithm for unsupervised neural networks. Science 268.5214 (1995) 1158
Hinton, G.E., Osindero S., Teh Y.W.: A fast learning algorithm for deep belief nets. Neural computation 18.7 (2006) 1527-1554
Bengio, Y., Lamblin, P., Popovici, D., Larochelle, H.: Greedy layer-wise training of deep networks. Advances in neural information processing systems (2007)
Torres, P., Catania, C., Garcia, S., Garino, C.: An Analysis of Recurrent Neural Networks for Botnet Detection Behavior (2016)
Hayun, L.: Demystifying Machine Learning (‘Artificial Intelligence’) Use in Endpoint Security Products. Proc. Palo Alto Networks Ignite 2017 Conference (2017)
IT Industry Outlook 2017. CompTIA. https://www.comptia.org/resources/it-industrytrends-analysis-2017 (2017)
Building digital trust: The role of data ethics in the digital age. Accenture (2017)


How to Cite This Article:
Reeja Susan Reji, Anjitha Raj, Riya Raju, Manya, Sunandha Rajagopal . Comparative Study of Deep Learning Models for Network Intrusion Detection . ijetms;7(4):313-322. DOI: 10.46647/ijetms.2023.v07i04.043