Implementation of Intrusion detection and prevention with Deep Learning in Cloud Computing

Publish Year: 1402
نوع سند: مقاله ژورنالی
زبان: English
View: 137

This Paper With 18 Page And PDF Format Ready To Download

  • Certificate
  • من نویسنده این مقاله هستم

این Paper در بخشهای موضوعی زیر دسته بندی شده است:

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این Paper:

شناسه ملی سند علمی:

JR_JITM-15-5_001

تاریخ نمایه سازی: 1 آبان 1401

Abstract:

An administrator is employed to identify network security breaches in their organizations by using a Network Intrusion Detection and Prevention System (NIDPS), which is presented in this paper that can detect and preventing a wide range of well-known network attacks. It is now more important than ever to recognize different cyber-attacks and network abnormalities that build an effective intrusion detection system plays a crucial role in today's security. NSL-KDD benchmark data set is extensively used in literature, although it was created over a decade ago and will not reflect current network traffic and low-footprint attacks. Canadian Institute of Cyber security introduced a new data set, the CICIDS۲۰۱۷ network data set, which solved the NSL-KDD problem. With our approach, we can apply a variety of machine learning techniques like linear regression, Random Forest and ID۳. The efficient IDPS is indeed implemented and tested in a network environment utilizing several machine learning methods. A model that simulates an IDS-IPS system by predicting whether a stream of network data is malicious or benign is our objective. An Enhanced ID۳ is proposed in this study to identify abnormalities in network activity and classify them. For benchmark purposes, we also develop an auto encoder network, PCA, and K-Means Clustering. On CICIDS۲۰۱۷, a standard dataset for network intrusion, we apply Self-Taught Learning (STL), which is a deep learning approach. To compare, we looked at things like memory, Recall, Accuracy, and Precision.

Keywords:

IDPS (Intrusion Detection and Prevention System) , Network Security

Authors

Srilatha

School of Computing and Information Technology, REVA University, Bengaluru, India-۵۶۰۰۶۴; Department of CSE, Sreenidhi Institute of Science and Technology, Hyderabad, India-۵۰۱۳۰۱.

Thillaiarasu

School of Computing and Information Technology, REVA University, Bengaluru, India-۵۶۰۰۶۴.

مراجع و منابع این Paper:

لیست زیر مراجع و منابع استفاده شده در این Paper را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود Paper لینک شده اند :
  • Albahar, M. A., Binsawad, M., Almalki, J., El-etriby, S., & ...
  • Al-Shourbaji, I., & Al-Janabi, S. (۲۰۱۷). Intrusion Detection and Prevention ...
  • Amini, M., Jalili, R., & Shahriari, H. R. (۲۰۰۶). RT-UNNID: ...
  • Chen, L., Xian, M., Liu, J., & Wang, H. (۲۰۲۰). ...
  • Dastanpour, A., Ibrahim, S., & Mashinchi, R. (۲۰۱۶). Effect of ...
  • Garbis, J., & Chapman, J. W. (۲۰۲۱). Intrusion Detection and ...
  • Improving Network Security Based on Trust-Aware Routing Protocols Using Long ...
  • Jasim, Y. A. (۲۰۱۸). Improving intrusion detection systems using artificial ...
  • Kiran Kumar, M., Kranthi Kumar, S., Kalpana, E., Srikanth, D., ...
  • Labib, K., & Vemuri, R. (۲۰۰۲). NSOM: A real-time network-based ...
  • Maithili, K., Vinothkumar, V., & Latha, P. (۲۰۱۸). Analyzing the ...
  • Memory-Queuing Segment-Routing Algorithms. International Journal of Informatio ...
  • Moloja, D., & Mpekoa, N. (۲۰۱۷). Towards a cloud intrusion ...
  • Muthukumaran V., Kumar, V. V., Joseph, R. B., Munirathanam, M., ...
  • Nazarzadeoghaz, N., Khendek, F., & Toeroe, M. (۲۰۲۰). Automated design ...
  • Puttini, R. S., Marrakchi, Z., & Mé, L. (۲۰۰۳). A ...
  • Raina, R., Battle, A., Lee, H., Packer, B., & Ng, ...
  • Sabhnani, M., & Serpen, G. (۲۰۰۳). Application of machine learning ...
  • Saikumar, K., Rajesh, V., & Babu, B. S. (۲۰۲۲). Heart ...
  • Technology Project Management, ۱۲(۴), ۴۷–۶۰. doi:۱۰.۴۰۱۸/ijitpm.۲۰۲۱۱۰۰۱۰۵ ...
  • نمایش کامل مراجع