skip to main content
10.1145/3408066.3408107acmotherconferencesArticle/Chapter ViewAbstractPublication PagesiccmsConference Proceedingsconference-collections
research-article

DIADL: An Energy Efficient Framework for Detecting Intrusion Attack Using Deep LearnIing

Published: 11 August 2020 Publication History

Abstract

In today's era, the Internet's complexity, accessi- bility, and openness has greatly enhanced the security risk of information systems. The Internet's popularity entails many threats of network attacks. Detection of intrusion is one of the major research problems in network security, with the goal of detecting unauthorized access or attacks to secure internal networks. Key ideas are to discover useful patterns or features that characterize a system's user behavior and use the collection of similar features to construct classifiers that can, ideally in real time, detect anomalies and known intrusions. In this proposal, energy efficient framework is designed which detects the intrusion. We predicted the bi- nary and multi class classification by the model with tuned parameters at different levels of learning. The deep learning system enhances the intrusion detection accuracy and provides a new intrusion detection research method. Using a collection of KDD (Knowledge Discovery and Data Mining) benchmark data, we demonstrate that successful and accurate classifiers can be constructed to detect intrusions. In literature, numerous machine learning methods have addressed intrusion detection systems. By analyzing the existing intrusion detection systems, we validated the proposed framework with deep learning.

References

[1]
Adeyinka, "Internet attack methods and internet security technol- ogy," in 2008 Second Asia International Conference on Modelling & Simulation (AMS). IEEE, 2008, pp. 77--82.
[2]
M. V. Pawar and J. Anuradha, "Network security and types of attacks in network," Procedia Computer Science, vol. 48, pp. 503--506, 2015.
[3]
E. W. Felten, D. Balfanz, D. Dean, and D. S. Wallach, "Web spoofing: An internet con game," Software World, vol. 28, no. 2, pp. 6--8, 1997.
[4]
A. Hadid, N. Evans, S. Marcel, and J. Fierrez, "Biometrics sys- tems under spoofing attack: an evaluation methodology and lessons learned," IEEE Signal Processing Magazine, vol. 32, no. 5, pp. 20--30, 2015.
[5]
O. O. Obi, "Security issues in mobile ad-hoc networks: a survey," The 17 th White House Papers Graduate Research In Informatics at Sussex, 2004.
[6]
C. Yin, Y. Zhu, J. Fei, and X. He, "A deep learning approach for intrusion detection using recurrent neural networks," Ieee Access, vol. 5, pp. 21 954--21 961, 2017.
[7]
A. L. Buczak and E. Guven, "A survey of data mining and ma- chine learning methods for cyber security intrusion detection," IEEE Communications Surveys & Tutorials, vol. 18, no. 2, pp. 1153--1176, 2015.
[8]
W. Li, P. Yi, Y. Wu, L. Pan, and J. Li, "A new intrusion detection system based on knn classification algorithm in wireless sensor network," Journal of Electrical and Computer Engineering, vol. 2014, 2014.
[9]
A. Javaid, Q. Niyaz, W. Sun, and M. Alam, "A deep learning approach for network intrusion detection system," in Proceedings of the 9th EAI International Conference on Bio-inspired Information and Communications Technologies (formerly BIONETICS). ICST (Institute for Computer Sciences, Social-Informatics and, 2016, pp. 21--26.
[10]
M. Ponkarthika and V. Saraswathy, "Network intrusion detection using deep neural networks," Asian J Appl Sci Technol, vol. 2, no. 2, pp. 665--673, 2018.
[11]
M. Tavallaee, E. Bagheri, W. Lu, and A. A. Ghorbani, "A detailed analysis of the kdd cup 99 data set," in 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications. IEEE, 2009, pp. 1--6.
[12]
S. Revathi and A. Malathi, "A detailed analysis on nsl-kdd dataset us- ing various machine learning techniques for intrusion detection," In- ternational Journal of Engineering Research & Technology (IJERT), vol. 2, no. 12, pp. 1848--1853, 2013.
[13]
N. Paulauskas and J. Auskalnis, "Analysis of data pre-processing influence on intrusion detection using nsl-kdd dataset," in 2017 Open Conference of Electrical, Electronic and Information Sciences (eStream). IEEE, 2017, pp. 1--5.
[14]
R. A. R. Ashfaq, X.-Z. Wang, J. Z. Huang, H. Abbas, and Y.-L. He, "Fuzziness based semi-supervised learning approach for intrusion detection system," Information Sciences, vol. 378, pp. 484--497, 2017.
[15]
P. S. Bhattacharjee, A. K. M. Fujail, and S. A. Begum, "Intrusion detection system for nsl-kdd data set using vectorised fitness function in genetic algorithm," Adv. Comput. Sci. Technol., vol. 10, no. 2, pp. 235--246, 2017.

Index Terms

  1. DIADL: An Energy Efficient Framework for Detecting Intrusion Attack Using Deep LearnIing

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    ICCMS '20: Proceedings of the 12th International Conference on Computer Modeling and Simulation
    June 2020
    219 pages
    ISBN:9781450377034
    DOI:10.1145/3408066
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    In-Cooperation

    • Central Queensland University
    • DUT: Dalian University of Technology
    • University of Wollongong, Australia
    • Swinburne University of Technology
    • University of Technology Sydney
    • National Tsing Hua University: National Tsing Hua University

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 11 August 2020

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. Cyber Security
    2. Deep Learning
    3. Intrusion
    4. Network

    Qualifiers

    • Research-article
    • Research
    • Refereed limited

    Conference

    ICCMS '20

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • 0
      Total Citations
    • 45
      Total Downloads
    • Downloads (Last 12 months)3
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 01 Jan 2025

    Other Metrics

    Citations

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media