Network intrusion detection based on deep learning model optimized with rule-based hybrid feature selection

2020 ◽  
Vol 29 (6) ◽  
pp. 267-283
Author(s):  
Femi Emmanuel Ayo ◽  
Sakinat Oluwabukonla Folorunso ◽  
Adebayo A. Abayomi-Alli ◽  
Adebola Olayinka Adekunle ◽  
Joseph Bamidele Awotunde
IEEE Access ◽  
2019 ◽  
Vol 7 ◽  
pp. 30373-30385 ◽  
Author(s):  
Farrukh Aslam Khan ◽  
Abdu Gumaei ◽  
Abdelouahid Derhab ◽  
Amir Hussain

2021 ◽  
Vol 2021 ◽  
pp. 1-17
Author(s):  
Joseph Bamidele Awotunde ◽  
Chinmay Chakraborty ◽  
Abidemi Emmanuel Adeniyi

The Industrial Internet of Things (IIoT) is a recent research area that links digital equipment and services to physical systems. The IIoT has been used to generate large quantities of data from multiple sensors, and the device has encountered several issues. The IIoT has faced various forms of cyberattacks that jeopardize its capacity to supply organizations with seamless operations. Such risks result in financial and reputational damages for businesses, as well as the theft of sensitive information. Hence, several Network Intrusion Detection Systems (NIDSs) have been developed to fight and protect IIoT systems, but the collections of information that can be used in the development of an intelligent NIDS are a difficult task; thus, there are serious challenges in detecting existing and new attacks. Therefore, the study provides a deep learning-based intrusion detection paradigm for IIoT with hybrid rule-based feature selection to train and verify information captured from TCP/IP packets. The training process was implemented using a hybrid rule-based feature selection and deep feedforward neural network model. The proposed scheme was tested utilizing two well-known network datasets, NSL-KDD and UNSW-NB15. The suggested method beats other relevant methods in terms of accuracy, detection rate, and FPR by 99.0%, 99.0%, and 1.0%, respectively, for the NSL-KDD dataset, and 98.9%, 99.9%, and 1.1%, respectively, for the UNSW-NB15 dataset, according to the results of the performance comparison. Finally, simulation experiments using various evaluation metrics revealed that the suggested method is appropriate for IIOT intrusion network attack classification.


2021 ◽  
Vol 1966 (1) ◽  
pp. 012051
Author(s):  
Shuai Zou ◽  
Fangwei Zhong ◽  
Bing Han ◽  
Hao Sun ◽  
Tao Qian ◽  
...  

Author(s):  
Xiangbing Zhao ◽  
Jianhui Zhou

With the advent of the computer network era, people like to think in deeper ways and methods. In addition, the power information network is facing the problem of information leakage. The research of power information network intrusion detection is helpful to prevent the intrusion and attack of bad factors, ensure the safety of information, and protect state secrets and personal privacy. In this paper, through the NRIDS model and network data analysis method, based on deep learning and cloud computing, the demand analysis of the real-time intrusion detection system for the power information network is carried out. The advantages and disadvantages of this kind of message capture mechanism are compared, and then a high-speed article capture mechanism is designed based on the DPDK research. Since cloud computing and power information networks are the most commonly used tools and ways for us to obtain information in our daily lives, our lives will be difficult to carry out without cloud computing and power information networks, so we must do a good job to ensure the security of network information network intrusion detection and defense measures.


2021 ◽  
pp. 102177
Author(s):  
ZHENDONG WANG ◽  
YAODI LIU ◽  
DAOJING HE ◽  
SAMMY CHAN

2020 ◽  
Vol 513 ◽  
pp. 386-396 ◽  
Author(s):  
Mohammad Mehedi Hassan ◽  
Abdu Gumaei ◽  
Ahmed Alsanad ◽  
Majed Alrubaian ◽  
Giancarlo Fortino

Sign in / Sign up

Export Citation Format

Share Document