scholarly journals The method for detecting network attacks based on the neuroimmune approach

2021 ◽  
Vol 2094 (3) ◽  
pp. 032035
Author(s):  
V A Chastikova ◽  
A I Mitugov

Abstract The given paper proposes a procedure for detecting network attacks based on a hybrid model that combines deep learning methods and artificial immune systems and increases the efficiency of network traffic analysis. During the development process, the constituent components of a hybrid system for identifying network incidents have been specified with a preceding analysis of existing approaches to its construction. Conceptual architectures of the intrusion detection system have been proposed, functional simulation and data flow simulation for the system comprehensive description have been carried out. Theoretical analysis of the concepts selected for implementation of the development methods of network detection systems has been carried out and the procedures of their hybridization have been substantiated. A software package for comparative analysis of the neuroimmune approach with machine learning methods has been developed and tested.

Author(s):  
S. A. Sakulin ◽  
A. N. Alfimtsev ◽  
K. N. Kvitchenko ◽  
L. Ya. Dobkach ◽  
Yu. A. Kalgin

Network technologies have been steadily developing and their application has been expanding. One of the aspects of the development is a modification of the current network attacks and the appearance of new ones. The anomalies that can be detected in network traffic conform with such attacks. Development of new and improvement of the current approaches to detect anomalies in network traffic have become an urgent task. The article suggests a hybrid approach to detect anomalies on the basis of the combined signature approach and computationally effective classifiers of machine learning: logistic regression, stochastic gradient descent and decision tree with accuracy increase due to weighted voting. The choice of the classifiers is explained by the admissible complexity of the algorithms that allows detection of network traffic events for the time close to real. Signature analysis is carried out with the help of the Zeek IDS (Intrusion Detection System) signature base. Learning is fulfilled by preliminary prepared (by excluding extra recordings and parameters) CICIDS2017 (Canadian Institute for Cybersecurity Intrusion Detection System) signature set by cross validation. The set is roughly divided into ten parts that allows us to increase the accuracy. Experimental evaluation of the developed approach comparing with individual classifiers and with other approaches by such criteria as part of type I and II errors, accuracy and level of detection, has proved the approach suitable to be applied in network attacks detection systems. It is possible to introduce the developed approach into both existing and new anomaly detection systems.


2021 ◽  
Vol 8 (1) ◽  
Author(s):  
FatimaEzzahra Laghrissi ◽  
Samira Douzi ◽  
Khadija Douzi ◽  
Badr Hssina

AbstractNetwork attacks are illegal activities on digital resources within an organizational network with the express intention of compromising systems. A cyber attack can be directed by individuals, communities, states or even from an anonymous source. Hackers commonly conduct network attacks to alter, damage, or steal private data. Intrusion detection systems (IDS) are the best and most effective techniques when it comes to tackle these threats. An IDS is a software application or hardware device that monitors traffic to search for malevolent activity or policy breaches. Moreover, IDSs are designed to be deployed in different environments, and they can either be host-based or network-based. A host-based intrusion detection system is installed on the client computer, while a network-based intrusion detection system is located on the network. IDSs based on deep learning have been used in the past few years and proved their effectiveness. However, these approaches produce a big false negative rate, which impacts the performance and potency of network security. In this paper, a detection model based on long short-term memory (LSTM) and Attention mechanism is proposed. Furthermore, we used four reduction algorithms, namely: Chi-Square, UMAP, Principal Components Analysis (PCA), and Mutual information. In addition, we evaluated the proposed approaches on the NSL-KDD dataset. The experimental results demonstrate that using Attention with all features and using PCA with 03 components had the best performance, reaching an accuracy of 99.09% and 98.49% for binary and multiclass classification, respectively.


Author(s):  
Alexander Ivanov ◽  
◽  
Alexander Kutischev ◽  
Elena Nikitina ◽  
◽  
...  

This paper demonstrated the use of neural networks in the development of network intrusion detection systems, described the structure of the developed software application for network traffic analysis and network attacks detection, and presented the software application results.


Author(s):  
Gaddam Venugopal, Et. al.

Rapid growth in technology, not only makes smoother the life style, but also reveals a lot of security issues. Day by day changing of attack types distractsnot only organizations, companies but also the people who are using network services for their daily needs.Intrusion Detection Systems (IDS) have been developed to avoid financial losses caused by network attacks. KDD CUP 99, NSL-KDD, KYOTO 2006+, CIDDS-01 etc., some of the Intrusion Datasets available for researchers to test and develop their IDS models. In this paper, an attempt is made to compare the effect of various SVM Kernel based models and Hybrid kernel based models etc., on CIDDS-01 dataset. Results were drawn.


2013 ◽  
Vol 325-326 ◽  
pp. 1683-1687
Author(s):  
Luo Guang Huang ◽  
Li Min Meng ◽  
Yong Hong Guo

The development of intrusion detection systems in the world are reviewed in this article first. On the basis of in-depth analysis of the characteristics of network attacks and intrusions we aim at to solving the problems mentioned above, the characteristics of survival of the fittest genetic algorithm is used to solve the problem. Second, a detection model based on genetic algorithms is established, and finally the model is simulated. The simulation results show that the model can solve its intrusion detection system, security issues, with a theoretical and practical application.


Author(s):  
Safaa Laqtib ◽  
Khalid El Yassini ◽  
Moulay Lahcen Hasnaoui

Machine learning techniques are being widely used to develop an intrusion detection system (IDS) for detecting and classifying cyber attacks at the network-level and the host-level in a timely and automatic manner. However, Traditional Intrusion Detection Systems (IDS), based on traditional machine learning methods, lacks reliability and accuracy. Instead of the traditional machine learning used in previous researches, we think deep learning has the potential to perform better in extracting features of massive data considering the massive cyber traffic in real life. Generally Mobile Ad Hoc Networks have given the low physical security for mobile devices, because of the properties such as node mobility, lack of centralized management and limited bandwidth. To tackle these security issues, traditional cryptography schemes can-not completely safeguard MANETs in terms of novel threats and vulnerabilities, thus by applying Deep learning methods techniques in IDS are capable of adapting the dynamic environments of MANETs and enables the system to make decisions on intrusion while continuing to learn about their mobile environment. An IDS in MANET is a sensoring mechanism that monitors nodes and network activities in order to detect malicious actions and malicious attempt performed by Intruders. Recently, multiple deep learning approaches have been proposed to enhance the performance of intrusion detection system. In this paper, we made a systematic comparison of three models, Inceprtion architecture convolutional neural network Inception-CNN, Bidirectional long short-term memory (BLSTM) and deep belief network (DBN) on the deep learning-based intrusion detection systems, using the NSL-KDD dataset containing information about intrusion and regular network connections, the goal is to provide basic guidance on the choice of deep learning methods in MANET.


Sensors ◽  
2021 ◽  
Vol 21 (8) ◽  
pp. 2674
Author(s):  
Qingying Ren ◽  
Wen Zuo ◽  
Jie Xu ◽  
Leisheng Jin ◽  
Wei Li ◽  
...  

At present, the proposed microwave power detection systems cannot provide a high dynamic detection range and measurement sensitivity at the same time. Additionally, the frequency band of these detection systems cannot cover the 5G-communication frequency band. In this work, a novel microwave power detection system is proposed to measure the power of the 5G-communication frequency band. The detection system is composed of a signal receiving module, a power detection module and a data processing module. Experiments show that the detection frequency band of this system ranges from 1.4 GHz to 5.3 GHz, the dynamic measurement range is 70 dB, the minimum detection power is −68 dBm, and the sensitivity is 22.3 mV/dBm. Compared with other detection systems, the performance of this detection system in the 5G-communication frequency band is significantly improved. Therefore, this microwave power detection system has certain reference significance and application value in the microwave signal detection of 5G communication systems.


Author(s):  
Nicole Gailey ◽  
Noman Rasool

Canada and the United States have vast energy resources, supported by thousands of kilometers (miles) of pipeline infrastructure built and maintained each year. Whether the pipeline runs through remote territory or passing through local city centers, keeping commodities flowing safely is a critical part of day-to-day operation for any pipeline. Real-time leak detection systems have become a critical system that companies require in order to provide safe operations, protection of the environment and compliance with regulations. The function of a leak detection system is the ability to identify and confirm a leak event in a timely and precise manner. Flow measurement devices are a critical input into many leak detection systems and in order to ensure flow measurement accuracy, custody transfer grade liquid ultrasonic meters (as defined in API MPMS chapter 5.8) can be utilized to provide superior accuracy, performance and diagnostics. This paper presents a sample of real-time data collected from a field install base of over 245 custody transfer grade liquid ultrasonic meters currently being utilized in pipeline leak detection applications. The data helps to identify upstream instrumentation anomalies and illustrate the abilities of the utilization of diagnostics within the liquid ultrasonic meters to further improve current leak detection real time transient models (RTTM) and pipeline operational procedures. The paper discusses considerations addressed while evaluating data and understanding the importance of accuracy within the metering equipment utilized. It also elaborates on significant benefits associated with the utilization of the ultrasonic meter’s capabilities and the importance of diagnosing other pipeline issues and uncertainties outside of measurement errors.


Author(s):  
Renan Martins Baptista

This paper describes procedures developed by PETROBRAS Research & Development Center to assess a software-based leak detection system (LDS) for short pipelines. These so-called “Low Complexity Pipelines” are short pipeline segments with single-phase liquid flow. Detection solutions offered by service companies are frequently designed for large pipeline networks, with batches and multiple injections and deliveries. Such solutions are sometimes impractical for short pipelines, due to high cost, long tuning procedures, complex instrumentation and substantial computing requirements. The approach outlined here is a corporate approach that optimizes a LDS for shorter lines. The two most popular implemented techniques are the Compensated Volume Balance (CVB), and the Real Time Transient Model (RTTM). The first approach is less accurate, reliable and robust when compared to the second. However, it can be cheaper, simpler, faster to install and very effective, being marginally behind the second one, and very cost-efective. This paper describes a procedure to determine whether one can use a CVB in a short pipeline.


Sign in / Sign up

Export Citation Format

Share Document