Affiliation:
1. University of Technology - Iraq
Abstract
Abstract
The evolution of the Internet has given rise to novel forms of network attacks, underscoring the importance of investigating methods for detecting anomalous behaviour and accurately classifying attacks within the domain of cyberspace. Recently, the Intrusion Detection System (IDS) has been employing various deep learning-based methodologies to construct a model that is driven by data. The aforementioned techniques are advantageous as they reduce the cost and labour involved in manual detection. The precision and capability of feature extraction in contemporary intrusion detection techniques exhibit significant variability. Furthermore, the presence of extraneous and repetitive phrases is ubiquitous in real-time network data. To tackle the aforementioned concerns, the present study proposes the utilisation of the convolutional neural networks (CNN) algorithm for the purpose of detecting intrusions. Initially, in order to enhance resource utilisation and reduce time complexity, a configuration of 16 layers and 8 convolutional neural networks with Max-Pooling1D is utilised. Subsequently, a series of evaluative experiments conducted on the NSL-KDD dataset indicate that the enhanced CNN model has the potential to enhance the performance of the Intrusion Detection System (IDS). The precision for all types of features is reported to be 0.991, while the recall and f1-measure are noted to be 0.995 and 0.993, respectively
Publisher
Research Square Platform LLC
Reference68 articles.
1. Cloud-based Voice Home automation System Based on Internet of Things;Jasim ZM;Iraqi Journal of Science
2. Internet-of-Things Security and Vulnerabilities: Taxonomy, Challenges, and Practice;Chen K;Journal of Hardware and Systems Security,2018
3. Internet-of-Things Security and Vulnerabilities: Case Study;Alqarawi G;Journal of Applied Security Research,2022
4. Sisodia, D. (2020). “On the State of Internet of Things Security: Vulnerabilities, Attacks, and Recent Countermeasures,”.
5. DDoS incidents and their impact: A review;Sachdeva M;International Arab Journal of Information Technology,2010
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献