Abstract
The current demand for remote work, remote teaching and video conferencing has brought a surge not only in network traffic, but unfortunately, in the number of attacks as well. Having reliable, safe and secure functionality of various network services has never been more important. Another serious phenomenon that is apparent these days and that must not be discounted is the growing use of artificial intelligence techniques for carrying out network attacks. To combat these attacks, effective protection methods must also utilize artificial intelligence. Hence, we are introducing a specific neural network-based decision procedure that can be considered for application in any flow characteristic-based network-traffic-handling controller. This decision procedure is based on a convolutional neural network that processes the incoming flow characteristics and provides a decision; the procedure can be understood as a firewall rule. The main advantage of this decision procedure is its depiction process, which has the ability to transform the incoming flow characteristics into a graphical structure. Graphical structures are regarded as very efficient data structures for processing by convolutional neural networks. This article’s main contribution consists of the development and improvement of the depiction process using a genetic algorithm. The results presented at the end of the article show that the decision procedure using an optimized depiction process brings significant improvements in comparison to previous experiments.
Subject
Fluid Flow and Transfer Processes,Computer Science Applications,Process Chemistry and Technology,General Engineering,Instrumentation,General Materials Science
Reference51 articles.
1. Coronavirus Alert—Ransomware Attacks Up by 800%https://monstercloud.com/blog/2020/03/23/coronavirus-alert-ransomware-attacks-up-by-800/
2. What Is the Difference between Network Security and Cyber Security?https://kb.netgear.com/000060950/What-is-the-difference-between-network-security-and-cyber-security
3. Providing Cyber Security using Artificial Intelligence – A survey
4. McAfee Combining Threat Intel with AIhttps://www.computerweekly.com/news/252450903/McAfee-combining-threat-intel-with-AI
5. The Value of Artificial Intelligence in Cybersecurity,2018
Cited by
10 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献