Author:
Tiwari Aparna,Kumar Dinesh
Abstract
Given the escalating intricacy of network environments and the rising level of sophistication in cyber threats, there is an urgent requirement for resilient and effective network intrusion detection systems (NIDS). This document presents an innovative NIDS approach that utilizes Convolutional Long Short-Term Memory (ConvLSTM) networks and Elephant Herd Optimization (EHO) to achieve precise and timely intrusion detection. Our proposed model combines the strengths of ConvLSTM, which can effectively capture spatiotemporal dependencies in network traffic data, and EHO, which allow the model to focus on relevant information while filtering out noise. To achieve this, we first preprocess network traffic data into sequential form and use ConvLSTM layers to learn both spatial and temporal features. Subsequently, we introduce Elephant Herd Optimization that dynamically assigns different weights to different parts of the input data, emphasizing the regions most likely to contain malicious activity. To evaluate the effectiveness of our approach, we conducted extensive experiments on publicly available network intrusion CICIDS2017 Dataset. The experimental results demonstrate the efficacy of the proposed approach (Accuracy = 99.98%), underscoring its potential to revolutionize modern network intrusion detection and proactively safeguard digital assets.
Publisher
European Alliance for Innovation n.o.
Reference32 articles.
1. Abdel-Rahman, Mohamed. "Advanced Cybersecurity Measures in IT Service Operations and Their Crucial Role in Safeguarding Enterprise Data in a Connected World." Eigenpub Review of Science and Technology 7, no. 1 (2023): 138-158.
2. Adhikari, Naresh, and Mahalingam Ramkumar. "IoT and Blockchain Integration: Applications, Opportunities, and Challenges." Network 3, no. 1 (2023): 115-141.
3. Khan, Abid, Awais Ahmad, Mansoor Ahmed, Jadran Sessa, and Marco Anisetti. "Authorization schemes for internet of things: requirements, weaknesses, future challenges and trends." Complex & Intelligent Systems 8, no. 5 (2022): 3919-3941.
4. Pan, Gary, Poh Sun SEOW, Calvin Chan, and Chu Yeong LIM. "Analytics and cybersecurity: The shape of things to come." (2015): 1.
5. Vinayakumar, R., K. P. Soman, and Prabaharan Poornachandran. "Applying deep learning approaches for network traffic prediction." In 2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI), pp. 2353-2358. IEEE, 2017.