News Updates Thursday 26th Dec 2024 :
  • Welcome to INPRESSCO, world's leading publishers, We have served more than 10000+ authors
  • Articles are invited in engineering, science, technology, management, industrial engg, biotechnology etc.
  • Paper submission is open. Submit online or at editor.ijcet@inpressco.com
  • Our journals are indexed in NAAS, University of Regensburg Germany, Google Scholar, Cross Ref etc.
  • DOI is given to all articles

Identification of Malicious Activity for Network Packet using Deep Learning


Author : Divyarani P. Babar and Dr. Pankaj Agarkar

Pages : 750-755
Download PDF
Abstract

Data and application security is most essential in today environment due to highly resource utilization in network environment. Various network attacks detection and prevention techniques has already introduced by various researchers in many existing systems. Two identification of malicious behavior from large traffic and take action against such request is the part of IDS. Various machine learning techniques also already developed to generate a strong rules with different Optimization algorithms. But still IDS facing some issues like unknown attack detection accuracy, low accuracy for network attacks etc. However, cyber security threats are also growing as the contact points to the Internet are increasing. A significant security issue today is the intrusion detection system (IDS). A Network Intrusion Detection System (NIDS) helps system administrators to detect violations of network security within their operations. However, many problems arise when a robust and efficient NIDS is developed for unexpected and unforeseeable attacks. In this work, a deep learning based approach implement for effective and flexible NIDS. It is confirmed that the deep neural network is effective for NIDS through the performance test. System uses Recurrent Neural Network (RNN) which is supervised learning algorithm to detect known and unknown attacks into the both environments. Initially, Data preprocessing has done with Weka tool and define standard technique to eliminate unwanted records for attribute values. The proposed RNN algorithm works in both models for training and testing respectively. In first section we train the model with  different network intrusion data sets (KDD CUP99, NSLKDD, ISCX, NB-15 etc.). Once rules has created system deals with testing model an imbalance data generation environment.  The partial implementation introduce proposed RNN provides better accuracy then other machine learning techniques. Additionally, we are evaluating and comparing different deep learning algorithms, namely RNN, CNN, DNN and PNN algorithm on cloud environment to detect intrusion in the network.

Keywords: Recurrent neural network, KDD, WSN Trace dataset, Deep learning, Intrusion detection system, long short term memory

Call for Papers
  1. IJCET- Current Issue
  2. Issues are published in Feb, April, June, Aug, Oct and Dec
  3. DOI is given to all articles
  • Inpressco Google Scholar
  • Inpressco Science Central
  • Inpressco Global impact factor
  • Inpressco aap

International Press corporation is licensed under a Creative Commons Attribution-Non Commercial NoDerivs 3.0 Unported License
©2010-2023 INPRESSCO® All Rights Reserved