Ajou University repository

A Novel Eccentric Intrusion Detection Model Based on Recurrent Neural Networks with Leveraging LSTMoa mark
  • Muthunambu, Navaneetha Krishnan ;
  • Prabakaran, Senthil ;
  • Kavin, Balasubramanian Prabhu ;
  • Siruvangur, Kishore Senthil ;
  • Chinnadurai, Kavitha ;
  • Ali, Jehad
Citations

SCOPUS

5

Citation Export

DC Field Value Language
dc.contributor.authorMuthunambu, Navaneetha Krishnan-
dc.contributor.authorPrabakaran, Senthil-
dc.contributor.authorKavin, Balasubramanian Prabhu-
dc.contributor.authorSiruvangur, Kishore Senthil-
dc.contributor.authorChinnadurai, Kavitha-
dc.contributor.authorAli, Jehad-
dc.date.issued2024-01-01-
dc.identifier.urihttps://dspace.ajou.ac.kr/dev/handle/2018.oak/34058-
dc.description.abstractThe extensive utilization of the Internet in everyday life can be attributed to the substantial accessibility of online services and the growing significance of the data transmitted via the Internet. Regrettably, this development has expanded the potential targets that hackers might exploit. Without adequate safeguards, data transmitted on the internet is significantly more susceptible to unauthorized access, theft, or alteration. The identification of unauthorised access attempts is a critical component of cybersecurity as it aids in the detection and prevention of malicious attacks. This research paper introduces a novel intrusion detection framework that utilizes Recurrent Neural Networks (RNN) integrated with Long Short-Term Memory (LSTM) units. The proposed model can identify various types of cyberattacks, including conventional and distinctive forms. Recurrent networks, a specific kind of feedforward neural networks, possess an intrinsic memory component. Recurrent Neural Networks (RNNs) incorporating Long Short-Term Memory (LSTM) mechanisms have demonstrated greater capabilities in retaining and utilizing data dependencies over extended periods. Metrics such as data types, training duration, accuracy, number of false positives, and number of false negatives are among the parameters employed to assess the effectiveness of these models in identifying both common and unusual cyberattacks. RNNs are utilised in conjunction with LSTM to support human analysts in identifying possible intrusion events, hence enhancing their decision-making capabilities. A potential solution to address the limitations of Shallow learning is the introduction of the Eccentric Intrusion Detection Model. This model utilises Recurrent Neural Networks, specifically exploiting LSTM techniques. The proposed model achieves detection accuracy (99.5%), generalisation (99%), and false-positive rate (0.72%), the parameters findings reveal that it is superior to state-of-the-art techniques.-
dc.description.sponsorshipThis work was supported partially by the MSIT (Ministry of Science and ICT), Korea, under the ITRC (Information Technology Research Center) Support Program (IITP-2024-2018-0-01431) supervised by the IITP (Institute for Information & Communications Technology Planning & Evaluation).-
dc.description.sponsorshipFunding Statement: This work was supported partially by the MSIT (Ministry of Science and ICT), Korea, under the ITRC (Information Technology Research Center) Support Program (IITP-2024-2018-0-01431) supervised by the IITP (Institute for Information & Communications Technology Planning & Evaluation).-
dc.language.isoeng-
dc.publisherTech Science Press-
dc.subject.meshCICIDS2019 dataset-
dc.subject.meshCyber security-
dc.subject.meshCyber-attacks-
dc.subject.meshInnovative cyberattack-
dc.subject.meshIntrusion detection models-
dc.subject.meshIntrusion-Detection-
dc.subject.meshLeveraging long short-term memory-
dc.subject.meshMachine-learning-
dc.subject.meshModel-based OPC-
dc.subject.meshUnauthorized access-
dc.titleA Novel Eccentric Intrusion Detection Model Based on Recurrent Neural Networks with Leveraging LSTM-
dc.typeArticle-
dc.citation.endPage3127-
dc.citation.startPage3089-
dc.citation.titleComputers, Materials and Continua-
dc.citation.volume78-
dc.identifier.bibliographicCitationComputers, Materials and Continua, Vol.78, pp.3089-3127-
dc.identifier.doi10.32604/cmc.2023.043172-
dc.identifier.scopusid2-s2.0-85189022899-
dc.identifier.urlhttps://www.techscience.com/cmc/v78n3/55878-
dc.subject.keywordCICIDS2019 dataset-
dc.subject.keywordCybersecurity-
dc.subject.keywordinnovative cyberattacks-
dc.subject.keywordintrusion detection-
dc.subject.keywordleveraging long short-term memory (LLSTM)-
dc.subject.keywordmachine learning-
dc.description.isoatrue-
dc.subject.subareaBiomaterials-
dc.subject.subareaModeling and Simulation-
dc.subject.subareaMechanics of Materials-
dc.subject.subareaComputer Science Applications-
dc.subject.subareaElectrical and Electronic Engineering-
Show simple item record

Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

ALI JEHAD Image
ALI JEHADJEHAD, ALI
Department of Software and Computer Engineering
Read More

Total Views & Downloads

File Download

  • There are no files associated with this item.