Ajou University repository

RNN-based Prediction for Network Intrusion Detection
Citations

SCOPUS

0

Citation Export

DC Field Value Language
dc.contributor.authorPark, Shin Hyuk-
dc.contributor.authorPark, Hyun Jae-
dc.contributor.authorChoi, Young June (researcherId=7406117220; isni=0000000405323933; orcid=https://orcid.org/0000-0003-2014-6587)-
dc.date.issued2020-02-01-
dc.identifier.urihttps://aurora.ajou.ac.kr/handle/2018.oak/36567-
dc.identifier.urihttps://www.scopus.com/inward/record.uri?partnerID=HzOxMe3b&scp=85084057762&origin=inward-
dc.description.abstractWe investigate a prediction model using RNN for network intrusion detection in industrial IoT environments. For intrusion detection, we use anomaly detection methods that estimate the next packet, measure and score the distance measurement in real packets to distinguish whether it is a normal packet or an abnormal packet. When the packet was learned in the LSTM model, two-gram and sliding window of N-gram showed the best performance in terms of errors and the performance of the LSTM model was the highest compared with other data mining regression techniques. Finally, cosine similarity was used as a scoring function, and anomaly detection was performed by setting a boundary for cosine similarity that consider as normal packet.-
dc.description.sponsorshipThis research was supported by the MIST(Ministry of Science and ICT), Korea, under the National Program for Excellence in SW supervised by the IITP(Institute for Information AND communications Technology Planning AND Evaluation) (2015-0-00908)-
dc.description.sponsorshipThis research was supported by the MIST(Ministry of Science and ICT), Korea, under the National Program for Excellence in SW supervised by the IITP(Institute for Information & communications Technology Planning & Evaluation) (2015-0-00908), and supported by Korea Electric Power Corporation. [Grant number: 18A-013]-
dc.language.isoeng-
dc.publisherInstitute of Electrical and Electronics Engineers Inc.-
dc.subject.meshAnomaly detection methods-
dc.subject.meshCosine similarity-
dc.subject.meshN-grams-
dc.subject.meshNetwork intrusion detection-
dc.subject.meshPrediction model-
dc.subject.meshRegression techniques-
dc.subject.meshScoring functions-
dc.subject.meshSliding Window-
dc.titleRNN-based Prediction for Network Intrusion Detection-
dc.typeConference-
dc.citation.conferenceDate2020.2.19. ~ 2020.2.21.-
dc.citation.conferenceName2nd International Conference on Artificial Intelligence in Information and Communication, ICAIIC 2020-
dc.citation.edition2020 International Conference on Artificial Intelligence in Information and Communication, ICAIIC 2020-
dc.citation.endPage574-
dc.citation.startPage572-
dc.citation.title2020 International Conference on Artificial Intelligence in Information and Communication, ICAIIC 2020-
dc.identifier.bibliographicCitation2020 International Conference on Artificial Intelligence in Information and Communication, ICAIIC 2020, pp.572-574-
dc.identifier.doi10.1109/icaiic48513.2020.9065249-
dc.identifier.scopusid2-s2.0-85084057762-
dc.identifier.urlhttp://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=9046688-
dc.subject.keywordcosine similarity-
dc.subject.keywordIDS-
dc.subject.keywordIntrusion detection-
dc.subject.keywordLSTM-
dc.subject.keywordn-gram-
dc.subject.keywordRNN-
dc.type.otherConference Paper-
dc.description.isoafalse-
dc.subject.subareaInformation Systems and Management-
dc.subject.subareaArtificial Intelligence-
dc.subject.subareaComputer Networks and Communications-
dc.subject.subareaComputer Vision and Pattern Recognition-
dc.subject.subareaInformation Systems-
dc.subject.subareaSignal Processing-
Show simple item record

Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Choi, Youngjune Image
Choi, Youngjune최영준
Department of Software and Computer Engineering
Read More

Total Views & Downloads

File Download

  • There are no files associated with this item.