Citation Export
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Park, Shin Hyuk | - |
dc.contributor.author | Park, Hyun Jae | - |
dc.contributor.author | Choi, Young June (researcherId=7406117220; isni=0000000405323933; orcid=https://orcid.org/0000-0003-2014-6587) | - |
dc.date.issued | 2020-02-01 | - |
dc.identifier.uri | https://aurora.ajou.ac.kr/handle/2018.oak/36567 | - |
dc.identifier.uri | https://www.scopus.com/inward/record.uri?partnerID=HzOxMe3b&scp=85084057762&origin=inward | - |
dc.description.abstract | We investigate a prediction model using RNN for network intrusion detection in industrial IoT environments. For intrusion detection, we use anomaly detection methods that estimate the next packet, measure and score the distance measurement in real packets to distinguish whether it is a normal packet or an abnormal packet. When the packet was learned in the LSTM model, two-gram and sliding window of N-gram showed the best performance in terms of errors and the performance of the LSTM model was the highest compared with other data mining regression techniques. Finally, cosine similarity was used as a scoring function, and anomaly detection was performed by setting a boundary for cosine similarity that consider as normal packet. | - |
dc.description.sponsorship | This research was supported by the MIST(Ministry of Science and ICT), Korea, under the National Program for Excellence in SW supervised by the IITP(Institute for Information AND communications Technology Planning AND Evaluation) (2015-0-00908) | - |
dc.description.sponsorship | This research was supported by the MIST(Ministry of Science and ICT), Korea, under the National Program for Excellence in SW supervised by the IITP(Institute for Information & communications Technology Planning & Evaluation) (2015-0-00908), and supported by Korea Electric Power Corporation. [Grant number: 18A-013] | - |
dc.language.iso | eng | - |
dc.publisher | Institute of Electrical and Electronics Engineers Inc. | - |
dc.subject.mesh | Anomaly detection methods | - |
dc.subject.mesh | Cosine similarity | - |
dc.subject.mesh | N-grams | - |
dc.subject.mesh | Network intrusion detection | - |
dc.subject.mesh | Prediction model | - |
dc.subject.mesh | Regression techniques | - |
dc.subject.mesh | Scoring functions | - |
dc.subject.mesh | Sliding Window | - |
dc.title | RNN-based Prediction for Network Intrusion Detection | - |
dc.type | Conference | - |
dc.citation.conferenceDate | 2020.2.19. ~ 2020.2.21. | - |
dc.citation.conferenceName | 2nd International Conference on Artificial Intelligence in Information and Communication, ICAIIC 2020 | - |
dc.citation.edition | 2020 International Conference on Artificial Intelligence in Information and Communication, ICAIIC 2020 | - |
dc.citation.endPage | 574 | - |
dc.citation.startPage | 572 | - |
dc.citation.title | 2020 International Conference on Artificial Intelligence in Information and Communication, ICAIIC 2020 | - |
dc.identifier.bibliographicCitation | 2020 International Conference on Artificial Intelligence in Information and Communication, ICAIIC 2020, pp.572-574 | - |
dc.identifier.doi | 10.1109/icaiic48513.2020.9065249 | - |
dc.identifier.scopusid | 2-s2.0-85084057762 | - |
dc.identifier.url | http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=9046688 | - |
dc.subject.keyword | cosine similarity | - |
dc.subject.keyword | IDS | - |
dc.subject.keyword | Intrusion detection | - |
dc.subject.keyword | LSTM | - |
dc.subject.keyword | n-gram | - |
dc.subject.keyword | RNN | - |
dc.type.other | Conference Paper | - |
dc.description.isoa | false | - |
dc.subject.subarea | Information Systems and Management | - |
dc.subject.subarea | Artificial Intelligence | - |
dc.subject.subarea | Computer Networks and Communications | - |
dc.subject.subarea | Computer Vision and Pattern Recognition | - |
dc.subject.subarea | Information Systems | - |
dc.subject.subarea | Signal Processing | - |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.