Pakistan Science Abstracts
Article details & metrics
No Detail Found!!
A Constructive Model for Cyber-Attack Prediction Using Efficient Weighted Bi-Directional Learning Approaches
Author(s):
1. Bondili Sri Harsha Sai Singh: Department of Computer Science and Engineering, Koneru Lakshmaiah Education Foundation, Vaddesswaram, Guntur, Andhra Pradesh,India.
2. Mohammed Fathima: Department of Computer Science and Engineering, Koneru Lakshmaiah Education Foundation, Vaddesswaram, Guntur, Andhra Pradesh, India.
3. Thota Teja Mahesh: Department of Computer Science and Engineering, Koneru Lakshmaiah Education Foundation, Vaddesswaram, Guntur, Andhra Pradesh,India.
4. Mohammad Sameer: Department of Computer Science and Engineering, Koneru Lakshmaiah Education Foundation, Vaddesswaram, Guntur, Andhra Pradesh,India.
5. Dinesh Kumar Anguraj: Department of Computer Science and Engineering, Koneru Lakshmaiah Education Foundation, Vaddesswaram, Guntur, Andhra Pradesh,India.
6. Padmanaban Kuppan: Department of Computer Science and Engineering, Koneru Lakshmaiah Education Foundation, Vaddesswaram, Guntur, Andhra Pradesh,India.
Abstract:
Anomaly detection algorithms based on machine and deep learning are currently the most promising techniques for identifying cyber-attacks. However, hostile attacks lower forecast accuracy which is made against these techniques. The resilience of anomaly detection has been measured using a variety of methods in the literature. They neglect to consider the fact that a little disruption in an anomalous sample caused by an assault like a denial of service might cause it to become a genuinely normal sample, but a huge perturbation can transform an anomalous sample into a truly normal sample without affecting the whole system. Even so, it can lead to it being wrongly classified as normal. The approach for determining an anomaly detection model's resilience in industrial contexts is presented in this work. To detect abnormalities brought on by various cyber-attacks; this work used the method of a Support Vector Machine (SVM) for feature extraction and weight analysis. In this case, a unique deep learning-based Bi-LSTM (Bi-directional Long Short Term Memory) only requires a disruption of 60% with 99.6% accuracy of the original sample to create adversarial samples as opposed to the model, which requires a disruption of the entire original sample.
Page(s): 100-116
DOI: DOI not available
Published: Journal: International Journal of Communication Networks and Information Security, Volume: 16, Issue: 1, Year: 2024
Keywords:
Anomaly , deep learning , Prediction , Feature Representation , cyberattack
References:
[1] Tan L.,Pan Y.,Wu J.,Zhou J.,Jiang H.,Deng Y. .2020 .A new framework for DDoS attack detection and defense in SDN environment. ” IEEE Access, 8 : 161908-161919.
[2] Ye J.,Zhu L.,Feng L. .2018 .A DDoS attack detection method based on SVM in software defined network,” Security and Communication Networks. , : .
[3] Perez-Diaz J. A.,Valdovinos I. A.,K. K. R. Choo D.,Zhu D. .2020 .A flexible SDN-based architecture for identifying and mitigating low-rate DDoS attacks using machine learning. ” IEEE Access, 8 : 155859-155872.
[4] Habibi O.,Chemmakha M.,Lazaar M. .2023 .Imbalanced tabular data modelization using CTGAN and machine learning to improve IoT Botnet attacks detection. ” Engineering Applications of Artificial Intelligence, 118 : 105669.
[5] Ilango H. S.,Su R. .2022 .A feedforward-convolutional neural network to detect low-rate dos in IoT. Engineering Applications of Artificial Intelligence, 114 : 105059.
[6] Rao K. N.,Rao K. V.,P. R. PVGD K. V. .2021 .A hybrid intrusion detection system based on sparse autoencoder and deep neural network,” Computer Communications. , 180 : 77-88.
[7] Nguyen H. T.,Ngo Q. D.,Nguyen D. H.,Le V. H. .2020 .PSI-rooted subgraph: A novel feature for IoT botnet detection using classifier algorithms. ” ICT Express, 6(2) : 128-138.
[8] Meidan Y.,Bohadana M.,Mathov Y.,Mirsky Y.,Shabtai A.,Breitenbacher D.,Elovici Y. .2018 .N-baiotnetwork-based detection of IoT botnet attacks using deep autoencoders,” IEEE Pervasive Computing. , 17(3) : 12-22.
[9] Al Shorman A.,Faris H.,and I. Aljarah H. .2020 .Unsupervised intelligent system based on one class support vector machine and grey wolf optimization for IoT botnet detection. ” Journal of Ambient Intelligence and Humanized Computing, 11(7) : 2809-2825.
[10] Saba T.,Rehman A.,Sadad T.,Kolivand H.,Bahaj S. A. .2022 .Anomaly-based intrusion detection system for IoT networks through deep learning model,” Computers and Electrical Engineering. , 99 : 107810.
[11] Elsayed M. S.,Le-Khac N. A.,Dev S.,Jurcut A. D. .2020 .Ddosnet: A deep-learning model for detecting network attacks,” in 2020 IEEE 21st International Symposium on "A World of Wireless, Mobile and Multimedia Networks" (WoWMoM). Aug, : 391-396.
[12] Sahoo K. S.,Tripathy B. K.,Naik K.,Ramasubbareddy S.,Balusamy B.,Khari M.,Burgos D. .2020 .An evolutionary SVM model for DDOS attack detection in software defined networks. ” IEEE Access, 8 : 132502-132513.
[13] Ahmed A. A.,Jabbar W. A.,Sadiq A. S.,Patel H. .2022 .Deep learning-based classification model for botnet attack detection. ” Journal of Ambient Intelligence and Humanized Computing, 13(7) : 3457-3466.
[14] G. D. L. T. Parra P.,Rad P.,K. K. R. Choo N.,Beebe N. .2020 .Detecting Internet of Things attacks using distributed deep learning. ” Journal of Network and Computer Applications, 163 : 102662.
[15] Su T.,Sun H.,Zhu J.,Wang S.,Li Y. .2020 .Deep learning methods on network intrusion detection using NSL-KDD dataset. ” IEEE Access, 8 : 29575-29585.
[16] Gamage S.,Samarabandu J. .2020 .Deep learning methods in network intrusion detection: A survey and an objective comparison. ” Journal of Network and Computer Applications, 169 : 102767.
[17] Robberts C.,Toft J. .2019 .Finding vulnerabilities in IoT devices: Ethical hacking of electronic locks,” School of Electrical Engineering. , : .
[18] Aldweesh A.,Derhab A.,Emam A. Z. .2020 .Deep learning approaches for anomaly-based intrusion detection systems: A survey, taxonomy, and open issues,” Knowledge-Based Systems. , 189 : 105124.
[19] Ferrag M. A.,Maglaras L.,Moschoyiannis S.,Janicke H. .2020 .Deep learning for cyber security intrusion detection: Approaches, datasets. ” Journal of Information Security and Applications, 50 : 102419.
[20] Ge M.,Fu X.,Syed N.,Baig Z.,G. Z.,Robles-Kelly A. .2019 .Deep learning-based intrusion detection for IoT networks,” in 2019 IEEE 24th pacific rim international symposium on dependable computing (PRDC). , : 256-25609.
[21] M. M. Hassan A.,Gumaei A.,Alsanad M.,Alrubaian M. .2020 .A hybrid deep learning model for efficient intrusion detection in big data environment,”. Information Sciences, 513 : 386-396.
[22] Li D.,Deng L.,Lee M.,Wang H. .2019 .IoT data feature extraction and intrusion detection system for smart cities based on deep migration learning. International journal of information management, 49 : 533-545.
[23] Yin C.,Zhang S.,Wang J.,Xiong N. N. . .Anomaly detection based on convolutional recurrent autoencoder for IoT time series. ” IEEE Transactions on Systems, Man, and Cybernetics: Systems, 52(1) : 112-122.
[24] Wang B.,Su Y.,Zhang M.,Nie J. .2020 .A deep hierarchical network for packet-level malicious traffic detection. ” IEEE Access, 8 : 201728-201740.
[25] Yang H.,Wang F. .2019 .Wireless network intrusion detection based on improved convolutional neural network,” IEEE Access. , 7 : 64366-64374.
[26] Otoum Y.,Liu D.,Nayak A. .2022 .DL-IDS: A deep learning-based intrusion detection framework for securing IoT,” Transactions on Emerging Telecommunications Technologies. , 33(3) : e3803.
[27] Li Y.,Xu Y.,Liu Z.,Hou H.,Zheng Y.,Xin Y.,Zhao Y.,Cui L. .2020 .Robust detection for network intrusion of industrial IoT based on multi-CNN fusion. , 154 : 107450.
[28] Kunang Y. N.,Nurmaini S.,Stiawan D.,Suprapto B. Y. .2021 .Attack classification of an intrusion detection system using deep learning and hyperparameter optimization. ” Journal of Information Security and Applications, 58 : 102804.
[29] Sherubha P.,Sasirekha S. P.,Manikandan V.,Gowsic K.,Mohanasundaram N. .2020 .Graph based event measurement for analyzing distributed anomalies in sensor networks. ” Sādhanā, 45 : 1-5.
[30] Sherubha P.,Mohanasundaram N. .2019 .An efficient network threat detection and classification method using ANP-MVPS algorithm in wireless sensor networks. International Journal of Innovative Technology and Exploring Engineering, 8(11) : 1597-1606.
[31] Sherubha P.,Mohanasundaram N. .2019 .An efficient intrusion detection and authentication mechanism for detecting clone attack in wireless sensor networks. ” J Adv Res Dyn Control Syst, 11(5) : 55-68.
[32] Gamage S.,Samarabandu J. .2020 .Deep learning methods in network intrusion detection: A survey and an objective comparison. ” Journal of Network and Computer Applications, 169 : 102767.
[33] Rieth C. A.,Amsel B. D.,Tran R.,M. B. Cook R. .2018 .Issues and advances in anomaly detection evaluation for joint human-automated systems. Advances in Human Factors in Robots and Unmanned Systems: Proceedings of the AHFE 2017 International Conference on Human Factors in Robots and Unmanned Systems, July 17− 21, : 52-63.
[34] Men J.,Lv Z.,Zhou X.,Han Z.,Xian H.,Song Y. N. .2020 .Machine learning methods for industrial protocol security analysis: Issues, taxonomy. ” IEEE Access, 8 : 83842-83857.
[35] Weng T. W.,Zhang H.,Yi J.,Su D.,Gao Y.,Hsieh C. J. .1801 .Evaluating the robustness of neural networks: An extreme value theory approach. , 10578 : .
Citations
Citations are not available for this document.
0

Citations

0

Downloads

6

Views