DETECTION OF NETWORK ANOMALIES WITH NEURAL NETWORKS ALGORITHMS

H. I. Haidur
{"title":"DETECTION OF NETWORK ANOMALIES WITH NEURAL NETWORKS ALGORITHMS","authors":"H. I. Haidur","doi":"10.31673/2412-4338.2023.016173","DOIUrl":null,"url":null,"abstract":"The rapid digitalization of the world has led to various attacks on computer systems and networks, so network security is an extremely important and relevant component of information security today. Creating effective cybersecurity tools and mechanisms is becoming increasingly difficult as the number of different devices and services grows. Identification of malicious traffic using deep learning methods has become a key component of intrusion detection systems (IDS). This article compares two deep learning models (recurrent neural network and convolutional neural network) for detecting anomalies in networks. Both neural networks were found to be useful in a wide range of applications. It has been shown that convolutional neural networks are best at detecting network anomalies in synergy with layers of long short-term memory. The development of deep learning technologies, including the considered neural network algorithms, is a promising direction in promoting the development of cybersecurity of information systems. These technologies are unique because they are at the initial stage of creation. The aforementioned technologies are currently not widespread in intrusion detection and network anomaly detection systems due to their novelty, so they require more thorough research. Conventional machine learning algorithms will eventually become insufficient, as they do not have such a good learning capability as deep learning neural networks do. The article provides a detailed analysis of the capabilities of recurrent and convolutional neural networks along with long short-term memory layers, which may be useful for use in further research.","PeriodicalId":494506,"journal":{"name":"Telekomunìkacìjnì ta ìnformacìjnì tehnologìï","volume":"23 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Telekomunìkacìjnì ta ìnformacìjnì tehnologìï","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.31673/2412-4338.2023.016173","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

The rapid digitalization of the world has led to various attacks on computer systems and networks, so network security is an extremely important and relevant component of information security today. Creating effective cybersecurity tools and mechanisms is becoming increasingly difficult as the number of different devices and services grows. Identification of malicious traffic using deep learning methods has become a key component of intrusion detection systems (IDS). This article compares two deep learning models (recurrent neural network and convolutional neural network) for detecting anomalies in networks. Both neural networks were found to be useful in a wide range of applications. It has been shown that convolutional neural networks are best at detecting network anomalies in synergy with layers of long short-term memory. The development of deep learning technologies, including the considered neural network algorithms, is a promising direction in promoting the development of cybersecurity of information systems. These technologies are unique because they are at the initial stage of creation. The aforementioned technologies are currently not widespread in intrusion detection and network anomaly detection systems due to their novelty, so they require more thorough research. Conventional machine learning algorithms will eventually become insufficient, as they do not have such a good learning capability as deep learning neural networks do. The article provides a detailed analysis of the capabilities of recurrent and convolutional neural networks along with long short-term memory layers, which may be useful for use in further research.
用神经网络算法检测网络异常
世界的快速数字化导致了对计算机系统和网络的各种攻击,因此网络安全是当今信息安全中极其重要和相关的组成部分。随着不同设备和服务数量的增加,创建有效的网络安全工具和机制变得越来越困难。利用深度学习方法识别恶意流量已成为入侵检测系统(IDS)的关键组成部分。本文比较了用于网络异常检测的两种深度学习模型(循环神经网络和卷积神经网络)。人们发现这两种神经网络在广泛的应用中都很有用。研究表明,卷积神经网络最擅长与长短期记忆层协同检测网络异常。深度学习技术的发展,包括所考虑的神经网络算法,是促进信息系统网络安全发展的一个有前途的方向。这些技术是独一无二的,因为它们处于创造的初始阶段。上述技术由于其新颖性,目前在入侵检测和网络异常检测系统中还没有得到广泛应用,需要进行更深入的研究。传统的机器学习算法最终会变得不足,因为它们没有深度学习神经网络那么好的学习能力。本文对循环和卷积神经网络以及长短期记忆层的能力进行了详细的分析,这可能对进一步的研究有用。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信