使用深度学习方法的网络安全入侵检测,数据集,机器人-物联网数据集

Iram Manan, Faisal Rehman, Hana Sharif, C. Ali, Rana Rashid Ali, Amiad Liaqat
{"title":"使用深度学习方法的网络安全入侵检测,数据集,机器人-物联网数据集","authors":"Iram Manan, Faisal Rehman, Hana Sharif, C. Ali, Rana Rashid Ali, Amiad Liaqat","doi":"10.1109/ICACS55311.2023.10089688","DOIUrl":null,"url":null,"abstract":"Cyber Security is a crucial point of the current world; it is used to analyze, defend, and detect network intrusion systems. An intrusion detection system has been designed using Deep learning techniques, which helps the network user to detect malicious intentions. The dataset plays a crucial part in intrusion detection. As a result, we describe various well-known cyber datasets. Mainly we have analysed the IoT traffic-based dataset with some other datasets. We have also analyzed deep learning DL models, including Feed forward deep neural network (FDNN), deep auto-encoder, De-noising auto-encoder, deep migration, stacked de-noising auto-encoders, Replicator Neural networks, and Self-Taught Learning. We observe the effectiveness of models individually in two different types (multiclass and binary) through real-world traffic datasets, such as Bot-IoT dataset. Moreover, we evaluate the effectiveness of various methods based on the most critical key performance indicators, namely correctness, rate of false alarms and detection rate.","PeriodicalId":357522,"journal":{"name":"2023 4th International Conference on Advancements in Computational Sciences (ICACS)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-02-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Cyber Security Intrusion Detection Using Deep Learning Approaches, Datasets, Bot-IOT Dataset\",\"authors\":\"Iram Manan, Faisal Rehman, Hana Sharif, C. Ali, Rana Rashid Ali, Amiad Liaqat\",\"doi\":\"10.1109/ICACS55311.2023.10089688\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Cyber Security is a crucial point of the current world; it is used to analyze, defend, and detect network intrusion systems. An intrusion detection system has been designed using Deep learning techniques, which helps the network user to detect malicious intentions. The dataset plays a crucial part in intrusion detection. As a result, we describe various well-known cyber datasets. Mainly we have analysed the IoT traffic-based dataset with some other datasets. We have also analyzed deep learning DL models, including Feed forward deep neural network (FDNN), deep auto-encoder, De-noising auto-encoder, deep migration, stacked de-noising auto-encoders, Replicator Neural networks, and Self-Taught Learning. We observe the effectiveness of models individually in two different types (multiclass and binary) through real-world traffic datasets, such as Bot-IoT dataset. Moreover, we evaluate the effectiveness of various methods based on the most critical key performance indicators, namely correctness, rate of false alarms and detection rate.\",\"PeriodicalId\":357522,\"journal\":{\"name\":\"2023 4th International Conference on Advancements in Computational Sciences (ICACS)\",\"volume\":\"2 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-02-20\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2023 4th International Conference on Advancements in Computational Sciences (ICACS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICACS55311.2023.10089688\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 4th International Conference on Advancements in Computational Sciences (ICACS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICACS55311.2023.10089688","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

网络安全是当今世界的一个关键点。它用于分析、防御和检测网络入侵系统。利用深度学习技术设计了一个入侵检测系统,帮助网络用户检测恶意意图。数据集在入侵检测中起着至关重要的作用。因此,我们描述了各种众所周知的网络数据集。我们主要分析了基于物联网流量的数据集和其他一些数据集。我们还分析了深度学习DL模型,包括前馈深度神经网络(FDNN)、深度自编码器、去噪自编码器、深度迁移、堆叠去噪自编码器、复制神经网络和自学。我们通过现实世界的交通数据集(如Bot-IoT数据集)分别观察了两种不同类型(多类和二元)模型的有效性。此外,我们基于最关键的关键性能指标,即正确率,虚警率和检出率来评估各种方法的有效性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Cyber Security Intrusion Detection Using Deep Learning Approaches, Datasets, Bot-IOT Dataset
Cyber Security is a crucial point of the current world; it is used to analyze, defend, and detect network intrusion systems. An intrusion detection system has been designed using Deep learning techniques, which helps the network user to detect malicious intentions. The dataset plays a crucial part in intrusion detection. As a result, we describe various well-known cyber datasets. Mainly we have analysed the IoT traffic-based dataset with some other datasets. We have also analyzed deep learning DL models, including Feed forward deep neural network (FDNN), deep auto-encoder, De-noising auto-encoder, deep migration, stacked de-noising auto-encoders, Replicator Neural networks, and Self-Taught Learning. We observe the effectiveness of models individually in two different types (multiclass and binary) through real-world traffic datasets, such as Bot-IoT dataset. Moreover, we evaluate the effectiveness of various methods based on the most critical key performance indicators, namely correctness, rate of false alarms and detection rate.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信