A Double-Layer Indemnity Enhancement Using LSTM and HASH Function Technique for Intrusion Detection System

نویسندگان

چکیده

The Intrusion Detection System (IDS) is the most widely used network security mechanism for distinguishing between normal and malicious traffic activities. It aids in that it may identify unforeseen hazards traffic. Several techniques have been put forth by different researchers intrusion detection. However, because attacks increased dramatically, making difficult to execute precise detection rates quickly, demand effectively recognizing incursion growing. This research proposed an improved solution uses Long Short-Term Memory (LSTM) hash functions construct a revolutionary double-layer IoT Network Detection. presented framework utilizes standard well-known real-time IDS datasets such as KDDCUP99 UNSWNB-15. In framework, dataset was pre-processed, employed Shuffle Shepherd Optimization (SSO) algorithm tracking informative attributes from filtered database. Further, designed model LSTM classifying precisely. Finally, secure function SHA3-256 utilized countering attacks. intensive experimental assessment of approach with conventional algorithms emphasized efficiency terms accuracy, precision, recall, etc. analysis showed attained attack prediction accuracy 99.92% 99.91% UNSWNB-15, respectively.

منابع مشابه

Intrusion Detection System Using Data Mining Technique

This paper analysis and criticizes the way of using, functioning the intrusion detection system in data mining. Understanding the techniques. data mining approach such as intrusion detection system using association datasets where as in event correlation data mining method we will maintain. traffic analysis and anomaly intrusion detection systems are needed. log data by using a knowledge discov...

متن کامل

A cross-layer based intrusion detection technique for wireless networks

In this paper, we propose to design a cross-layer based intrusion detection technique for wireless networks. In this technique a combined weight value is computed from the Received Signal Strength (RSS) and Time Taken for RTS-CTS handshake between sender and receiver (TT). Since it is not possible for an attacker to assume the RSS exactly for a sender by a receiver, it is an useful measure for ...

متن کامل

Intrusion Detection in IOT based Networks Using Double Discriminant Analysis

Intrusion detection is one of the main challenges in wireless systems especially in Internet of things (IOT) based networks. There are various attack types such as probe, denial of service, remote to local and user to root. In addition to known attacks and malicious behaviors, there are various unknown attacks that some of them have similar behavior with respect to each other or mimic the norma...

متن کامل

A Real-Time Intrusion Detection System using Data Mining Technique

Presently, most computers authenticate user ID and password before users can login these systems. However, danger soon comes if the two items are known to hackers. In this paper, we propose a system, named Intrusion Detection and Identification System (IDIS), which builds a profile for each user in an intranet to keep track his/her usage habits as forensic features with which IDIS can identify ...

متن کامل

Performance Enhancement of Intrusion Detection using Neuro - Fuzzy Intelligent System

This research work aims at developing hybrid algorithms using data mining techniques for the effective enhancement of anomaly intrusion detection performance. Many proposed algorithms have not addressed their reliability with varying amount of malicious activity or their adaptability for real time use. The study incorporates a theoretical basis for improvement in performance of IDS using K-medo...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Mathematics

سال: 2023

ISSN: ['2227-7390']

DOI: https://doi.org/10.3390/math11183894