Development of PCCNN-Based Network Intrusion Detection System for EDGE Computing

نویسندگان

چکیده

Intrusion Detection System (IDS) plays a crucial role in detecting and identifying the DoS DDoS type of attacks on IoT devices. However, anomaly-based techniques do not provide acceptable accuracy for efficacious intrusion detection. Also, we found many difficulty levels when applying IDS to devices attempted attacks. Given this background, designed solution detect intrusions using Convolutional Neural Network (CNN) Enhanced Data rates GSM Evolution (EDGE) Computing. We created two separate categories handle attack non-attack events system. The findings study indicate that approach was significantly effective. both multiclass binary classification. In case binary, clustered all malicious traffic data single class. developed 13 layers Sequential 1-D CNN detection assessed them public dataset NSL-KDD. Principal Component Analysis (PCA) implemented decrease size feature vector based extraction engineering. proposed current investigation obtained accuracies 99.34% 99.13% classification, respectively, NSL-KDD dataset. experimental outcomes showed Component-based Convolution (PCCNN) achieved greater precision deep learning has potential use modern systems.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Assessment Methodology for Anomaly-Based Intrusion Detection in Cloud Computing

Cloud computing has become an attractive target for attackers as the mainstream technologies in the cloud, such as the virtualization and multitenancy, permit multiple users to utilize the same physical resource, thereby posing the so-called problem of internal facing security. Moreover, the traditional network-based intrusion detection systems (IDSs) are ineffective to be deployed in the cloud...

متن کامل

Cloud Computing for Network Security Intrusion Detection System

In recent years, as a new distributed computing model, cloud computing has developed rapidly and become the focus of academia and industry. But now the security issue of cloud computing is a main critical problem of most enterprise customers faced. In the current network environment, that relying on a single terminal to check the Trojan virus is considered increasingly unreliable. This paper an...

متن کامل

Trusted Computing Based Collaborative Intrusion Detection System

Collaboration and information sharing has obliged participating parties to look for improved detection accuracy and reaction speed in Distributed Intrusion Detection Systems (DIDS) solutions. This is mainly due to the increasing number of attacks as well as increasingly sophisticated intrusions and more alarmingly various critical components of a system can be targeted. This is further exaspera...

متن کامل

Soft Computing Based Intrusion Detection System

-Intrusion Detection System is used to detect the unwanted activities over the network and to design IDS soft computing techniques are used. This paper describes the role of Artificial Neural Network, Fuzzy Logic and Genetic Algorithm in Intrusion Detection System. The artificial neural network learning algorithms, data retrieval using fuzzy logic under uncertainty and power of Genetic algorith...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Computers, materials & continua

سال: 2022

ISSN: ['1546-2218', '1546-2226']

DOI: https://doi.org/10.32604/cmc.2022.018708