AI-Based Network Intrusion Detection with Hyperparameter Optimization on the Realistic CSE-CICIDS2018 Dataset Using Cloud Computing

فایل این در 8 صفحه با فرمت PDF قابل دریافت می باشد

  • من نویسنده این مقاله هستم

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این :

چکیده :

Artificial intelligence (AI) is one of the most prominent modern technologies that has revolutionized the world of technology. It enables machines to mimic human behavior and learn from the data around them, enabling them to make intelligent decisions and interact in ways that closely resemble human behavior. One of the most significant areas that has benefited from this tremendous development is information security, particularly in combating cyberattacks and detecting suspicious activities that could threaten computer systems and networks. Intrusion detection systems (IDS) are essential tools used in this context, as they monitor and analyze network traffic to identify any unauthorized attempts to access or manipulate data. With the ever-increasing sophistication of cyberattacks, the need to develop smarter and more adaptive methods has emerged. Hence, relying on AI has become an ideal solution for enhancing the performance of IDSs. AI doesn't just analyze data; it continually learns from it and improves its capabilities in detecting new threats that may not have been previously known. Among the AI techniques that have proven highly effective in this field are artificial neural networks (ANNs). These are designed to mimic the way the human brain analyzes information and makes decisions. They are capable of processing massive amounts of complex data and detecting hidden patterns that may indicate a cyberattack. A proposed intelligent system based on AI, specifically ANNs, was built to detect botnet attacks, a type of cyberattack considered one of the most dangerous threats, especially to the financial and banking sectors. A group of compromised devices operate in a coordinated and organized manner to launch cyberattacks that cause significant damage to targeted systems. The proposed system was trained using a recent, realistic security dataset known as CSE-CIC-IDS2018, which was created by the Canadian Institute of Cybersecurity in 2018 on the Amazon cloud computing platform. This dataset represents real-life scenarios of multiple cyberattacks. This system demonstrated high efficiency in detecting botnet attacks, achieving highly accurate results in classifying normal and malicious activities with near-perfect accuracy, along with a strong ability to distinguish between actual threats and false alarms, making it a highly reliable system. The system is also characterized by its flexibility and the ability to be implemented on an unlimited number of devices, making it suitable for use in various environments, whether traditional networks or cyber systems integrated into physical environments such as factories and power grids, or even in environments that require real-time monitoring and analysis of network traffic. Based on the above, it can be said that the proposed system represents a qualitative leap in the field of information security, combining the latest artificial intelligence technologies with real-world data, providing an integrated solution that is accurate, fast, and reliable in detecting complex cyber threats. This enhances organizations' ability to protect their data and infrastructure from the growing dangers of the online world.

نویسندگان

حسین السعید

Student of Computer Engineering from Hakim Sabzevari University

Faculty Member of Hakim Sabzevari University

مراجع و منابع این :

لیست زیر مراجع و منابع استفاده شده در این را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود لینک شده اند :
  • [1] Alex Shenfield, David Day, and Aladdin Ayesh, "Intelligent intrusion ...
  • [2] Iman Sharafaldin, ArashHabibiLashkari, and Ali A. Ghorbani, "Toward Generating ...
  • [3] D. Stiawan, A.H. Abdullah, and M.Y. Idris, "The trends ...
  • [4] Singh R., Kumar H., Singla R.K., and Ketti R.R. ...
  • [5] Liao H.-J., Lin C.-H.R., Lin Y.-C., and Tung K.-Y. “Intrusion ...
  • [6] Zhang G.P. “Neural networks for classification: A survey” IEEE Trans. ...
  • [7] Wu J., Peng D., Li Z., Zhao L., and Ling ...
  • [8] Rosenblatt F. “The perceptron: A probabilistic model for informationstorage and ...
  • [9] Gulshan Kumar. "The use of artificial intelligence based techniques for ...
  • [10] Antonia Nisioti, Alexios Mylonas, Paul D. Yoo, Vasilios Katos. "From ...
  • [11] Monowar H. Bhuyan, Dhruba K. Bhattacharyya, Jugal K. Kalita. "Network ...
  • [12] JChristina Ting, Richard Field, Andrew Fisher, Travis Bauer."Compression Analytics for ...
  • [13] Hyperparameters optimization XGBoost for network intrusion detection using CSE-CIC-IDS2018 dataset. ...
  • [14] Artificial Intelligence-based Network Intrusion Detection with hyper-parameter optimization tuning on ...
  • [15] A Scheme for Efficient Network Intrusion Detection Based on Three-Phase ...
  • [16] HCRNNIDS: Hybrid Clustered ResNet and RNN-Based Network Intrusion Detection System. ...
  • [17] A novel hybrid intrusion detection method integrating anomaly detection with ...
  • [18] A Comparison of Ensemble Learning in Intrusion Detection System. Journal ...
  • [19] Optimizing Intrusion Detection System Performance Through Synergistic Hyperparameter Tuning and ...
  • [20] Bayesian Hyperparameter Optimization for Deep Neural Network-Based Network Intrusion Detection. ...
  • [21] Hyper Parameter Optimization Technique for Network Intrusion Detection System Using ...
  • [22] License: http://www.unb.ca/cic/datasets/ids-2018.html [Acessed:14SEP-2018] ...
  • نمایش کامل مراجع