Detailed Information

Cited 91 time in webofscience Cited 150 time in scopus
Metadata Downloads

A Scalable and Hybrid Intrusion Detection System Based on the Convolutional-LSTM Network

Full metadata record
DC Field Value Language
dc.contributor.authorKhan, Muhammad Ashfaq-
dc.contributor.authorKarim, Md. Rezaul-
dc.contributor.authorKim, Yangwoo-
dc.date.accessioned2024-08-08T03:30:39Z-
dc.date.available2024-08-08T03:30:39Z-
dc.date.issued2019-04-
dc.identifier.issn2073-8994-
dc.identifier.issn2073-8994-
dc.identifier.urihttps://scholarworks.dongguk.edu/handle/sw.dongguk/16925-
dc.description.abstractWith the rapid advancements of ubiquitous information and communication technologies, a large number of trustworthy online systems and services have been deployed. However, cybersecurity threats are still mounting. An intrusion detection (ID) system can play a significant role in detecting such security threats. Thus, developing an intelligent and accurate ID system is a non-trivial research problem. Existing ID systems that are typically used in traditional network intrusion detection system often fail and cannot detect many known and new security threats, largely because those approaches are based on classical machine learning methods that provide less focus on accurate feature selection and classification. Consequently, many known signatures from the attack traffic remain unidentifiable and become latent. Furthermore, since a massive network infrastructure can produce large-scale data, these approaches often fail to handle them flexibly, hence are not scalable. To address these issues and improve the accuracy and scalability, we propose a scalable and hybrid IDS, which is based on Spark ML and the convolutional-LSTM (Conv-LSTM) network. This IDS is a two-stage ID system: the first stage employs the anomaly detection module, which is based on Spark ML. The second stage acts as a misuse detection module, which is based on the Conv-LSTM network, such that both global and local latent threat signatures can be addressed. Evaluations of several baseline models in the ISCX-UNB dataset show that our hybrid IDS can identify network misuses accurately in 97.29% of cases and outperforms state-of-the-art approaches during 10-fold cross-validation tests.-
dc.language영어-
dc.language.isoENG-
dc.publisherMDPI-
dc.titleA Scalable and Hybrid Intrusion Detection System Based on the Convolutional-LSTM Network-
dc.typeArticle-
dc.publisher.location스위스-
dc.identifier.doi10.3390/sym11040583-
dc.identifier.scopusid2-s2.0-85065494532-
dc.identifier.wosid000467314400142-
dc.identifier.bibliographicCitationSYMMETRY-BASEL, v.11, no.4-
dc.citation.titleSYMMETRY-BASEL-
dc.citation.volume11-
dc.citation.number4-
dc.type.docTypeArticle-
dc.description.isOpenAccessY-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
dc.relation.journalResearchAreaScience & Technology - Other Topics-
dc.relation.journalWebOfScienceCategoryMultidisciplinary Sciences-
dc.subject.keywordPlusANOMALY DETECTION-
dc.subject.keywordPlusMODEL-
dc.subject.keywordAuthorintrusion detection system-
dc.subject.keywordAuthordeep learning-
dc.subject.keywordAuthorSpark ML-
dc.subject.keywordAuthorCNN-
dc.subject.keywordAuthorLSTM-
dc.subject.keywordAuthorConv-LSTM-
Files in This Item
There are no files associated with this item.
Appears in
Collections
College of Engineering > Department of Information and Communication Engineering > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Kim, Yang Woo photo

Kim, Yang Woo
College of Engineering (Department of Information and Communication Engineering)
Read more

Altmetrics

Total Views & Downloads

BROWSE