Cited 150 time in
A Scalable and Hybrid Intrusion Detection System Based on the Convolutional-LSTM Network
| DC Field | Value | Language |
|---|---|---|
| dc.contributor.author | Khan, Muhammad Ashfaq | - |
| dc.contributor.author | Karim, Md. Rezaul | - |
| dc.contributor.author | Kim, Yangwoo | - |
| dc.date.accessioned | 2024-08-08T03:30:39Z | - |
| dc.date.available | 2024-08-08T03:30:39Z | - |
| dc.date.issued | 2019-04 | - |
| dc.identifier.issn | 2073-8994 | - |
| dc.identifier.issn | 2073-8994 | - |
| dc.identifier.uri | https://scholarworks.dongguk.edu/handle/sw.dongguk/16925 | - |
| dc.description.abstract | With the rapid advancements of ubiquitous information and communication technologies, a large number of trustworthy online systems and services have been deployed. However, cybersecurity threats are still mounting. An intrusion detection (ID) system can play a significant role in detecting such security threats. Thus, developing an intelligent and accurate ID system is a non-trivial research problem. Existing ID systems that are typically used in traditional network intrusion detection system often fail and cannot detect many known and new security threats, largely because those approaches are based on classical machine learning methods that provide less focus on accurate feature selection and classification. Consequently, many known signatures from the attack traffic remain unidentifiable and become latent. Furthermore, since a massive network infrastructure can produce large-scale data, these approaches often fail to handle them flexibly, hence are not scalable. To address these issues and improve the accuracy and scalability, we propose a scalable and hybrid IDS, which is based on Spark ML and the convolutional-LSTM (Conv-LSTM) network. This IDS is a two-stage ID system: the first stage employs the anomaly detection module, which is based on Spark ML. The second stage acts as a misuse detection module, which is based on the Conv-LSTM network, such that both global and local latent threat signatures can be addressed. Evaluations of several baseline models in the ISCX-UNB dataset show that our hybrid IDS can identify network misuses accurately in 97.29% of cases and outperforms state-of-the-art approaches during 10-fold cross-validation tests. | - |
| dc.language | 영어 | - |
| dc.language.iso | ENG | - |
| dc.publisher | MDPI | - |
| dc.title | A Scalable and Hybrid Intrusion Detection System Based on the Convolutional-LSTM Network | - |
| dc.type | Article | - |
| dc.publisher.location | 스위스 | - |
| dc.identifier.doi | 10.3390/sym11040583 | - |
| dc.identifier.scopusid | 2-s2.0-85065494532 | - |
| dc.identifier.wosid | 000467314400142 | - |
| dc.identifier.bibliographicCitation | SYMMETRY-BASEL, v.11, no.4 | - |
| dc.citation.title | SYMMETRY-BASEL | - |
| dc.citation.volume | 11 | - |
| dc.citation.number | 4 | - |
| dc.type.docType | Article | - |
| dc.description.isOpenAccess | Y | - |
| dc.description.journalRegisteredClass | scie | - |
| dc.description.journalRegisteredClass | scopus | - |
| dc.relation.journalResearchArea | Science & Technology - Other Topics | - |
| dc.relation.journalWebOfScienceCategory | Multidisciplinary Sciences | - |
| dc.subject.keywordPlus | ANOMALY DETECTION | - |
| dc.subject.keywordPlus | MODEL | - |
| dc.subject.keywordAuthor | intrusion detection system | - |
| dc.subject.keywordAuthor | deep learning | - |
| dc.subject.keywordAuthor | Spark ML | - |
| dc.subject.keywordAuthor | CNN | - |
| dc.subject.keywordAuthor | LSTM | - |
| dc.subject.keywordAuthor | Conv-LSTM | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
30, Pildong-ro 1-gil, Jung-gu, Seoul, 04620, Republic of Korea+82-2-2260-3114
Copyright(c) 2023 DONGGUK UNIVERSITY. ALL RIGHTS RESERVED.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.
