Please use this identifier to cite or link to this item:
http://irepo.futminna.edu.ng:8080/jspui/handle/123456789/29905| Title: | A NOVEL DEEP BELIEF-BASED MODEL FOR THE INTRUSION DETECTION OF NETWORK TRAFFIC |
| Authors: | Sule, Aishat A. Alhassan, John K. Ismaila, I. Alabi, I. O. Subairu, S. O. |
| Keywords: | Intrusion Detection Attacks Deep Learning Deep Belief Dataset |
| Issue Date: | 15-Aug-2024 |
| Publisher: | SmartEco, Nigeria Computer Society (NCS) |
| Citation: | Sule Aishat, John Alhassan, Ismaila Idris, Alabi, I. O, and Subairu, S. O. (2024). A novel deep believe-based model for the intrusion detection of network traffic. Order of proceedings SmartEco, pp 107 – 115: Port Harcourt, Nigeria. |
| Abstract: | The fast expansion of networked systems,combined with the pervasive reliance on the internet, has raised worries about network security, needing new defense methods.Intrusion Detection Systems (IDS) use a variety of ways to distinguish between legitimateand malicious network traffic, including rule-based,signature-based, anomaly detection, and machine learning approaches. While signature-based IDS excel at detecting known threats,they struggle with novel attacks, prompting the development of anomaly-based IDS and machine learning methods such as Random Forest and Logistic Regression, among others.However, these techniques have scalability and computational complexity challenges.Cybersecurity remains a significant concern for organizations due to continual cyber-attack threats, which drives ongoing development into intrusion detection systems. Deep Learning (DL)-based IDSs have gained popularity due to their deep feature learning capabilities, while being resource-intensive. To overcome computational problems, this research provides an optimized deep belief-based model that combines the Genetic Algorithm, Particle Swarm Optimization, and Probabilistic Neural Network (GePP-Dbnet).This model seeks to find a balance between accuracy, training duration, and false alarm rates while identifying a diverse set of threat classes. Validation will be carried out using the benchmark datasets NSL-KDD and CSE-CIC-IDS2018, which provide realistic scenarios for assessing the model's effectiveness. |
| URI: | http://irepo.futminna.edu.ng:8080/jspui/handle/123456789/29905 |
| Appears in Collections: | Information and Media Technology |
Files in This Item:
| File | Description | Size | Format | |
|---|---|---|---|---|
| SmartEco Conf PROCEEDINGS_ VOL 35, AUG 2024 .pdf | 1.41 MB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.