PROSPECTIVE DIRECTIONS OF TRAFFIC ANALYSIS AND INTRUSION DETECTION BASED ON NEURAL NETWORKS
DOI:
https://doi.org/10.28925/2663-4023.2022.17.4656Keywords:
neural networks, intrusion detection systems, KDD99, convolutional neural networkAbstract
The main problems of the network security at the moment are the difficulty of combining existing systems from different vendors and ensuring their stable interaction with each other. Intrusion detection is one of the main tasks of a proper level of network security, because it is they who notify about attacks and can block them when detected. Today, monitoring and analyzing the quality of traffic in the network, detecting and preventing intrusions is helped by IDS systems and IDS systems of the new generation IPS. However, they have been found to have certain drawbacks, such as the limitations of signature-based systems, as static attack signatures limit the flexibility of systems and pose the threat of missing detection of other attacks not entered into the database. This gives rise to the creation of more and more new hybrid systems, but the challenge is to ensure their efficiency and flexibility, which is helped by the use of artificial neural networks (ANNs). This paper considers ways to improve the use of the convolutional neural network model itself by means of modified processing, data analysis, the use of Softmax and FocalLoss functions to avoid the problem of uneven distribution of sample data by the ratio of positive and negative samples, based on training using the KDD99 dataset. The article provides practical examples of possible integration of IDS and ANN systems. Combinations of backpropagation neural networks and radiant-basis neural networks, which showed some of the best results and proved that the combination of networks helps to increase the efficiency of these systems and create a flexible network adjusted to the needs and requirements of the systems. Although the use of artificial neural networks is a popular tool, it has identified a number of disadvantages: critical dependence on the quality of the dataset, which pours both the quality of networking and the amount of data (the more data, the better and more accurate the network training). But if the data is excessive, there is a chance of missing such implicit, but also dangerous attacks as R2L and U2R.
Downloads
References
Cao, Y., Zhang, L., Zhao, X., Jin, K., Chen, Z. (2022). An Intrusion Detection Method for Industrial Control System Based on Machine Learning. Information, 13(7), 322. https://doi.org/10.3390/info13070322.
Khan, A. R., Kashif, M., Jhaveri, R. H., Raut, R., Saba, T., Bahaj, S. A. (2022). Deep learning for intrusion detection and security of internet of things (IOT): Current analysis, challenges, and possible solutions. Security and Communication Networks, 2022, 1–13. https://doi.org/10.1155/2022/4016073.
Tian, C., Zhang, F., Li, Z., Wang, R., Huang, X., Xi, L., Zhang, Y. (2022). Intrusion Detection Method Based on Deep Learning. Wireless Communications and Mobile Computing, 2022, 1–8. https://doi.org/10.1155/2022/1338392.
Kalpana, Y., Purushothaman, S., Rajeswari, R. (2013). Implementation of intrusion detection using BPARBF neural networks. International journal of computer science and information security, 11(10), 70.
Papadogiannaki, E., Tsirantonakis, G., Ioannidis, S. (2022). Network intrusion detection in encrypted traffic.
Reddy, K. (2013). Neural networks for intrusion detection and its applications. In Proceedings of the world congress on engineering, London (pp. 3–4).
Vinchurkar, D., Reshamwala, A. (2022). A review of intrusion detection system using neural network and machine learning technique.
Wang, Y., Wang, J., Jin, H. (2022). Network Intrusion Detection Method Based on Improved CNN in Internet of Things Environment. Mobile Information Systems, 2022, 1–10. https://doi.org/10.1155/2022/3850582.
Zainel, H., Koçak ,C. (2022). LAN intrusion detection using convolutional neural networks. Applied sciences, 12, 2–4.
Zhao, X. (2022). Application of data mining technology in software intrusion detection and information processing.
Anna, I., Sergii, I., Marharyta, H. (2021). A Biometric Asymmetric Cryptosystem Software Module Based on Convolutional Neural Networks. International Journal of Computer Network & Information Security, 13(6).
Ilyenko, A., Ilyenko, S. (2022). Program Module of Cryptographic Protection Critically Important Information of Civil Aviation Channels. In International Conference on Computer Science, Engineering and Education Applications (pp. 235-247). Springer, Cham.