Future of Information and Communication Conference (FICC) 2022
3-4 March 2022
Publication Links
IJACSA
Special Issues
Computing Conference
Intelligent Systems Conference (IntelliSys)
Future Technologies Conference (FTC)
Future of Information and Communication Conference (FICC)
Copyright Statement: This is an open access article licensed under a Creative Commons Attribution 4.0 International License, which permits unrestricted use, distribution, and reproduction in any medium, even commercially as long as the original work is properly cited.
Digital Object Identifier (DOI) : 10.14569/IJACSA.2022.0130498
Article Published in International Journal of Advanced Computer Science and Applications(IJACSA), Volume 13 Issue 4, 2022.
Abstract: Cyberattacks are on the rise, making technology companies increasingly prone to data theft. Recent research has focused on constructing cognitive models for traffic anomaly detection in a communication network. Many of these exper-iments resulted in data packets recorded by technologies like Wireshark. These datasets provide high-dimensional data relating to benign and malicious data packets. Recent research has mostly focused on developing machine learning, and deep learning systems o detect attack data packets in a network. Also, machine learning algorithms are currently trained to detect only known threats. However, with the growth of new cyberattacks and zero-day attacks, current algorithms are unable to detect unknown attacks. This research focuses on detecting rare attacks using transfer learning from a dataset of known attacks. Deep learning outperforms explicit statistical modelling approaches by at least 21% for the dataset used. A preliminary survey of candidate deep learning architectures has been performed before testing for transferability and proposes a Convolutional Neural Network architecture that is 99.65% accurate in classifying attack data packets. The suggested CNN architecture trained with a known attack and then tested its performance on unknown attacks to assess transferability. For this model to extract sufficient information for transferability, the training samples must have more information. Only 20% of the dataset represents current threat data. Several strategies, such as innovative synthetic dataset-based training and bootstrapped dataset training, have been developed to overcome small training sets. A subset of training attacks is determined to optimise learning potential. This study finds training-testing attack pairings with good learning transferability. The most robust and stable relationships are found in DoS attack training-testing pairings. This study also presents model generalisation hypotheses. The dataset features and attack characteristics were analysed using the Recursive Feature Elimination (RFE) algorithm to validate the results.
Abhijit Das and Pramod, “A Deep Transfer Learning Approach to Enhance Network Intrusion Detection Capabilities for Cyber Security” International Journal of Advanced Computer Science and Applications(IJACSA), 13(4), 2022. http://dx.doi.org/10.14569/IJACSA.2022.0130498
@article{Das2022,
title = {A Deep Transfer Learning Approach to Enhance Network Intrusion Detection Capabilities for Cyber Security},
journal = {International Journal of Advanced Computer Science and Applications},
doi = {10.14569/IJACSA.2022.0130498},
url = {http://dx.doi.org/10.14569/IJACSA.2022.0130498},
year = {2022},
publisher = {The Science and Information Organization},
volume = {13},
number = {4},
author = {Abhijit Das and Pramod}
}