Abstract
To detect network attacks more effectively, this study uses Honeypot techniques to collect the latest network attack data and proposes network intrusion detection classification models, based on deep learning, combined with DNN and LSTM models. Experiments showed that the data set training models gave better results than the KDD CUP 99 training model’s detection rate and false positive rate. The DNN-LSTM intrusion detection algorithm, proposed in this study, gives better results than KDD CUP 99 training model. Compared to other algorithms, such as LeNet, DNNLSTM intrusion detection algorithm exhibits shorter classification test time along with better accuracy and recall rate of intrusion detection.
Keywords: Honeypot, intrusion protection, intrusion detection, deep learning, network security, DNN-LSTM.
Recent Patents on Engineering
Title:Network Intrusion Detection Methods Based on Deep Learning
Volume: 15 Issue: 4
Author(s): Xiangwen Li and Shuang Zhang*
Affiliation:
- Data Recovery Key Laboratory of Sichuan Province, College of Computer Science & AI, Neijiang Normal University, Neijiang, Sichuan,China
Keywords: Honeypot, intrusion protection, intrusion detection, deep learning, network security, DNN-LSTM.
Abstract: To detect network attacks more effectively, this study uses Honeypot techniques to collect the latest network attack data and proposes network intrusion detection classification models, based on deep learning, combined with DNN and LSTM models. Experiments showed that the data set training models gave better results than the KDD CUP 99 training model’s detection rate and false positive rate. The DNN-LSTM intrusion detection algorithm, proposed in this study, gives better results than KDD CUP 99 training model. Compared to other algorithms, such as LeNet, DNNLSTM intrusion detection algorithm exhibits shorter classification test time along with better accuracy and recall rate of intrusion detection.
Export Options
About this article
Cite this article as:
Li Xiangwen and Zhang Shuang *, Network Intrusion Detection Methods Based on Deep Learning, Recent Patents on Engineering 2021; 15 (4) : e210421180688 . https://dx.doi.org/10.2174/1872212114999200403092708
DOI https://dx.doi.org/10.2174/1872212114999200403092708 |
Print ISSN 1872-2121 |
Publisher Name Bentham Science Publisher |
Online ISSN 2212-4047 |
Call for Papers in Thematic Issues
Advanced Experimental, Computational Fluid Dynamics and Intelligent Computing Techniques on Complex Multiphase Flow Problems
Computational fluid dynamics (CFD) and Intelligent computing are very emerging technology in various industrial applications. Multiphase flow problems are very dominant in hydro as well as power plants, mining, marine, cementing, food processing, and ore-processing industries. Multiphase flows include gas-solid as well as liquid-solid flows. The solid like ores, ash, ...read more
Advanced materials for energy production, transmission, and utilization
Hydrogen storage and production materials: Developing high-performance hydrogen generation and storage materials, as well as researching the mechanism of hydrogen-material interaction. The emphasis for supercapacitors is on carbon-based materials derived from various biomass carbonization methods, as well as carbon-containing electrode materials such as metal sulfide, oxides, and other similar compounds. ...read more
Advancements in Machine Learning for Medical Applications in Material Science
The fusion of machine learning with medical applications and material science has ushered in a new era of innovation, offering transformative solutions to complex healthcare challenges. "Advancements in Machine Learning for Medical Applications in Material Science," a special issue, serves as a crucible for exploring the remarkable synergy between these ...read more
Computational Methods in Engineering
In recent decades, computational methods have revolutionized the field of engineering, playing a pivotal role in enhancing efficiency, accuracy, and innovation across various disciplines. This proposed thematic issue aims to explore and showcase the latest advancements, challenges, and applications of computational methods in engineering. As technology continues to evolve, computational ...read more
Related Journals
- Author Guidelines
- Graphical Abstracts
- Fabricating and Stating False Information
- Research Misconduct
- Post Publication Discussions and Corrections
- Publishing Ethics and Rectitude
- Increase Visibility of Your Article
- Archiving Policies
- Peer Review Workflow
- Order Your Article Before Print
- Promote Your Article
- Manuscript Transfer Facility
- Editorial Policies
- Allegations from Whistleblowers
- Announcements