Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/3660853.3660932acmotherconferencesArticle/Chapter ViewAbstractPublication PagesaicconfConference Proceedingsconference-collections
research-article

Deep Learning-Based Anomaly Detection in Network Traffic for Cyber Threat Identification

Published: 23 June 2024 Publication History

Abstract

An essential aspect of cybersecurity is the continuously growing threat landscape, which necessitates the use of advanced anomaly detection techniques in network data. The traditional approach might often be inadequate when it comes to addressing intricate cyber-security issues. Therefore, it is possible that deep learning approaches might be superior in terms of accuracy and performance. The primary objective of our study is to provide a novel algorithm that combines Convolutional Neural Networks (CNNs), Recurrent Neural Networks (RNNs), autoencoders, and GANs to create a comprehensive strategy for detecting anomalies. This technique aims to solve research gaps that have not been previously explored. By using the MTA-KDD'19 dataset, our research enhances precision by achieving a remarkable accuracy rate of 95% in detecting various types of network traffic abnormalities. This discovery not only demonstrated the harmfulness of our deep learning-based approach but also highlighted the effectiveness of these measures in reducing the issue, particularly when faced with diverse threats. This enhances the development of network security procedures.
CCS CONCEPTS • Computing methodologies∼ Artificial intelligence • Security and privacy∼Network security

References

[1]
Sarker, I. H. (2021). Deep cybersecurity: a comprehensive overview from neural network and deep learning perspective. SN Computer Science, 2(3), 154.
[2]
Ustundag, A., Cevikcan, E., Ervural, B. C., & Ervural, B. (2018). Overview of cyber security in the industry 4.0 era. Industry 4.0: managing the digital transformation, 267-284.
[3]
Aslan, Ö., Aktuğ, S. S., Ozkan-Okay, M., Yilmaz, A. A., & Akin, E. (2023). A comprehensive review of cyber security vulnerabilities, threats, attacks, and solutions. Electronics, 12(6), 1333.
[4]
A. K. Ahmed, S. Q. Younus, S. R. Ahmed, S. Algburi, and M. A. Fadhel, “A Machine Learning Approach to Employee Performance Prediction within Administrative Information Systems,” 2023 7th International Symposium on Innovative Approaches in Smart Technologies (ISAS), Nov. 2023.
[5]
M. H. B. A. Alkareem, F. Q. Nasif, S. R. Ahmed, L. D. Miran, S. Algburi, and M. T. ALmashhadany, “Linguistics for Crimes in the World by AI-Based Cyber Security,” 2023 7th International Symposium on Innovative Approaches in Smart Technologies (ISAS), Nov. 2023.
[6]
Abdulmohsin, Z. S., Ahmed, S. R., & Hussein, K. A. (2024). Implementation of Patch-Wise Illumination Estimation for Multi-Exposure Image Fusion utilizing Convolutional Neural Network. Journal of Baghdad College of Economic sciences University, (75).‏
[7]
ABBOOD, Zainab Ali, Speaker identification model based on deep neural networks. Iraqi Journal For Computer Science and Mathematics, 2022, 3.1: 108-114.
[8]
Thwaini, M. H. (2022). Anomaly Detection in Network Traffic using Machine Learning for Early Threat Detection. Data and Metadata, 1, 34-34.
[9]
Jeffrey, N., Tan, Q., & Villar, J. R. (2023). A review of anomaly detection strategies to detect threats to cyber-physical systems. Electronics, 12(15), 3283.
[10]
Le, D. C., & Zincir-Heywood, N. (2021). Anomaly detection for insider threats using unsupervised ensembles. IEEE Transactions on Network and Service Management, 18(2), 1152-1164.
[11]
Prasad, N. R., Almanza-Garcia, S., & Lu, T. T. (2010). Anomaly detection. Computers, Materials, & Continua, 14(1), 1-22.
[12]
Kraiman, J. B., Arouh, S. L., & Webb, M. L. (2002, July). Automated anomaly detection processor. In Enabling Technologies for Simulation Science VI (Vol. 4716, pp. 128-137). SPIE.
[13]
Dixit, P., & Silakari, S. (2021). Deep learning algorithms for cybersecurity applications: A technological and status review. Computer Science Review, 39, 100317.
[14]
Ali, W. A., Manasa, K. N., Bendechache, M., Fadhel Aljunaid, M., & Sandhya, P. (2020). A review of current machine learning approaches for anomaly detection in network traffic. Journal of Telecommunications and the Digital Economy, 8(4), 64-95.
[15]
S. R. Ahmed and E. Sonuç, “Evaluating the effectiveness of rationale-augmented convolutional neural networks for deepfake detection,” Soft Computing, Oct. 2023.
[16]
N. Z. Mahmood, S. R. Ahmed, A. F. Al-Hayaly, S. Algburi and J. Rasheed, "The Evolution of Administrative Information Systems: Assessing the Revolutionary Impact of Artificial Intelligence," 2023 7th International Symposium on Multidisciplinary Studies and Innovative Technologies (ISMSIT), Ankara, Turkiye, 2023, pp. 1-7.
[17]
B. A. Abubaker, S. R. Ahmed, A. T. Guron, M. Fadhil, S. Algburi, and B. F. Abdulrahman, “Spiking Neural Network for Enhanced Mobile Robots’ Navigation Control,” 2023 7th International Symposium on Innovative Approaches in Smart Technologies (ISAS), Nov. 2023.
[18]
Hwang, R. H., Peng, M. C., Huang, C. W., Lin, P. C., & Nguyen, V. L. (2020). An unsupervised deep learning model for early network traffic anomaly detection. IEEE Access, 8, 30387-30399.
[19]
S. R. Ahmed, E. Sonuc, M. R. Ahmed, and A. D. Duru, “Analysis Survey on Deepfake detection and Recognition with Convolutional Neural Networks,” 2022 International Congress on Human-Computer Interaction, Optimization and Robotic Applications (HORA), Jun. 2022.‏
[20]
B. T. Yaseen, S. Kurnaz, and S. R. Ahmed, “Detecting and Classifying Drug Interaction using Data mining Techniques,” 2022 International Symposium on Multidisciplinary Studies and Innovative Technologies (ISMSIT), Oct. 2022.‏
[21]
S. R. Ahmed, A. K. Ahmed, and S. J. Jwmaa, “Analyzing The Employee Turnover by Using Decision Tree Algorithm,” 2023 5th International Congress on Human-Computer Interaction, Optimization and Robotic Applications (HORA), Jun. 2023.
[22]
Liu, D., Lung, C. H., Seddigh, N., & Nandy, B. (2014, September). Network traffic anomaly detection using adaptive density-based fuzzy clustering. In 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications (pp. 823-830). IEEE.
[23]
Fotiadou, K., Velivassaki, T. H., Voulkidis, A., Skias, D., Tsekeridou, S., & Zahariadis, T. (2021). Network traffic anomaly detection via deep learning. Information, 12(5), 215.
[24]
Bhuyan, M. H., Bhattacharyya, D. K., & Kalita, J. K. (2016). A multi-step outlier-based anomaly detection approach to network-wide traffic. Information Sciences, 348, 243-271.
[25]
Saber, A.H., Khan, M.A., Mejbel, B.G. Digital Image forgery Detection by Utilize combined Feature extraction techniques (2021) art. no. 9493527.
[26]
Lienkov, S., Zhyrov, G., Sieliukov, O., Tolok, I., Talib, A. S. M., & Pampukha, I. (2019, October). Calculation of Reliability Indicators of Unmanned Aerial Vehicle Class “$\mu $” taking into account Operating Conditions at the Design Stage. In 2019 IEEE 5th International Conference Actual Problems of Unmanned Aerial Vehicles Developments (APUAVD) (pp. 52-56). IEEE.
[27]
Casas, P., Fiadino, P., & D'Alconzo, A. (2016, April). Machine-Learning Based Approaches for Anomaly Detection and Classification in Cellular Networks. In TMA (pp. 1-8).
[28]
Xia, H., Fang, B., Roughan, M., Cho, K., & Tune, P. (2018). A basisevolution framework for network traffic anomaly detection. Computer Networks, 135, 15-31.
[29]
Nakashima, M., Sim, A., Kim, Y., Kim, J., & Kim, J. (2021). Automated feature selection for anomaly detection in network traffic data. ACM Transactions on Management Information Systems (TMIS), 12(3), 1-28.
[30]
Gogoi, P., Borah, B., & Bhattacharyya, D. K. (2010). Anomaly detection analysis of intrusion data using supervised & unsupervised approach. J. Convergence Inf. Technol., 5(1), 95-110.
[31]
https://paperswithcode.com/dataset/mta-kdd-19

Cited By

View all
  • (2024)Detecting and Analyzing Network Attacks: A Time-Series Analysis Using the Kitsune DatasetJournal of Emerging Computer Technologies10.57020/ject.15631465:1(9-23)Online publication date: 2-Nov-2024

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Other conferences
AICCONF '24: Proceedings of the Cognitive Models and Artificial Intelligence Conference
May 2024
367 pages
ISBN:9798400716928
DOI:10.1145/3660853
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 23 June 2024

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Convolutional Neural Networks (CNNs)
  2. GAN
  3. Recurrent Neural Networks (RNNs)
  4. autoencoders

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Conference

AICCONF '24

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)83
  • Downloads (Last 6 weeks)28
Reflects downloads up to 16 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Detecting and Analyzing Network Attacks: A Time-Series Analysis Using the Kitsune DatasetJournal of Emerging Computer Technologies10.57020/ject.15631465:1(9-23)Online publication date: 2-Nov-2024

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format.

HTML Format

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media