Intrusion Detection System using Intelligent Deep Boltzmann Machine

Authors

  • K. Veena  PG Scholar, Akshaya College of Engineering and Technology, Kinathukadavu, Coimbatore, Tamil Nadu, India
  • Prof. P. Damodharan  Associate Professor, Akshaya College of Engineering and Technology, Kinathukadavu, Coimbatore, Tamil Nadu, India
  • Dr. N.Suguna  Professor, Akshaya College of Engineering and Technology, Kinathukadavu, Coimbatore, Tamil Nadu, India

Keywords:

IDS System, MLSDN, Deep Learning, KDD

Abstract

In the wireless communication identifying the attacks and ensuring the data/information security is the primary role played by the Intrusion Detection System. In an uncompromised network the network traffic monitored at these two different points in the network should be identical. If differences are detected in the data transmission this may indicate an intrusion of the computer network. The IDS System performs the vital role for the security of the network, consist of three main components: data collection, feature selection/conversion and decision engine. Data preprocessing provides high-quality data for subsequent processing, then different type of feature is extracted from the processed data as vector. The performance is evaluated using the network analysis metrics such as key generation delay, key sharing delay and the hash code generation time for both MLSDN and the proposed Deep Learning (DLSDN). The evaluation shows that the proposed system achieves the better performance in the credential generation processing and in the malicious nodes validation.

References

  1. Khoshkbarforoushha, R. Ranjan, R.Gaire, E. Abbasnejad, L. Wang, and A. Y. Zomaya. Distribution based workload modelling of continuous queries in clouds. IEEE Transactions on Emerging Topics in Computing,5(1):120–133, 2017
  2. Benaloh.J, “Key Compression and Its Application to Digital Fingerprinting” technical report, Microsoft Research, 2009.
  3. D. D´?az-Pernil, A. Berciano, F. Pe˜na-Cantillana, and M. A. Guti´errez- Naranjo. Bio-inspired parallel computing of representative geometrical objects of holes of binary 2d-images. International Journal of Bio-Inspired Computation, 9(2):77–92, 2017.
  4. Chen, F., Ji, R., Su, J., Cao, D. and Gao, Y., 2018. Predicting Microblog Sentiments via Weakly Supervised Multimodal Deep Learning. IEEE Transactions on Multimedia, 20(4), pp.997-1007.
  5. Jiang, F., Fu, Y., Gupta, B.B., Lou, F., Rho, S., Meng, F. and Tian, Z., 2018. Deep Learning based Multi-channel intelligent attack detection for Data Security. IEEE Transactions on Sustainable Computing.
  6. G.-G. Wang, X. Cai, Z. Cui, G. Min, and J. Chen. High performance computing for cyber physical social systems by using evolutionary multi-objective optimization algorithm. IEEE Transactions on Emerging Topics in Computing, 2017. [26] L. Wang, H. Geng, P. Liu, K. Lu, J. Kolodziej, R. Ranjan,
  7. J. Kim, N. Shin, S. Y. Jo, and S. H. Kim, “Method of intrusion detection using deep neural network,” in Big Data and Smart Computing (BigComp), 2017 IEEE International Conference on. IEEE, 2017,
  8. L. Liu, L. Shao, X. Li, and K. Lu, ``Learning spatio-temporal represen-tations for action recognition: A genetic programming approach,'' IEEETrans. Cybern., vol. 46, no. 1, pp. 158_170, Jan. 2016.[4] A.-A. Liu, Y.-T. Su, W.-Z. Nie, and M. Kankanhalli, ``Hierarchical cluster-ing multi-task learning for joint human action grouping and recognition,''IEEE Trans. Pattern Anal. Mach. Intell., vol. 39, no. 1, pp. 102_114,Jan. 2017
  9. Lei, L., You, L., Dai, G., Vu, T.X., Yuan, D. and Chatzinotas, S., 2017, August. A deep learning approach for optimizing content delivering in cache-enabled HetNet. In Wireless Communication Systems (ISWCS), 2017 International Symposium on (pp. 449-453). IEEE.
  10. Loukas, G., Vuong, T., Heartfield, R., Sakellari, G., Yoon, Y. and Gan, D., 2018. Cloud-based cyber-physical intrusion detection for vehicles using Deep Learning. IEEE Access, 6, pp.3491-3508.
  11. Y. Ye, T. Li, D. Adjeroh, and S. S. Iyengar. A survey on malware detection using data mining techniques. ACM Computing Surveys(CSUR), 50(3):41, 2017.
  12. Z. Cui, B. Sun, G. Wang, Y. Xue, and J. Chen. A novel oriented cuckoo search algorithm to improve dv-hop performance for cyber–physical systems. Journal of Parallel and Distributed Computing, 103:42–52, 2017.

Downloads

Published

2019-05-30

Issue

Section

Research Articles

How to Cite

[1]
K. Veena, Prof. P. Damodharan, Dr. N.Suguna, " Intrusion Detection System using Intelligent Deep Boltzmann Machine, International Journal of Scientific Research in Science and Technology(IJSRST), Online ISSN : 2395-602X, Print ISSN : 2395-6011, Volume 6, Issue 3, pp.78-86, May-June-2019.