Chrome Extension
WeChat Mini Program
Use on ChatGLM

A CNN-Based Deep Learning Approach in Anomaly-Based Intrusion Detection Systems.

2023 IEEE International Conference on Systems, Man, and Cybernetics (SMC)(2023)

Cited 0|Views0
No score
Abstract
The growing prevalence of cybersecurity threats has increased the demand for robust intrusion detection systems (IDSs). Deep learning techniques have shown promising results in detecting and mitigating these threats, making them an increasingly popular choice in IDS design. However, evaluating the performance of deep learning-based IDSs can be challenging due to the complexity of the models and the lack of standardized evaluation metrics. This review paper presents an overview of the most common evaluation metrics used in deep learning-based IDSs, including precision, confusion metrics, accuracy, F1 score, Area Under Curve (AUC), and recall. Several studies have applied machine-learning classic algorithms like Random Forest, Decision Tree, Logistic Regression, and others, but for this paper, we used a Convolutional Neural Network (CNN) that would be independent of the features in the dataset. The studied papers did not provide AUC and none of them balanced the dataset based on the feature's proportion. The dataset utilized in this study is the CSE-CIC-IDS2018 dataset, which underwent meticulous cleansing and normalization procedures to ensure the inclusion of legitimate and useful data. Furthermore, a weighting mechanism was introduced to balance the dataset and mitigate the potential for bias in the Machine Learning process.
More
Translated text
Key words
Deep Learning,Intrusion Detection,Intrusion Detection System,Anomaly-based Intrusion Detection Systems,Anomaly-based Intrusion Detection,CNN-based Deep Learning Approaches,Neural Network,Machine Learning,Learning Algorithms,Convolutional Neural Network,Random Forest,Decision Tree,F1 Score,Area Under Curve,Machine Learning Process,Standard Evaluation Metrics,False Negative,Accuracy Of Model,Support Vector Machine,Missing Values,Gradient Boosting,Types Of Attacks,Precision And Recall,Feed-forward Network,High Recall,Clean Data,LightGBM,Normal Behavior,Binary Classification,Ensemble Model
AI Read Science
Must-Reading Tree
Example
Generate MRT to find the research sequence of this paper
Chat Paper
Summary is being generated by the instructions you defined