Author
Listed:
- Davlatov
- Akramov
- Kamarova
- Azizova
- Bakaeva
- Turayeva
- Mamadaminova
Abstract
Almost all real-world operations have moved online in recent years, with computers interacting with one another over the Internet. Consequently, there is an increase in network security vulnerabilities, making it difficult for network managers to protect their networks against all types of cyberattacks. Numerous methods for detecting network intrusions have also been created. However, they face critical difficulties from the continuous rise of new weaknesses that are outside the ability to understand of existing frameworks. We present an astute and effective Profound Learning (DL)- based network interruption discovery framework (NIDS),motivated by deep learning's outstanding performance in a variety of detection and identification tasks. We investigate an RNN-based prediction model for the detection of intrusions in industrial IoT networks. For intrusion detection, we use anomaly detection algorithms to identify if a packet is normal or abnormal. These methods quantify and assess the distance measurement in actual packets, as well as predict the following packet. The cyber security community has access to a wide range of malware datasets for use in public domain research. Furthermore, to the best of our knowledge, no study has offered a thorough evaluation of how well different machine learning techniques perform across a range of publicly accessible datasets. In this paper, we investigate novel hybrid deep learning model, with the aim of building an adaptable and efficient intrusion detection system that can identify and categorise unexpected and cyber-attacks. The results of this type of research make it easier to select the optimal algorithm for use in anticipating and stopping impending cyberattacks. Finally, to perform anomaly identification, a cosine similarity boundary that is thought of as a typical packet was provided. Then, a scoring function based on cosine similarity was applied.
Suggested Citation
Handle:
RePEc:dbk:health:v:3:y:2024:i::p:.581:id:.581
DOI: 10.56294/hl2024.581
Download full text from publisher
To our knowledge, this item is not available for
download. To find whether it is available, there are three
options:
1. Check below whether another version of this item is available online.
2. Check on the provider's
web page
whether it is in fact available.
3. Perform a
for a similarly titled item that would be
available.
Corrections
All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:dbk:health:v:3:y:2024:i::p:.581:id:.581. See general information about how to correct material in RePEc.
If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.
We have no bibliographic references for this item. You can help adding them by using this form .
If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Javier Gonzalez-Argote (email available below). General contact details of provider: https://hl.ageditor.ar/ .
Please note that corrections may take a couple of weeks to filter through
the various RePEc services.