5 research outputs found

    Statistical analysis driven optimized deep learning system for intrusion detection

    Get PDF
    Attackers have developed ever more sophisticated and intelligent ways to hack information and communication technology systems. The extent of damage an individual hacker can carry out upon infiltrating a system is well understood. A potentially catastrophic scenario can be envisaged where a nation-state intercepting encrypted financial data gets hacked. Thus, intelligent cybersecurity systems have become inevitably important for improved protection against malicious threats. However, as malware attacks continue to dramatically increase in volume and complexity, it has become ever more challenging for traditional analytic tools to detect and mitigate threat. Furthermore, a huge amount of data produced by large networks has made the recognition task even more complicated and challenging. In this work, we propose an innovative statistical analysis driven optimized deep learning system for intrusion detection. The proposed intrusion detection system (IDS) extracts optimized and more correlated features using big data visualization and statistical analysis methods (human-in-the-loop), followed by a deep autoencoder for potential threat detection. Specifically, a pre-processing module eliminates the outliers and converts categorical variables into one-hot-encoded vectors. The feature extraction module discard features with null values and selects the most significant features as input to the deep autoencoder model (trained in a greedy-wise manner). The NSL-KDD dataset from the Canadian Institute for Cybersecurity is used as a benchmark to evaluate the feasibility and effectiveness of the proposed architecture. Simulation results demonstrate the potential of our proposed system and its outperformance as compared to existing state-of-the-art methods and recently published novel approaches. Ongoing work includes further optimization and real-time evaluation of our proposed IDS.Comment: To appear in the 9th International Conference on Brain Inspired Cognitive Systems (BICS 2018

    Anomaly-Based Intrusion Detection System To Detect Advanced Persistent Threats: Environmental Sustainability

    Get PDF
    In an evolving digital world, Advanced Persistent Threats (APTs) pose severe cybersecurity challenges. These extended, stealthy cyber-attacks, often elude conventional Intrusion Detection Systems (IDS). To bridge this gap, our research introduces a novel, environmentally conscious, deep learning-based IDS designed for APT detection. The system encompasses various stages from objective definition, data collection and preprocessing, to model development, integration, validation, and deployment. The system, utilizing deep learning algorithms, scrutinizes network traffic to detect patterns characteristic of APTs. This approach improves IDS accuracy and allows real-time threat detection, enabling prompt response to potential threats. Importantly, our system contributes to environmental protection by minimizing power consumption and electronic waste associated with cyberattacks, promoting sustainable cybersecurity practices. Our research outcomes are expected to enhance APT detection, providing robust defense against sophisticated cyber threats. Our environmentally-conscious perspective adds a unique dimension to the cybersecurity domain, underlining its role in sustainable practices

    A FRAMEWORK FOR ARABIC SENTIMENT ANALYSIS USING MACHINE LEARNING CLASSIFIERS

    Get PDF
    International audienceIn recent years, the use of Internet and online comments, expressed in natural language text, have increased significantly. However, it is difficult for humans to read all these comments and classify them appropriately. Consequently, an automatic approach is required to classify the unstructured data. In this paper, we propose a framework for Arabic language comprising of three steps: pre-processing, feature extraction and machine learning classification. The main aim of the proposed framework is to exploit the combination of different Arabic linguistic features. We evaluate the framework using two benchmark Arabic tweets datasets (ASTD, ATA), which enable sentiment polarity detection in general Arabic and Jordanian dialects. Comparative simulation results show that machine learning classifiers such as Support Vector Machine (SVM), Naive Bayes, MultiLayer Perceptron (MLP) and Logistic Regression-based produce the best performance by using a combination of n-gram features from Arabic tweets datasets. Finally, we evaluate the performance of our proposed framework using an Ensemble classifier approach, with promising results

    Паралелізація алгоритму класифікації Random Forest для пришвидшення виявлення кібератак

    Get PDF
    Дипломна робота має обсяг 60 сторінок, містить 18 рисунків, 5 таблиць, 2 додатки та 13 джерел посилань. З кожним днем кількість даних у мережі інтернет зростає в геометричній прогресії. Зростає кількість людей та час, що ці люди проводять на сторінках, де можна знайти все що завгодно. Інтернет також став основою для багатьох бізнесів, які навіть не є можливими без під’єднання мережі Інтернет. Проте виникає проблема, що завжди знайдуться особи, які прагнуть заволодіти інформацією, що їм не належить, або обмежити доступність деякого сервісу, та отримати від цього певну користь у вигляді грошей або інші блага. Одна з найпоширеніших атак на сьогоднішній день є атака DDoS, що може змушувати цілу систему вийти з ладу на деякий, іноді тривалий час. Найбільш вразливими до DDoS атак є IoT(Internet of Things) сегмент, де при виявлені атаки важлива кожна секунда. Об’єктом дослідження є боротьба з DDoS атаками. Метою дослідження є створення методики покращення виявлення DDoS атак.виникає проблема, що завжди знайдуться особи, які прагнуть заволодіти інформацією, що їм не належить, або обмежити доступність деякого сервісу, та отримати від цього певну користь у вигляді грошей або інші блага. Одна з найпоширеніших атак на сьогоднішній день є атака DDoS, що може змушувати цілу систему вийти з ладу на деякий, іноді тривалий час. Найбільш вразливими до DDoS атак є IoT(Internet of Things) сегмент, де при виявлені атаки важлива кожна секунда. Об’єктом дослідження є боротьба з DDoS атаками. Метою дослідження є створення методики покращення виявлення DDoS атак. Ї.there is a problem that there will always be people who want to take information that does not belong to them, or limit the availability of a service, and get some benefit from it in the form of money or other benefits. One of the most common attacks today is a DDoS attack, which can cause the entire system to fail for a while, sometimes for a long time. The most vulnerable to DDoS attacks is the IoT (Internet of Things) segment, where every second counts when attacks are detected. The object of research is the fight against DDoS attacks. The aim of the study is to create a methodology to improve the detection of DDoS attacks.The work consists of 60 pages, has 18 illustrations, 5 tables, 2 appendices and 13 references. Every day the amount of data on the Internet grows exponentially. The number of people and the time that these people spend on pages where you can find anything. The Internet has also become the basis for many businesses that are not even possible without an Internet connection. However, there is a problem that there will always be people who want to take information that does not belong to them, or limit the availability of a service, and get some benefit from it in the form of money or other benefits. One of the most common attacks today is a DDoS attack, which can cause the entire system to fail for a while, sometimes for a long time. The most vulnerable to DDoS attacks is the IoT (Internet of Things) segment, where every second counts when attacks are detected. The object of research is the fight against DDoS attacks. The aim of the study is to create a methodology to improve the detection of DDoS attacks

    Extending persian sentiment lexicon with idiomatic expressions for sentiment analysis

    Get PDF
    Nowadays, it is important for buyers to know other customer opinions to make informed decisions on buying a product or service. In addition, companies and organizations can exploit customer opinions to improve their products and services. However, the Quintilian bytes of the opinions generated every day cannot be manually read and summarized. Sentiment analysis and opinion mining techniques offer a solution to automatically classify and summarize user opinions. However, current sentiment analysis research is mostly focused on English, with much fewer resources available for other languages like Persian. In our previous work, we developed PerSent, a publicly available sentiment lexicon to facilitate lexicon-based sentiment analysis of texts in the Persian language. However, PerSent-based sentiment analysis approach fails to classify the real-world sentences consisting of idiomatic expressions. Therefore, in this paper, we describe an extension of the PerSent lexicon with more than 1000 idiomatic expressions, along with their polarity, and propose an algorithm to accurately classify Persian text. Comparative experimental results reveal the usefulness of the extended lexicon for sentiment analysis as compared to PerSent lexicon-based sentiment analysis as well as Persian-to-English translation-based approaches. The extended version of the lexicon will be made publicly available
    corecore