Submit your paper : editorIJETjournal@gmail.com Paper Title : DESIGN AND DEVELOP INTRUSION DETECTION SYSTEM FOR DETECTING AND CLASSIFYING CYBER ATTACKS AT NETWORK LEVEL USING DEEP LEARNING MODELS ISSN : 2395-1303 Year of Publication : 2021 10.29126/23951303/IJET-V7I5P2 MLA Style: -Dr. D.J. Samatha Naidu , C. Shalini , DESIGN AND DEVELOP INTRUSION DETECTION SYSTEM FOR DETECTING AND CLASSIFYING CYBER ATTACKS AT NETWORK LEVEL USING DEEP LEARNING MODELS " " Volume 7 - Issue 5 September - October,2021 International Journal of Engineering and Techniques (IJET) ,ISSN:2395-1303 , www.ijetjournal.org APA Style: -Dr. D.J. Samatha Naidu , C. Shalini " DESIGN AND DEVELOP INTRUSION DETECTION SYSTEM FOR DETECTING AND CLASSIFYING CYBER ATTACKS AT NETWORK LEVEL USING DEEP LEARNING MODELS " Volume 7 - Issue 5 September - October,2021 International Journal of Engineering and Techniques (IJET) ,ISSN:2395-1303 , www.ijetjournal.org Abstract - Deep learning techniques are being widely used to develop an IDS (Intrusion Detection System) for detecting and classifying cyberattacks at the network level. In existing system many challenges raised since malicious attacks are continually changing and occurring in very large volumes requiring a scalable solution. In proposed work a hybrid intrusion detection alert system using a highly scalable framework on commodity hardware server which has the capability to analyze the network and host-level activities. The framework employed distributed deep learning model with CNN (convolutional neural network) and LSTM (Long short term memory) for handling and analyzing very large scale data in real-time. In addition, we collected host-based and network based features in real-time and employed the proposed CNN and LSTM models for detecting attacks and intrusions. In all the cases, we observed that CNN and LSTM exceeded in performance when compared to the classical machine learning classifiers . To the best of our knowledge this is the only framework which has the capability to collect network -level and host-level activities in a distributed manner using CNN and LSTM to detect attack more accurately. Reference • K. Prasanna and M. Seetha, "Mining high dimensional association rules by generating large frequent k-dimension set," 2012 International Conference on Data Science & Engineering (ICDSE), Cochin, Kerala, 2012, pp. 58-63. • M. G. Raman, N. Somu, K. Kirthivasan Et V. S. Sriram,”A Hypergraph And Arithmetic Residue-Based Probabilistic Neural Network For Classification In • Intrusion Detection Systems, Neural Networks”, Vol. 92, P. 89–97, 2017. • M. E. Aminanto and K. Kim, “Deep Learning In Intrusion Detection System: An Overview,” Proc. Int. Res. Conf. Eng. Technol., Pp. 1–12, 2016. • N. Gao, L. Gao, Q. Gao Et H. Wang, “An Intrusion Detection Model Based On Deep Belief Networks”, In Advanced Cloud And Big Data (CBD), 2014 Second International Conference On, P. 247– 252,IEEE, 2014. • Prasanna, K., Sankara Prasanna Kumar, M., Surya Narayana, G.: A novel benchmark K-means clustering on continuous data. Int. J. Comput. Sci. Eng. (IJCSE) 3(8), 2974–2977, 2011. • R. U. Khan, X. Zhang R. Kumar, “Analysis Of Resnet And Googlenet Models For Malware Detection”, Journal Of Computer Virology And Hacking Techniques, Aug 2018. • R. U. Khan, X. Zhang, R. Kumar Et E. O. Aboagye, “Evaluating The Performance Of Resnet Model Based On Image Recognition”, In Proceedings of the International Conference On Computing And Artificial Intelligence, ICCAI 2018, PP. 86–90, ACM, 2018. • R. Kumar, Z. Xiaosong, R. U. Khan, I. Ahad Et J. Kumar, ”Malicious Code Detection Based On Image Processing Using Deep Learning”, In Proceedings Of The 2018 International Conference On Computing And Artificial Intelligence, ICCAI 2018, PP. 81–85, ACM, 2018. • S. Venticinque A. Amato, “Smart Sensor And Big Data Security And Resilience, in Security And Resilience In Intelligent Data-Centric Systems And Communication Networks” PP. 123–141, Elsevier, 2018. • S.Chung Et K.Kim,”A Heuristic Approach To Enhance the Performance of Intrusion Detection System using Machine Learning Algoritghms”, In proceedings of the Korea Institute of Information Security and Cryptology Conference (Cisc-Wa15),2015. • S. M. H. Bamakan, H. Wang Et Y. Shi, Ramp, “Support Vector Classification Regression; A Robust And Sparse Multi-Class Approach To The Intrusion Detection Problem”, Knowledge-Based Systems, Vol. 126, P. 113–126, 2017. • S. Jha, K. M. Tan Et R. A. Maxion, “Markov Chains, Classifiers, And Intrusion Detection, In CSFW, Vol. 1, P. 206, 2001. • S.-J. Horng, M.-Y. Su, Y.-H. Chen, T.-W. Kao, R.-J. Chen, J.-L.Lai Et C. D. Perkasa, “A Novel Intrusion Detection System Based On Hierarchical Clustering And Support Vector Machines”, Expert Systems With Applications, Vol. 38, No. 1, P. 306–313,2011. • S. Peddabachigari, A. Abraham, C. Grosan Et J. Thomas, ”Modeling Intrusion Detection System Using Hybrid Intelligent Systems”, Journal Of Network And Computer Applications, Vol. 30, No. 1, P. 114– 132, 2007. S. Vieira, W. H. L. Pinaya, And A. Mechelli, “Using Deep Learning to Investigate The Neuroimaging Correlates Of Psychiatric And Neurological Disorders: Methods And Applications,” Neurosci. Biobehav. Rev., 2017. • W. Leonard, “Resilient Cyber-Secure Systems And System Of Systems: Implications For The Department Of Defense, In Disciplinary Keywords — |