Traffic Monitoring and Malicious Detection Multidimensional PCAP Data Using Optimized LSTM RNN

Traffic Monitoring and Malicious Detection Multidimensional PCAP Data Using Optimized LSTM RNN

Leelalakshmi S., Rameshkumar K.
Copyright: © 2022 |Pages: 22
DOI: 10.4018/IJISP.308312
OnDemand:
(Individual Articles)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

Nowadays, the intrusion detection systems (IDSs) and network security assessments utilize the methodology of deep learning with several innovations like recurrent neural networks (RNN) and long short-term memory (LSTM) for classifying the malicious traffic. For satisfying the requirements of real-time analysis because of main delay of the flow-based data minimization, these state-of-the-art systems face enormous challenges. The flow-based minimization is the time required for specific flow of packet accumulation and then feature extraction. In case the detection of malicious traffic at the packet level is accomplished first, and then significant reduction of time for detection happens, this ensures the online real-time malicious traffic detection depends upon the technologies of deep learning as a promising one.
Article Preview
Top

Introduction

The unlimited accessibility of human society is the Internet which became an essential infrastructure. Though, few unavoidable issues of security on internet are characterized, such as disclosure of privacy, malicious software and phishing are the problems associated with security which are inevitably characterized in the internet, by this user’s economy will become a serious threat (Alghoul et al., 2018). Malicious code is a type of malicious programming code or internet scripting that is meant to cause security flaws that contribute to rear gates, privacy violations, access and data-stealing, as well as other possible document and group of computers destruction. It's a form of danger that antivirus programs might not have been able to detect by themselves. The surface of attack is extensive and is defended by both cyber and physical spaces. Data management layer, control layer, and communication layer are comprised in it. The data management level of a model is developed by a steering committee in four steps: establishing the collection structure, translating the issue domain categories towards the specified layout, optimizing the memory to effectively function, and developing the appropriate information accessibility and manipulating methods. The mechanics of precipitation, wind, humidity, and warmth movement are controlled by several elements in the environment network. These parameters are considered as control layers. The Communication layer is in charge of connection, the signal passing amongst external machines, especially transportation connecting source and the network. The Communication layer allows creating how equipment sends messages IoT signals, as well as how sensors depict and maintain their physiological body in the clouds.

Complete Article List

Search this Journal:
Reset
Volume 18: 1 Issue (2024)
Volume 17: 1 Issue (2023)
Volume 16: 4 Issues (2022): 2 Released, 2 Forthcoming
Volume 15: 4 Issues (2021)
Volume 14: 4 Issues (2020)
Volume 13: 4 Issues (2019)
Volume 12: 4 Issues (2018)
Volume 11: 4 Issues (2017)
Volume 10: 4 Issues (2016)
Volume 9: 4 Issues (2015)
Volume 8: 4 Issues (2014)
Volume 7: 4 Issues (2013)
Volume 6: 4 Issues (2012)
Volume 5: 4 Issues (2011)
Volume 4: 4 Issues (2010)
Volume 3: 4 Issues (2009)
Volume 2: 4 Issues (2008)
Volume 1: 4 Issues (2007)
View Complete Journal Contents Listing