Volume 20 No 22 (2022)
Download PDF
A Novel Approach ForUnknown Attack Detection In Computer Network
Kamran Ahmad, Aasim Zafar, Khushnaseeb Roshan
Abstract
Machine Learning (ML) and Deep Learning (DL) technologies are gaining prominence, particularly in computer network security. Cutting-edge technologies, such as fraud detection systems, network anomaly detection tools, and intrusion detection solutions, are now widely used for various applications. Over several decades, anomaly detection, also known as outlier identification, has been a persistent and active study topic in different academic areas. Specific problems with unique complexities and challenges still necessitate sophisticated solutions. Deep anomaly detection using deep learning has been a significant field of research in recent years. The combination of machine learning, deep learning, and cognitive intelligence gives a strong framework for enhancing network security and defending key assets from emerging cyber threats. The primary objective of this study was to showcase how the Ensemble model can enhance the effectiveness of a DL model, particularly an autoencoder, in detecting anomalies in computer networks. We increased the performance of the DL model by evaluating its findings. The experiment was conducted on a subset of the most recent CICIDS2017 network dataset. The Ensemble model attained an excellent overall accuracy of 99.74% and 0.99, respectively.
Keywords
Deep Learning, Unknown Attack Detection, Autoencoder, Computer Network
Copyright
Copyright © Neuroquantology
Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
Articles published in the Neuroquantology are available under Creative Commons Attribution Non-Commercial No Derivatives Licence (CC BY-NC-ND 4.0). Authors retain copyright in their work and grant IJECSE right of first publication under CC BY-NC-ND 4.0. Users have the right to read, download, copy, distribute, print, search, or link to the full texts of articles in this journal, and to use them for any other lawful purpose.