2020
DOI: 10.11591/ijece.v10i3.pp3315-3322
|View full text |Cite
|
Sign up to set email alerts
|

LSTM deep learning method for network intrusion detection system

Abstract: The security of the network has become a primary concern for organizations. Attackers use different means to disrupt services or steal information, these various attacks push to think of a new way to block them all in one manner. In addition, these intrusions can change and penetrate the devices of security. To solve these issues, we suggest, in this paper, a new idea for Network Intrusion Detection System (NIDS) based on Long Short-TermMemory (LSTM) to recognize menaces and to obtain a long-term memory on the… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
20
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
7
2
1

Relationship

1
9

Authors

Journals

citations
Cited by 33 publications
(25 citation statements)
references
References 19 publications
0
20
0
Order By: Relevance
“…The result of the proposed model was evaluated using well-known standard evaluation metrics for the classification algorithms namely, detection rate (recall) ( ), precision ( ) , F-measure ( ), and accuracy ( ) as calculated in Eqs. (13) -(16) [25][26][27]. Moreover, the Receiver Operating Characteristic (ROC) curve is used to check the performance of the proposed model cost against recall.…”
Section: Resultsmentioning
confidence: 99%
“…The result of the proposed model was evaluated using well-known standard evaluation metrics for the classification algorithms namely, detection rate (recall) ( ), precision ( ) , F-measure ( ), and accuracy ( ) as calculated in Eqs. (13) -(16) [25][26][27]. Moreover, the Receiver Operating Characteristic (ROC) curve is used to check the performance of the proposed model cost against recall.…”
Section: Resultsmentioning
confidence: 99%
“…The strong point of this technique is that all data is used for training and testing, which makes the assessment more precise. We employed 5-fold cross validation to assess our approach, if we increase the N, the number of attacks for some types like R2L and U2R will decrease for each subset, and they may be neglected during processing [25].…”
Section: Validation Methodsmentioning
confidence: 99%
“…̅ tested with the number of decision trees used as {10, 40, 60, 80, 100}. Besides, we also conduct experiments to compare the RF algorithm with some algorithms of other studies including decision tree (J48) [9,21] and LSTM [21,28] algorithms. In the study [15], the authors have proven that the KNN and logistic regression algorithms both have less efficiency than the decision tree algorithm, so to see the effectiveness of the RF algorithm, we will only compare it with decision tree and LSTM algorithms…”
Section: ̂ (8)mentioning
confidence: 99%