A Metaheuristic Autoencoder Deep Learning Model for Intrusion Detector System

Jay Kumar Pandey, Sumit Kumar, Madonna Lamin, Suneet Gupta, Rajesh Kumar Dubey, F. Sammy, Vijay Kumar
<span title="2022-03-04">2022</span> <i title="Hindawi Limited"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/wpareqynwbgqdfodcyhh36aqaq" style="color: black;">Mathematical Problems in Engineering</a> </i> &nbsp;
A multichannel autoencoder deep learning approach is developed to address the present intrusion detection systems' detection accuracy and false alarm rate. First, two separate autoencoders are trained with average traffic and assault traffic. The original samples and the two additional feature vectors comprise a multichannel feature vector. Next, a one-dimensional convolution neural network (CNN) learns probable relationships across channels to better discriminate between ordinary and attack
more &raquo; ... ffic. Unaided multichannel characteristic learning and supervised cross-channel characteristic dependency are used to develop an effective intrusion detection model. The scope of this research is that the method described in this study may significantly minimize false positives while also improving the detection accuracy of unknown attacks, which is the focus of this paper. This research was done in order to improve intrusion detection prediction performance. The autoencoder can successfully reduce the number of features while also allowing for easy integration with different neural networks; it can reduce the time it takes to train a model while also improving its detection accuracy. An evolutionary algorithm is utilized to discover the ideal topology set of the CNN model to maximize the hyperparameters and improve the network's capacity to recognize interchannel dependencies. This paper is based on the multichannel autoencoder's effectiveness; the fourth experiment is a comparative analysis, which proves the benefits of the approach in this article by correlating it to the findings of various different intrusion detection methods. This technique outperforms previous intrusion detection algorithms in several datasets and has superior forecast accuracy.
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1155/2022/3859155">doi:10.1155/2022/3859155</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/ku6u6x7vnramjbzu2v5asjysg4">fatcat:ku6u6x7vnramjbzu2v5asjysg4</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20220423161524/https://downloads.hindawi.com/journals/mpe/2022/3859155.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/3a/98/3a986e62f44e8a323d8b178a762f37034c2d73c6.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1155/2022/3859155"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> hindawi.com </button> </a>