102
Views
1
CrossRef citations to date
0
Altmetric
Computers and Computing

Research on Key Method of Cyber Security Situation Awareness Based on ResMLP and LSTM Network

ORCID Icon, , , , &

References

  • M. Endsley, “Toward a theory of situation awareness in dynamic systems,” Hum. Fact. J. Hum. Fact. Ergon. Soc., Vol. 37, no. 1, pp. 32–64, 1995. DOI: 10.1518/001872095779049543.
  • U. Franke, and J. Brynielsson, “Cyber situational awareness – A systematic review of the literature,” Comput. Security, Vol. 46, pp. 18–31, 2014. DOI: 10.1016/j.cose.2014.06.008.
  • T. Bass, “Intrusion detection systems and multisensory data fusion: creating cyberspace situational awareness,” Commun. ACM, Vol. 43, no. 4, pp. 99–105, 2000. DOI: 10.1145/332051.332079.
  • M. Endsley, “Design and evaluation for situation awareness enhancement,” Hum. Fact., Vol. 32, no. 2, pp. 97–101, 1998.
  • S. V. Shah, J. Liu, and D. Schuster. “Toward robust models of cyber situation awareness,” Proceedings of the AHFE 2018 International Conference on Human Factors in Cybersecurity, 127, 2018.
  • J. Boyd. A discourse on winning and losing. Air University Press, Montgomery, 2018.
  • X. W. Liu, H. Q. Wang, and H. W. Hu, “Fusion-based cognitive awareness-control model for network security situation,” J. Softw., Vol. 27, no. 8, pp. 2099–2114, 2016.
  • G. Ioannou, P. Louvieris, and N. Clewley, “A markov multi-phase transferable belief model for cyber situational awareness,” IEEE. Access., Vol. 7, pp. 39305–39320, 2019. DOI: 10.1109/ACCESS.2019.2897923.
  • G. Zhao, H. Q. Wang, and J. Wang, “A situation awareness model of network security based on grey Verhulst model,” J. Harbin Inst. Technol., Vol. 40, no. 5, pp. 798–801, 2008.
  • C. Liu, Y. Liu, Y. Yan, and J. Wang, “An intrusion detection model with hierarchical attention mechanism,” IEEE. Access., Vol. 8, pp. 67542–67554, 2020. DOI: 10.1109/ACCESS.2020.2983568.
  • M. D. Mauro, “Supervised feature selection techniques in network intrusion detection: A critical review,” Eng. Applic. Artif. Intell., Vol. 101, pp. 104216-104231, 2021. DOI: 10.1016/j.engappai.2021.104216.
  • M. K. Nanda, and M. R. Patra, “Smart innovation, systems and technologies,” Proc. Intern. Confer. Intell. Cloud Comput., Vol. 153, pp. 157–170, 2021. DOI: 10.1007/978-981-15-6202-0_17.
  • I. F. Kilincer, F. Ertam, and A. Sengur, “Machine learning methods for cyber security intrusion detection: Datasets and comparative study,” Comput. Netw., Vol. 188, pp. 107840-107856, 2021. DOI: 10.1016/j.comnet.2021.107840.
  • V. Pai, and N. D. Adesh, “Comparative analysis of machine learning algorithms for intrusion detection,” IOP Confer. Ser. Mater. Sci. Eng., Vol. 1013, pp. 012–038, 2021.
  • S. Ho, S. A. Jufout, K. Dajani, and M. Mozumdar, “A novel intrusion detection model for detecting known and innovative cyberattacks using convolutional neural network,” IEEE Open J. Comput. Soc., Vol. 2, pp. 14–25, 2021. DOI: 10.1109/OJCS.2021.3050917.
  • Z. Fan, and Z. Cao, “Method of network intrusion discovery based on convolutional long-short term memory network and implementation in VSS,” IEEE. Access., Vol. 9, pp. 122744–122753, 2021. DOI: 10.1109/ACCESS.2021.3104718.
  • Z. Fan, Y. Xiao, A. Nayak, and C. Tan, “An improved network security situation assessment approach in software defined networks,” Peer-to-Peer Netw. Applic., Vol. 12, no. 2, pp. 295–309, 2019. DOI: 10.1007/s12083-017-0604-2.
  • Y. Xiao, Z. Fan, A. Nayak, and C. Tan, “Discovery method for distributed denial-of-service attack behavior in SDNs using a feature-pattern graph model,” Front. Inform. Technol. Electron. Eng., Vol. 20, no. 9, pp. 1195–1208, 2019. DOI: 10.1631/FITEE.1800436.
  • Z. Fan, Z. Tan, C. Tan, and X. Li, “An improved integrated prediction method of cyber security situation based on spatial-time analysis,” J. Internet Technol., Vol. 19, no. 6, pp. 1789–1800, 2018.
  • P. Zhao, Z. Fan, Z. Cao, and X. Li, “Intrusion detection model using temporal convolutional network blend into attention mechanism,” Intern. J. Inform. Security Privacy (IJISP), Vol. 16, no. 1, pp. 1-20, 2022.
  • Z. Fan, C. Tan, and X. Li, “A hierarchical method for assessing cyber security situation based on ontology and fuzzy cognitive maps,” Intern. J. Inform. Comput. Security, Vol. 14, no. 3-4, pp. 242–262, 2021. DOI: 10.1504/IJICS.2021.114704.
  • Y. Xiao, C. Xing, and T. Zhang, “An intrusion detection model based on feature reduction and convolutional neural networks,” IEEE. Access., Vol. 7, pp. 42210–42219, 2019. DOI: 10.1109/ACCESS.2019.2904620.
  • U. R. Khan, X. Zhang, and M. Alazab, “An improved convolutional neural network model for intrusion detection in networks,” Proc. 2019 Cyber-Secur. Cyber-Foren. Confer. (CCC), pp. 74–77, 2019. DOI: 10.1109/CCC.2019.000-6.
  • K. Wu, Z. Chen, and W. Li, “A novel intrusion detection model for a massive network using convolutional neural networks,” IEEE. Access., Vol. 6, pp. 50850–50859, 2018. DOI: 10.1109/ACCESS.2018.2868993.
  • G. Andresini, A. Appice, and D. Malerba, “Nearest clusterbased intrusion detection through convolutional neural networks,” Knowl. Based Syst., Vol. 216, pp. 106798-106812, 2021. DOI: 10.1016/j.knosys.2021.106798.
  • S. A. Althubiti, E. M. JonesONES, and K. Roy. “LSTM for anomalybased network intrusion detection,” In: Proceedings of the 2018 28th International Telecommunication Networks and Applications Conference (ITNAC), pp. 74–77, 2019.
  • M. M. Hassan, A. Gumaei, and A. Alsanad, “A hybrid deep learning model for efficient intrusion detection in big data environment,” Inform. Sci., Vol. 513, pp. 386–396, 2020. DOI: 10.1016/j.ins.2019.10.069.
  • S. Yang, M. Tan, and S. XIA, “A method of intrusion detection based on attention-LSTM neural network,” Proc. 2020 5th Intern. Confer. Mach. Learn. Technol., pp. 46–50, 2020. DOI: 10.1145/3409073.3409096.
  • J. Kim, and H. Kim, “An effective intrusion detection classifier using long short- term memory with gradient descent optimization,” Proc. 2017 Intern. Confer. Platf. Technol. Service (PlatCon), pp. 1–6, 2017.
  • K. Jiang, W. Wang, and A. Wang, “Network intrusion detection combined hybrid sampling with deep hierarchical network,” IEEE Access, Vol. 8, pp. 32464–32476, 2020. DOI: 10.1109/ACCESS.2020.2973730.
  • Y. Imrana, Y. Xiang, and L. Ali, “A bidirectional LSTM deep learning approach for intrusion detection,” Expert Syst. Applic., Vol. 185, pp. 115524-115536, 2021. DOI: 10.1016/j.eswa.2021.115524.
  • P. R. Kanna, and P. Santhi, “Unified deep learning approach for efficient intrusion detection system using integrated spatial-temporal features,” Knowl. Based Syst., Vol. 226, pp. 107132-107144, 2021. DOI: 10.1016/j.knosys.2021.107132.
  • S. Gurung, M. K. GhoseHOSE, and A. Subedi, “Deep learning approach on network intrusion detection system using NSL-KDD dataset,” Intern. J. Comput. Netw. Inform. Secur., Vol. 11, no. 3, pp. 8–14, 2019. DOI: 10.5815/ijcnis.2019.03.02.
  • F. Farahnakian, and J. Heikkonen, “A deep auto-encoder based approach for intrusion detection system,” Proc. 2018 20th Intern. Confer. Adv. Commun. Technol. (ICACT), pp. 178–183, 2018. DOI: 10.23919/ICACT.2018.8323688.
  • N. Shone, T. N. Ngoc, and V. D. Phai, “A deep learning approach to network intrusion detection,” IEEE Trans. Emerg. Topics Comput. Intell., Vol. 2, no. 1, pp. 41–50, 2018. DOI: 10.1109/TETCI.2017.2772792.
  • S. Zavrak, and M. İskefiyeli, “Anomaly- based intrusion detection from network flow features using variational auto-encoder,” IEEE Access, Vol. 8, pp. 108346–108358, 2020. DOI: 10.1109/ACCESS.2020.3001350.
  • Z. Wang, Y. Liu, and D. He, “Intrusion detection methods based on integrated deep learning model,” Comput. Secur., Vol. 103, pp. 102177-102191, 2021. DOI: 10.1016/j.cose.2021.102177.
  • M. A. Khan, and Y. Kim, “Deep learning-based hybrid intelligent intrusion detection system,” Comput. Mater. Continua, Vol. 68, no. 1, pp. 671–687, 2021. DOI: 10.32604/cmc.2021.015647.
  • T. Vaiyapuri, and A. Binbusayyis, “Enhanced deep autoencoder based feature representation learning for intelligent intrusion detection system,” Comput. Mater. Continua, Vol. 68, no. 3, pp. 3271–3288, 2021. DOI: 10.32604/cmc.2021.017665.
  • J. H. Lee, and K. H. Park, “GAN-based imbalanced data intrusion detection system,” Person. Ubiquitous Comput., Vol. 25, no. 1, pp. 121–128, 2021. DOI: 10.1007/s00779-019-01332-y.
  • A. Ferdowsi, and W. Saad, “Generative adversarial networks for distributed intrusion detection in the internet of things,” Proc. 2019 IEEE Glob. Commun. Confer. (GLOBECOM), pp. 1–6, 2019.
  • D. Liao, S. Huang, and Y. Tan, “Network intrusion detection method based on GAN model,” Proc. 2020 Intern. Confer. Comput. Commun. Netw. Secur. (CCNS), pp. 153–156, 2020. DOI: 10.1109/CCNS50731.2020.00041.
  • A. Singla, E. Bertino, and D. Verma, “Preparing network intrusion detection deep learning models with minimal data using adversarial domain adaptation,” Proc. 15th ACM Asia Confer. Comput. Commun. Secur., pp. 127–140, 2020. DOI: 10.1145/3320269.3384718.
  • D. LI, D. Kotani, and Y. Okabe, “Improving attack detection performance in NIDS using GAN,” Proc. 2020 IEEE Annu. Comput. Softw. Applic. Confer. (COMPSAC), pp. 817–825, 2020. DOI: 10.1109/COMPSAC48688.2020.0-162.
  • X. Liu, T. Li, and R. Zhang, “A GAN and feature selectionbased oversampling technique for intrusion detection,” Secur. Commun. Netw., Vol. 1, pp. 1–15, 2021.
  • T. Duan, Y. Tian, and H. Zhang, “Intelligent processing of intrusion detection data,” IEEE Access, Vol. 8, pp. 78330–78342, 2020. DOI: 10.1109/ACCESS.2020.2989498.
  • H. Jia, J. Liu, and M. Zhang, “Network intrusion detection based on IE-DBN model,” Comput. Commun., Vol. 178, pp. 131–140, 2021. DOI: 10.1016/j.comcom.2021.07.016.
  • J. Yang, Y. Sheng, and J. Wang, “A GBDT-paralleled quadratic ensemble learning for intrusion detection system,” IEEE Access, Vol. 8, pp. 75467–175482, 2020.
  • N. B. Singh, M. M. Singh, and A. Sarkar, “A novel wide & deep transfer learning stacked GRU framework for network intrusion detection,” J. Inform. Secur. Applic., Vol. 61, pp. 102899, 2021. DOI: 10.1016/j.jisa.2021.102899.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.