When reviewing suspicious network activity, we often run across encrypted traffic. The instructions assume you are familiar with Wireshark, and it focuses on Wireshark version 3.x. An explainable AI approach is implemented to interpret the proposed method and develop the trustable model.This tutorial is designed for security professionals who investigate suspicious network activity and review packet captures (pcaps) of the traffic. Detailed experiments are conducted to test the proposed approach using three standard datasets, i.e., UNSW-NB15, CIC-IDS2017, and NSL-KDD. Finally, the hybrid approach of the CNN-Long Short-Term Memory (CNN-LSTM) model is developed to detect different types of attacks from the deep features. Fourth, the Convolution Neural Network (CNN) model is designed to extract deep features from the balanced network traffic. Third, the Synthetic Minority Oversampling Technique (SMOTE) is implemented to balance abnormal traffic and detect minority attacks. Second, the transformer-based transfer learning approach is developed to learn the detailed feature representation using their semantic anchors. First, detailed information about each type of attack is gathered from network interaction descriptions, which include network nodes, attack type, reference, host information, etc. IDS-INT uses transformer-based transfer learning to learn feature interactions in both network feature representation and imbalanced data. To address these issues, this paper proposed an Intrusion Detection System using transformer-based transfer learning for Imbalanced Network Traffic (IDS-INT). It is challenging to identify a specific attack due to complex features and data imbalance issues. In terms of network perspectives, network traffic may contain an imbalanced number of harmful attacks when compared to normal traffic. In terms of feature perspectives, the network traffic may include a variety of elements such as attack reference, attack type, a sub-category of attack, host information, malicious scripts, etc. A network intrusion detection system is critical for cyber security against illegitimate attacks.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |