AI Enhanced Automatic Response System for Resisting Network Threats

Network threats are malicious attacks that endanger network security. With terabits of information stored in the network and much of this information being confidential, cyber security turns to be very important. Most network protection mechanisms are based on firewall and Intrusion Detection System (IDS). However, with the diversification of cyber-attacks, traditional defense mechanisms cannot fully guarantee the security of the network. In this paper, we propose an automatic network threat response system based on machine learning and deep learning. It comprises three sub-modules: threat detection module, threat identification module and threat mitigation module. The experimental results show that the proposed system can handle 22 types of network threats in the KDD99 dataset and the rate of successful response is over 97%, which is much better than the traditional ways.

[1]  K. P. Soman,et al.  Applying convolutional neural network for network intrusion detection , 2017, 2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI).

[2]  Robert C. Atkinson,et al.  Threat analysis of IoT networks using artificial neural network intrusion detection system , 2016, 2016 International Symposium on Networks, Computers and Communications (ISNCC).

[3]  Keke Gai,et al.  An Investigation on Cyber Security Threats and Security Models , 2015, 2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing.

[4]  Chun-Hung Richard Lin,et al.  Intrusion detection system: A comprehensive review , 2013, J. Netw. Comput. Appl..

[5]  Jun Guo,et al.  Variational Bayesian Learning for Dirichlet Process Mixture of Inverted Dirichlet Distributions in Non-Gaussian Image Feature Modeling , 2019, IEEE Transactions on Neural Networks and Learning Systems.

[6]  Meikang Qiu,et al.  A User-Centric Data Protection Method for Cloud Storage Based on Invertible DWT , 2021, IEEE Transactions on Cloud Computing.

[7]  Audun Josang,et al.  Vulnerabilities in personal firewalls caused by poor security usability , 2010, 2010 IEEE International Conference on Information Theory and Information Security.

[8]  Zhihui Lu,et al.  Fusion of Cognitive Wireless Networks and Edge Computing , 2019, IEEE Wireless Communications.

[9]  Zhen Yang,et al.  Decorrelation of Neutral Vector Variables: Theory and Applications , 2017, IEEE Transactions on Neural Networks and Learning Systems.

[10]  Ali Dehghantanha,et al.  A deep Recurrent Neural Network based approach for Internet of Things malware threat hunting , 2018, Future Gener. Comput. Syst..

[11]  Jesus Mena,et al.  Investigative Data Mining for Security and Criminal Detection , 2002 .

[12]  Yue Wu,et al.  A New Intrusion Detection System Based on KNN Classification Algorithm in Wireless Sensor Network , 2014, J. Electr. Comput. Eng..

[13]  D. Shalini Punithavathani,et al.  Surveillance of anomaly and misuse in critical networks to counter insider threats using computational intelligence , 2014, Cluster Computing.

[14]  Frank S. Rietta Application layer intrusion detection for SQL injection , 2006, ACM-SE 44.

[15]  Gabriel Maciá-Fernández,et al.  Anomaly-based network intrusion detection: Techniques, systems and challenges , 2009, Comput. Secur..

[16]  Keke Gai,et al.  Dynamic energy-aware cloudlet-based mobile cloud computing model for green computing , 2016, J. Netw. Comput. Appl..

[17]  Dorothy E. Denning,et al.  An Intrusion-Detection Model , 1987, IEEE Transactions on Software Engineering.

[18]  Keke Gai,et al.  Energy-aware task assignment for mobile cyber-enabled applications in heterogeneous cloud computing , 2018, J. Parallel Distributed Comput..