Convolution Neural Network-Based Higher Accurate Intrusion Identification System for the Network Security and Communication

With the development of communication systems, information securities remain one of the main concerns for the last few years. The smart devices are connected to communicate, process, compute, and monitor diverse real-time scenarios. Intruders are trying to attack the network and capture the organization’s important information for its own benefits. Intrusion detection is a way of identifying security violations and examining unwanted occurrences in a computer network. Building an accurate and effective identification system for intrusion detection or malicious activities can secure the existing system for smooth and secure end-to-end communication. In the proposed research work, a deep learning-based approach is followed for the accurate intrusion detection purposes to ensure the high security of the network. A convolution neural network based approach is followed for the feature classification and malicious data identification purposes. In the end, comparative results are generated after evaluating the performance of the proposed algorithm to other rival algorithms in the proposed field. These comparative algorithms were FGSM, JSMA, C&W, and ENM. After evaluating the performance of these algorithms and the proposed algorithm based on different threshold values ranging, Lp norms, and different parametric values for c, it was concluded that the proposed algorithm outperforms with small Lp values and high Kitsune scores. These results reflect that the proposed research is promising toward the identification of attack on data packets, and it also reflects the applicability of the proposed algorithms in the network security field.

[1]  Igor V. Kotenko,et al.  Computer attack modeling and security evaluation based on attack graphs , 2013, 2013 IEEE 7th International Conference on Intelligent Data Acquisition and Advanced Computing Systems (IDAACS).

[2]  Vijay Laxmi,et al.  AndroTaint: An efficient android malware detection framework using dynamic taint analysis , 2017, 2017 ISEA Asia Security and Privacy (ISEASP).

[3]  Yu Cheng,et al.  Security Analysis of Mobile Device-to-Device Network Applications , 2019, IEEE Internet of Things Journal.

[4]  Zhiyong Zhang,et al.  A novel crowd evaluation method for security and trustworthiness of online social networks platforms based on signaling theory , 2017, J. Comput. Sci..

[5]  Aziz Mohaisen,et al.  Android Malware Detection Using Complex-Flows , 2017, 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS).

[6]  Zahid Ullah,et al.  KNN and ANN-based Recognition of Handwritten Pashto Letters using Zoning Features , 2018 .

[7]  P. Subsorn,et al.  A COMPARATIVE ANALYSIS OF INTERNET BANKING SECURITY IN THAILAND: A CUSTOMER PERSPECTIVE , 2012 .

[8]  Munam Ali Shah,et al.  Survey on security threats of smartphones in Internet of Things , 2016, 2016 22nd International Conference on Automation and Computing (ICAC).

[9]  Hao Hao Song,et al.  Testing and Evaluation System for Cloud Computing Information Security Products , 2020 .

[10]  David A. Wagner,et al.  Towards Evaluating the Robustness of Neural Networks , 2016, 2017 IEEE Symposium on Security and Privacy (SP).

[11]  Yan Song,et al.  An end-to-end model for Android malware detection , 2017, 2017 IEEE International Conference on Intelligence and Security Informatics (ISI).

[12]  Juha Karhunen,et al.  A pragmatic android malware detection procedure , 2017, Comput. Secur..

[13]  Md. Zakirul Alam Bhuiyan,et al.  Security and Attack Vector Analysis of IoT Devices , 2017, SpaCCS Workshops.

[14]  Khaled Salah,et al.  IoT security: Review, blockchain solutions, and open challenges , 2017, Future Gener. Comput. Syst..

[15]  Amala V. Rajan,et al.  Internet of Things (IoT): Application systems and security vulnerabilities , 2016, 2016 5th International Conference on Electronic Devices, Systems and Applications (ICEDSA).

[16]  Srikanta Patnaik,et al.  Survey on IoT security: Challenges and solution using machine learning, artificial intelligence and blockchain technology , 2020, Internet Things.

[17]  Mahmoud Ammar,et al.  Journal of Information Security and Applications , 2022 .

[18]  Yi An,et al.  Ecological security evaluation based on entropy matter-element model: A case study of Kunming city, southwest China , 2019, Ecological Indicators.

[19]  Jin Li,et al.  The security of machine learning in an adversarial setting: A survey , 2019, J. Parallel Distributed Comput..

[20]  Vijay Sivaraman,et al.  Systematically Evaluating Security and Privacy for Consumer IoT Devices , 2017, IoT S&P@CCS.

[21]  Jassim Happa,et al.  GARMDROID: IoT Potential Security Threats Analysis Through the Inference of Android Applications Hardware Features Requirements , 2017 .

[22]  Divya Bansal,et al.  Zero-day malware detection , 2016, 2016 Sixth International Symposium on Embedded Computing and System Design (ISED).

[23]  Stefanos Gritzalis,et al.  Evolution and Trends in IoT Security , 2018, Computer.

[24]  Habib Ullah Khan,et al.  Security Analysis of IoT Devices by Using Mobile Computing: A Systematic Literature Review , 2020, IEEE Access.

[25]  Andreas Pitsillides,et al.  Mobile Phone Computing and the Internet of Things: A Survey , 2016, IEEE Internet of Things Journal.

[26]  Jinfeng Yi,et al.  EAD: Elastic-Net Attacks to Deep Neural Networks via Adversarial Examples , 2017, AAAI.

[27]  Ragib Hasan,et al.  Towards an Analysis of Security Issues, Challenges, and Open Problems in the Internet of Things , 2015, 2015 IEEE World Congress on Services.

[28]  Xin Su,et al.  Study to Improve Security for IoT Smart Device Controller: Drawbacks and Countermeasures , 2018, Secur. Commun. Networks.

[29]  Ateeq Ur Rehman,et al.  Privacy and Security—Limits of Personal Information to Minimize Loss of Privacy , 2019, Lecture Notes in Networks and Systems.

[30]  Jiahang Yuan,et al.  Regional energy security performance evaluation in China using MTGS and SPA-TOPSIS. , 2019, The Science of the total environment.

[31]  Murthy V. Jonnalagedda,et al.  Clustering based on correlation fractal dimension over an evolving data stream , 2018, Int. Arab J. Inf. Technol..

[32]  Jonathon Shlens,et al.  Explaining and Harnessing Adversarial Examples , 2014, ICLR.

[33]  Andrea Zanella,et al.  IoT: Internet of Threats? A Survey of Practical Security Vulnerabilities in Real IoT Devices , 2019, IEEE Internet of Things Journal.

[34]  Habib Ullah Khan,et al.  Modelling Features-Based Birthmarks for Security of End-to-End Communication System , 2020, Secur. Commun. Networks.

[35]  Zhihua Wang,et al.  FgDetector: Fine-Grained Android Malware Detection , 2017, 2017 IEEE Second International Conference on Data Science in Cyberspace (DSC).

[36]  Ali Feizollah,et al.  AndroDialysis: Analysis of Android Intent Effectiveness in Malware Detection , 2017, Comput. Secur..

[37]  Agusti Solanas,et al.  Security and Privacy Analysis of Mobile Health Applications: The Alarming State of Practice , 2018, IEEE Access.

[38]  Mahdi Abadi,et al.  AMD-EC: Anomaly-based Android malware detection using ensemble classifiers , 2017, 2017 Iranian Conference on Electrical Engineering (ICEE).

[39]  Mbarek Marwan,et al.  Security Enhancement in Healthcare Cloud using Machine Learning , 2018 .

[40]  Ananthram Swami,et al.  The Limitations of Deep Learning in Adversarial Settings , 2015, 2016 IEEE European Symposium on Security and Privacy (EuroS&P).

[41]  Wendy Ivins,et al.  A multifaceted evaluation of the reference model of information assurance & security , 2016, Comput. Secur..

[42]  Petros Spachos,et al.  Machine Learning Based Solutions for Security of Internet of Things (IoT): A Survey , 2020, J. Netw. Comput. Appl..

[43]  Donald F. Towsley,et al.  Security importance assessment for system objects and malware detection , 2017, Comput. Secur..

[44]  Igor V. Kotenko,et al.  Common Framework for Attack Modeling and Security Evaluation in SIEM Systems , 2012, 2012 IEEE International Conference on Green Computing and Communications.

[45]  Shah Nazir,et al.  Evaluating Security of Software Components Using Analytic Network Process , 2013, 2013 11th International Conference on Frontiers of Information Technology.

[46]  Helmut Krcmar,et al.  A comprehensive model of information security factors for decision-makers , 2020, Comput. Secur..

[47]  Zarul Fitri Zaaba,et al.  A Review of Usability and Security Evaluation Model of Ecommerce Website , 2019, Procedia Computer Science.

[48]  Latifa Ben Arfa Rabai,et al.  A Multidimensional Approach towards a Quantitative Assessment of Security Threats , 2015, ANT/SEIT.

[49]  George C. Hadjichristofi,et al.  Internet of Things: Security vulnerabilities and challenges , 2015, 2015 IEEE Symposium on Computers and Communication (ISCC).

[50]  Muhammad Imran,et al.  Deep learning and big data technologies for IoT security , 2020, Comput. Commun..

[51]  Debabrata Samanta,et al.  An Overview: Security Issue in IoT Network , 2018, 2018 2nd International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC), 2018 2nd International Conference on.

[52]  Shah Nazir,et al.  Fuzzy logic based decision support system for component security evaluation , 2018, Int. Arab J. Inf. Technol..

[53]  Sabu M. Thampi,et al.  Vulnerability-based risk assessment and mitigation strategies for edge devices in the Internet of Things , 2019, Pervasive Mob. Comput..