NHANCING NETWORK SECURITY THROUGH INTEGRATED DEEP LEARNING ARCHITECTURES AND ATTENTION MECHANISMS
Abstract
With the widespread integration of the Internet into our daily life, ensuring network security has become crucial for applications like online retail, auctions, and file processing. By examining network process logs, intrusion detection and classification are crucial for spotting threats. The issue of network infiltration is made worse by the increasing volume and complexity of contemporary network traffic data, making traditional intrusion prevention methods insufficient. Therefore, low false alarm rates and effective intrusion detection systems are essential. In order to increase efficacy and efficiency, the model uses Convolution Neural Network-Long Short Time Memory (CNN-LSTM) for feature extraction and classification. The attention mechanism is used to choose the most discriminative features. Metrics including accuracy, precision, recall, and the F1-score are used to assess the model's performance. These metrics reveal how well the model detects intrusions (true positives), prevents harmful traffic from being mistakenly labelled as normal (true negatives), and classifies data overall. About 99.9% accuracy is attained by the model, with a precision of 0.98, recall of 1.0, and F1-score of 0.99. These results reflect its ability to effectively identify both normal traffic and intrusion attempts. The high accuracy underscores the model’s strong performance in distinguishing malicious from benign activities. This work contributed to cybersecurity by presenting an innovative solution to intrusion detection challenges. It highlights the importance of balanced datasets and advanced deep learning architectures to improve detection capabilities. The results highlight how well the model can handle the intricacies of contemporary network security risks.
References
Awujoola A A Adebisi S A Lawal A S 2020 Cybersecurity challenges in cloud computing environments International Journal of Cybersecurity and Digital Forensics 82 4556
Choudhary R Kesswan A 2020 Enhancing intrusion detection in network security using the NSLKDD dataset Journal of Cybersecurity Applications 51 1224
Gad I M 2021 Evaluation metrics for machine learning models Machine Learning Quarterly 144 2335
Ghani A A Usman M T Bello I S 2023 Advancements in intrusion detection using feedforward neural networks Journal of Advanced Machine Learning 113 6780
Gron M 2019 Confusion matrix and its role in machine learning performance evaluation Journal of Data Science Techniques 72 3341
Heydarian N 2022 Improving machine learning accuracy through model evaluation techniques Data Science Journal 91 4558
Kadam P Gupta N Sharma V 2022 The role of artificial intelligence in modern cybersecurity Computational Intelligence Review 101 2337
Kim J W Park J H Lee H S 2016 Using LSTMRNN for anomaly detection in network traffic Cybersecurity Studies 34 102118
Khalid S Ahmad R 2014 Feature selection techniques for reducing computational complexity in network intrusion detection Applied Machine Learning Journal 82 3450
Lee H 2019 IoT advancements and cybersecurity challenges IoT Applications Quarterly 62 1527
Lee H 2020 Proliferation of cyber threats in IoT environments Journal of IoT Security 71 2138
Meghdouri M Sadighian A 2018 Deep neural networks for intrusion detection systems Journal of Network Security 53 7888
Platanios E Bello I K Adil T 2017 Error rates in machine learning models Machine Intelligence Journal 42 5672
Rullo M De Sanctis M Lorenzo G 2023 Tackling cybersecurity threats with AI European Journal of Cybersecurity 91 3142
Santamaria M Costa P Xavier T 2018 Understanding error rates and their implications in predictive modeling Statistics and AI Quarterly 51 1228
Shone N Ngoc T N Bandyopadhyay T 2018 Machine learning techniques for anomaly detection in network traffic Journal of Machine Learning Applications 62 1429
Vijay R Anwar S Prakash D 2020 The impact of intrusion detection systems on cybersecurity Global Journal of Network Security 84 89105
Copyright (c) 2024 FUDMA JOURNAL OF SCIENCES
This work is licensed under a Creative Commons Attribution 4.0 International License.
FUDMA Journal of Sciences