Performance Analysis and Feature Selection for Network-Based Intrusion Detection With Deep Learning
| dc.contributor.author | Caner, Serhat | |
| dc.contributor.author | Erdoğmuş, Nesli | |
| dc.contributor.author | Erten, Yusuf Murat | |
| dc.date.accessioned | 2022-08-01T12:29:14Z | |
| dc.date.available | 2022-08-01T12:29:14Z | |
| dc.date.issued | 2022 | |
| dc.description.abstract | An intrusion detection system is an automated monitoring tool that analyzes network traffic and detects malicious activities by looking out either for known patterns of attacks or for an anomaly. In this study, intrusion detection and classification performances of different deep learning based systems are examined. For this purpose, 24 deep neural networks with four different architectures are trained and evaluated on CICIDS2017 dataset. Furthermore, the best performing model is utilized to inspect raw network traffic features and rank them with respect to their contributions to success rates. By selecting features with respect to their ranks, sets of varying size from 3 to 77 are assessed in terms of classification accuracy and time efficiency. The results show that recurrent neural networks with a certain level of complexity can achieve comparable success rates with state-of-the-art systems using a small feature set of size 9; while the average time required to classify a test sample is halved compared to the complete set. | en_US |
| dc.identifier.doi | 10.3906/ELK-2104-50 | |
| dc.identifier.issn | 1300-0632 | en_US |
| dc.identifier.issn | 1300-0632 | |
| dc.identifier.issn | 1303-6203 | |
| dc.identifier.scopus | 2-s2.0-85128265867 | |
| dc.identifier.uri | https://doi.org/10.3906/ELK-2104-50 | |
| dc.identifier.uri | https://hdl.handle.net/11147/12230 | |
| dc.identifier.uri | https://search.trdizin.gov.tr/yayin/detay/528806 | |
| dc.language.iso | en | en_US |
| dc.publisher | Türkiye Klinikleri | en_US |
| dc.relation.ispartof | Turkish Journal of Electrical Engineering and Computer Sciences | en_US |
| dc.rights | info:eu-repo/semantics/openAccess | en_US |
| dc.subject | Deep learning | en_US |
| dc.subject | Feature selection | en_US |
| dc.subject | Network intrusion detection | en_US |
| dc.subject | Recurrent Neural Networks | en_US |
| dc.title | Performance Analysis and Feature Selection for Network-Based Intrusion Detection With Deep Learning | en_US |
| dc.type | Article | en_US |
| dspace.entity.type | Publication | |
| gdc.author.id | 0000-0003-1242-4487 | |
| gdc.author.id | 0000-0002-6875-2685 | |
| gdc.author.id | 0000-0003-1242-4487 | en_US |
| gdc.author.id | 0000-0002-6875-2685 | en_US |
| gdc.author.institutional | Caner, Serhat | |
| gdc.author.institutional | Erdoğmuş, Nesli | |
| gdc.bip.impulseclass | C5 | |
| gdc.bip.influenceclass | C5 | |
| gdc.bip.popularityclass | C5 | |
| gdc.coar.access | open access | |
| gdc.coar.type | text::journal::journal article | |
| gdc.collaboration.industrial | false | |
| gdc.contributor.affiliation | 01. Izmir Institute of Technology | en_US |
| gdc.contributor.affiliation | 01. Izmir Institute of Technology | en_US |
| gdc.contributor.affiliation | İzmir Ekonomi Üniversitesi | en_US |
| gdc.description.department | İzmir Institute of Technology. Computer Engineering | en_US |
| gdc.description.endpage | 643 | en_US |
| gdc.description.issue | 3 | en_US |
| gdc.description.publicationcategory | Makale - Ulusal Hakemli Dergi - Kurum Öğretim Elemanı | en_US |
| gdc.description.scopusquality | Q2 | |
| gdc.description.startpage | 629 | en_US |
| gdc.description.volume | 30 | en_US |
| gdc.description.wosquality | Q3 | |
| gdc.identifier.openalex | W4236834583 | |
| gdc.identifier.trdizinid | 528806 | |
| gdc.identifier.wos | WOS:000774599800011 | |
| gdc.index.type | WoS | |
| gdc.index.type | Scopus | |
| gdc.index.type | TR-Dizin | |
| gdc.oaire.accesstype | GOLD | |
| gdc.oaire.diamondjournal | false | |
| gdc.oaire.impulse | 1.0 | |
| gdc.oaire.influence | 2.7082643E-9 | |
| gdc.oaire.isgreen | false | |
| gdc.oaire.popularity | 2.8752292E-9 | |
| gdc.oaire.publicfunded | false | |
| gdc.openalex.fwci | 0.16563176 | |
| gdc.openalex.normalizedpercentile | 0.55 | |
| gdc.opencitations.count | 1 | |
| gdc.plumx.mendeley | 11 | |
| gdc.plumx.scopuscites | 1 | |
| gdc.scopus.citedcount | 1 | |
| gdc.wos.citedcount | 0 | |
| relation.isAuthorOfPublication.latestForDiscovery | fd305a63-11b9-499e-a0a1-54bcd93fd36f | |
| relation.isOrgUnitOfPublication.latestForDiscovery | 9af2b05f-28ac-4014-8abe-a4dfe192da5e |
Files
Original bundle
1 - 1 of 1
Loading...
- Name:
- elk-30-3-11-2104-50.pdf
- Size:
- 641.3 KB
- Format:
- Adobe Portable Document Format
- Description:
- Article (Makale)
License bundle
1 - 1 of 1
Loading...
- Name:
- license.txt
- Size:
- 3.2 KB
- Format:
- Item-specific license agreed upon to submission
- Description:
