4.6 Article

A vector convolutional deep autonomous learning classifier for detection of cyber attacks

Publisher

SPRINGER
DOI: 10.1007/s10586-022-03577-4

Keywords

Attack detection; Autonomous deep learning; Convolutional neural network; Cyber attacks; Network traffic

Ask authors/readers for more resources

This paper proposes a method for detecting cyber attacks using deep learning techniques. By using the Vector Convolutional Deep Autonomous Learning (VCDAL) classifier, unknown attacks can be detected in real time, and significant results have been achieved in experiments.
Nowadays with the exponential rise of traffic over large scale networks, Internet is vulnerable to increased number of cyber attacks. The cyber attacks attempt to steal, alter, or destroy information through unauthorized access to systems. Recently, deep learning techniques have been proposed to detect cyber attacks. The existing deep learning based detection systems perform static detection of attacks failing to capture unknown attacks happening in evolving large network traffic. The unknown attacks could be detected on the fly if a generalizable model is designed for each evolving class of network traffic. This is effectively represented in the proposed Vector Convolutional Deep Autonomous Learning (VCDAL) classifier to detect cyber attacks in the network traffic data streams. The proposed VCDAL classifier extracts the features using vector convolutional neural network, learns the features automatically using incremental learning with distilled cross entropy, and classifies the evolving network traffic using softmax function. The proposed classifier was tested by conducting experiments on benchmark network traffic datasets and it is obvious that the proposed classifier can possibly recognize both known and unknown cyber attacks. Furthermore, it is observed from the comparative analysis that the proposed VCDAL classifier exhibits significant results compared to the existing base classifiers and state-of-the-art deep learning approaches.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.6
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

Article Computer Science, Artificial Intelligence

Deep Radial Intelligence with Cumulative Incarnation approach for detecting Denial of Service attacks

Bhuvaneswari N. G. Amma, S. Selvakumar

NEUROCOMPUTING (2019)

Article Computer Science, Information Systems

A statistical class center based triangle area vector method for detection of denial of service attacks

N. G. Bhuvaneswari Amma, S. Selvakumar

Summary: The paper proposes a class center based triangle area vector (CCTAV) method for DoS attack detection, which reduces the complexity of feature extraction and enhances attack detection accuracy by computing the mean of target classes and extracting correlations between features. The proposed method is evaluated using tenfold cross validation and demonstrates significant results compared to existing attack detection methods.

CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS (2021)

Article Computer Science, Theory & Methods

Anomaly detection framework for Internet of things traffic using vector convolutional deep learning approach in fog environment

Bhuvaneswari N. G. Amma, S. Selvakumar

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2020)

Article Computer Science, Information Systems

A Statistical Approach for Detection of Denial of Service Attacks in Computer Networks

N. G. Bhuvaneswari Amma, S. Selvakumar, R. Leela Velusamy

IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT (2020)

Article Engineering, Electrical & Electronic

A Novel Scrambled Data Hiding Approach Towards Securing Sensitive Data

Bhuvaneswari N. G. Amma, Jitaksh Kapoor

Summary: Security of data is crucial in our digitized world, and a novel approach using encryption and LSB embedding to hide sensitive information without loss of quality has been proposed.

IETE JOURNAL OF RESEARCH (2021)

Article Computer Science, Artificial Intelligence

Optimization of vector convolutional deep neural network using binary real cumulative incarnation for detection of distributed denial of service attacks

N. G. Bhuvaneswari Amma, S. Selvakumar

Summary: This article introduces an optimized deep neural network structure for detecting DDoS attacks, using the CuI optimization technique. Experimental results show that this optimization method outperforms existing techniques and achieves significant performance improvement.

NEURAL COMPUTING & APPLICATIONS (2022)

Article Engineering, Electrical & Electronic

PClusBA: A Novel Partition Clustering-Based Biometric Authentication Mechanism

Nageswari N. G. Amma, Bhuvaneswari N. G. Amma

Summary: The text discusses an authentication mechanism based on fingerprint biometrics, optimizing the extraction of unique points using partition clustering for higher uniqueness and security. The proposed mechanism, PClusBA, uses a cluster count of eight to achieve a 192-bit UID in accordance with NIST standards, and was found to provide unique results for each image tested.

IETE JOURNAL OF RESEARCH (2022)

Article Computer Science, Information Systems

LPCOCN: A Layered Paddy Crop Optimization-Based Capsule Network Approach for Anomaly Detection at IoT Edge

Bhuvaneswari Amma Narayanavadivoo Gopinathan, Velliangiri Sarveshwaran, Vinayakumar Ravi, Rajasekhar Chaganti

Summary: This article suggests a method for anomaly detection in IoT networks to protect smart devices from cyberattacks. By selecting an optimal set of IoT traffic features and using a learning algorithm for classification, efficient detection at the edge of the IoT network can be achieved. The proposed approach utilizes a layered paddy crop optimization algorithm for feature selection and employs a capsule network for labeling traffic as normal or attack. The experimental results demonstrate the effectiveness of the proposed strategy, outperforming existing base classifiers and feature selection approaches.

INFORMATION (2022)

Article Computer Science, Information Systems

Towards improving the performance of traffic sign recognition using support vector machine based deep learning model

N. G. Bhuvaneswari Amma, Vikrant Rajput

Summary: Nowadays, autonomous vehicles are evolving with the advancements in cutting edge technologies. Traffic recognition system is required to efficiently recognize traffic signals. It consists of sign detection and classification. The proposed approach utilizes a support vector machine based fast detection module to detect traffic signs into different traffic classes, and deep convolutional neural networks for further classification into subclasses. Experimental results on benchmark traffic sign image datasets demonstrate that the proposed approach significantly improves traffic sign recognition accuracy compared to state-of-the-art systems.

MULTIMEDIA TOOLS AND APPLICATIONS (2023)

Article Computer Science, Information Systems

Detection of DoS Attacks in Smart City Networks With Feature Distance Maps: A Statistical Approach

S. Velliangiri, N. G. Bhuvaneswari Amma, Nam-Kyun Baik

Summary: This paper proposes a statistical method for identifying DoS attacks in smart city networks, and develops a DoS attack detection model with low computational complexity and low false positive rate. Using smart city network traffic data set and feature distance map method for statistical analysis, this approach enhances the accuracy of attack detection.

IEEE INTERNET OF THINGS JOURNAL (2023)

Proceedings Paper Computer Science, Information Systems

IoTInDet: Detecting Internet of Things Intrusions with Class Scatter Ratio and Hellinger Distance Statistics

N. G. Bhuvaneswari Amma, P. Valarmathi

Summary: The evolution of technology has led to an increase in cyberattacks on IoT devices. Statistical methods can be used to detect intrusions in IoT traffic, but current techniques suffer from the curse of dimensionality. To address this issue, a method called IoT Intrusion Detection (IoTInDet) is proposed, which identifies intrusions by selecting relevant features and calculating their correlation.

INFORMATION SYSTEMS SECURITY, ICISS 2022 (2022)

Proceedings Paper Computer Science, Artificial Intelligence

Rumor Detect: Detection of Rumors in Twitter Using Convolutional Deep Tweet Learning Approach

N. G. Bhuvaneswari Amma, S. Selvakumar

COMPUTATIONAL VISION AND BIO-INSPIRED COMPUTING (2020)

Proceedings Paper Engineering, Electrical & Electronic

VC DeepFL: Vector Convolutional Deep Feature Learning Approach for Identification of Known and Unknown Denial of Service Attacks

Narayanavadivoo Gopinathan Bhuvaneswari Amma, Selvakumar Subramanian

PROCEEDINGS OF TENCON 2018 - 2018 IEEE REGION 10 CONFERENCE (2018)

Proceedings Paper Green & Sustainable Science & Technology

Clasp:Detecting Potential Deadlocks and Its Removal by Iterative Method

K. Shankari, N. G. Bhuvaneswari Amma

PROCEEDINGS OF 2015 ONLINE INTERNATIONAL CONFERENCE ON GREEN ENGINEERING AND TECHNOLOGIES (IC-GET) (2015)

No Data Available