14
views
0
recommends
+1 Recommend
0 collections
    0
    shares
      • Record: found
      • Abstract: found
      • Article: found
      Is Open Access

      An efficient intrusion detection model based on convolutional spiking neural network

      research-article

      Read this article at

      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Abstract

          Many intrusion detection techniques have been developed to ensure that the target system can function properly under the established rules. With the booming Internet of Things (IoT) applications, the resource-constrained nature of its devices makes it urgent to explore lightweight and high-performance intrusion detection models. Recent years have seen a particularly active application of deep learning (DL) techniques. The spiking neural network (SNN), a type of artificial intelligence that is associated with sparse computations and inherent temporal dynamics, has been viewed as a potential candidate for the next generation of DL. It should be noted, however, that current research into SNNs has largely focused on scenarios where limited computational resources and insufficient power sources are not considered. Consequently, even state-of-the-art SNN solutions tend to be inefficient. In this paper, a lightweight and effective detection model is proposed. With the help of rational algorithm design, the model integrates the advantages of SNNs as well as convolutional neural networks (CNNs). In addition to reducing resource usage, it maintains a high level of classification accuracy. The proposed model was evaluated against some current state-of-the-art models using a comprehensive set of metrics. Based on the experimental results, the model demonstrated improved adaptability to environments with limited computational resources and energy sources.

          Related collections

          Most cited references42

          • Record: found
          • Abstract: not found
          • Conference Proceedings: not found

          Toward Generating a New Intrusion Detection Dataset and Intrusion Traffic Characterization

            Bookmark
            • Record: found
            • Abstract: not found
            • Article: not found

            Deep Recurrent Neural Network For IoT Intrusion Detection System

              Bookmark
              • Record: found
              • Abstract: found
              • Article: not found
              Is Open Access

              CNN-Based Network Intrusion Detection against Denial-of-Service Attacks

              As cyberattacks become more intelligent, it is challenging to detect advanced attacks in a variety of fields including industry, national defense, and healthcare. Traditional intrusion detection systems are no longer enough to detect these advanced attacks with unexpected patterns. Attackers bypass known signatures and pretend to be normal users. Deep learning is an alternative to solving these issues. Deep Learning (DL)-based intrusion detection does not require a lot of attack signatures or the list of normal behaviors to generate detection rules. DL defines intrusion features by itself through training empirical data. We develop a DL-based intrusion model especially focusing on denial of service (DoS) attacks. For the intrusion dataset, we use KDD CUP 1999 dataset (KDD), the most widely used dataset for the evaluation of intrusion detection systems (IDS). KDD consists of four types of attack categories, such as DoS, user to root (U2R), remote to local (R2L), and probing. Numerous KDD studies have been employing machine learning and classifying the dataset into the four categories or into two categories such as attack and benign. Rather than focusing on the broad categories, we focus on various attacks belonging to same category. Unlike other categories of KDD, the DoS category has enough samples for training each attack. In addition to KDD, we use CSE-CIC-IDS2018 which is the most up-to-date IDS dataset. CSE-CIC-IDS2018 consists of more advanced DoS attacks than that of KDD. In this work, we focus on the DoS category of both datasets and develop a DL model for DoS detection. We develop our model based on a Convolutional Neural Network (CNN) and evaluate its performance through comparison with an Recurrent Neural Network (RNN). Furthermore, we suggest the optimal CNN design for the better performance through numerous experiments.
                Bookmark

                Author and article information

                Contributors
                luxing994@zju.edu.cn
                Journal
                Sci Rep
                Sci Rep
                Scientific Reports
                Nature Publishing Group UK (London )
                2045-2322
                25 March 2024
                25 March 2024
                2024
                : 14
                : 7054
                Affiliations
                [1 ]Faculty of Computing, Universiti Teknologi Malaysia, ( https://ror.org/026w31v75) Johor Bahru, 81310 Johor, Malaysia
                [2 ]School of Data Science and Artificial Intelligence, Wenzhou University of Technology, ( https://ror.org/020hxh324) Wenzhou, 325035 Zhejiang China
                [3 ]College of Computing and Digital Technology, Birmingham City University, ( https://ror.org/00t67pt25) Birmingham, B47XG United Kingdom
                Article
                57691
                10.1038/s41598-024-57691-x
                10963367
                38528084
                c19652ae-140d-4689-adfe-ee01932c6a3f
                © The Author(s) 2024

                Open Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article's Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article's Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by/4.0/.

                History
                : 25 January 2024
                : 20 March 2024
                Categories
                Article
                Custom metadata
                © Springer Nature Limited 2024

                Uncategorized
                spiking neural network,convolutional neural network,intrusion detection,cyber security,deep learning,artificial intelligence,computer science,information technology

                Comments

                Comment on this article