An optimized LSTM-based deep learning model for anomaly network intrusion detection.

Sci Rep

Department of Electrical and Electronics Engineering, Manipal Institute of Technology Bengaluru, Manipal Academy of Higher Education, Manipal, India.

Published: January 2025

The increasing prevalence of network connections is driving a continuous surge in the requirement for network security and safeguarding against cyberattacks. This has triggered the need to develop and implement intrusion detection systems (IDS), one of the key components of network perimeter aimed at thwarting and alleviating the issues presented by network invaders. Over time, intrusion detection systems have been instrumental in identifying network breaches and deviations. Several researchers have recommended the implementation of machine learning approaches in IDSs to counteract the menace posed by network intruders. Nevertheless, most previously recommended IDSs exhibit a notable false alarm rate. To mitigate this challenge, exploring deep learning methodologies emerges as a viable solution, leveraging their demonstrated efficacy across various domains. Hence, this article proposes an optimized Long Short-Term Memory (LSTM) for identifying anomalies in network traffic. The presented model uses three optimization methods, i.e., Particle Swarm Optimization (PSO), JAYA, and Salp Swarm Algorithm (SSA), to optimize the hyperparameters of LSTM. In this study, NSL KDD, CICIDS, and BoT-IoT datasets are taken into consideration. To evaluate the efficacy of the proposed model, several indicators of performance like Accuracy, Precision, Recall, F-score, True Positive Rate (TPR), False Positive Rate (FPR), and Receiver Operating Characteristic curve (ROC) have been chosen. A comparative analysis of PSO-LSTMIDS, JAYA-LSTMIDS, and SSA-LSTMIDS is conducted. The simulation results demonstrate that SSA-LSTMIDS surpasses all the models examined in this study across all three datasets.

Download full-text PDF

Source
http://dx.doi.org/10.1038/s41598-025-85248-zDOI Listing

Publication Analysis

Top Keywords

intrusion detection
12
deep learning
8
network
8
detection systems
8
positive rate
8
optimized lstm-based
4
lstm-based deep
4
learning model
4
model anomaly
4
anomaly network
4

Similar Publications

An optimized LSTM-based deep learning model for anomaly network intrusion detection.

Sci Rep

January 2025

Department of Electrical and Electronics Engineering, Manipal Institute of Technology Bengaluru, Manipal Academy of Higher Education, Manipal, India.

The increasing prevalence of network connections is driving a continuous surge in the requirement for network security and safeguarding against cyberattacks. This has triggered the need to develop and implement intrusion detection systems (IDS), one of the key components of network perimeter aimed at thwarting and alleviating the issues presented by network invaders. Over time, intrusion detection systems have been instrumental in identifying network breaches and deviations.

View Article and Find Full Text PDF

Biomarkers.

Alzheimers Dement

December 2024

Department of Bionano Technology, Gachon University, Seongnam, Korea, Republic of (South).

Background: Electroencephalography (EEG) is a non-intrusive technique that provides comprehensive insights into the electrical activities of the brain's cerebral cortex. The brain signals obtained from EEGs can be used as a neuropsychological biomarker to detect different stages of Alzheimer's disease (AD) through quantitative EEG (qEEG) analysis. This paper investigates the difference in the abnormalities of resting state EEG (rEEG) signals between eyes-open (EOR) and eyes-closed (ECR) in AD by analyzing 19- scalp electrode EEG signals and making a comparison with healthy controls (HC).

View Article and Find Full Text PDF

Technology and Dementia Preconference.

Alzheimers Dement

December 2024

Department of Bionano Technology, Gachon University, Seongnam, Korea, Republic of (South).

Background: Electroencephalography (EEG) is a non-intrusive technique that provides comprehensive insights into the electrical activities of the brain's cerebral cortex. The brain signals obtained from EEGs can be used as a neuropsychological biomarker to detect different stages of Alzheimer's disease (AD) through quantitative EEG (qEEG) analysis. This paper investigates the difference in the abnormalities of resting state EEG (rEEG) signals between eyes-open (EOR) and eyes-closed (ECR) in AD by analyzing 19- scalp electrode EEG signals and making a comparison with healthy controls (HC).

View Article and Find Full Text PDF

In recent times, there has been rapid growth of technologies that have enabled smart infrastructures-IoT-powered smart grids, cities, and healthcare systems. But these resource-constrained IoT devices cannot be protected by existing security mechanisms against emerging cyber threats. The aim of the paper is to present an improved security for smart healthcare IoT systems by developing an architecture for IADCL.

View Article and Find Full Text PDF

The rapid integration of Internet of Things (IoT) systems in various sectors has escalated security risks due to sophisticated multilayer attacks that compromise multiple security layers and lead to significant data loss, personal information theft, financial losses etc. Existing research on multilayer IoT attacks exhibits gaps in real-world applicability, due to reliance on outdated datasets with a limited focus on adaptive, dynamic approaches to address multilayer vulnerabilities. Additionally, the complete reliance on automated processes without integrating human expertise in feature selection and weighting processes may affect the reliability of detection models.

View Article and Find Full Text PDF

Want AI Summaries of new PubMed Abstracts delivered to your In-box?

Enter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!