z-logo
open-access-imgOpen Access
Detecting Anomalies in Computer Networks Recurrent Neural Networks
Author(s) -
Suha Sahib Oleiwi,
Ghufran A. Omran,
Haider Rasheed Abdulshaheed
Publication year - 2019
Publication title -
xi'nan jiaotong daxue xuebao
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.308
H-Index - 21
ISSN - 0258-2724
DOI - 10.35741/issn.0258-2724.54.5.12
Subject(s) - computer science , set (abstract data type) , identification (biology) , task (project management) , intrusion detection system , machine learning , artificial intelligence , artificial neural network , domain (mathematical analysis) , anomaly detection , data mining , engineering , mathematical analysis , botany , mathematics , systems engineering , biology , programming language
Due to the widespread use of computer networks as well as the numerous attacks that such networks face, a fast and accurate means of detecting attacks represents an ever growing need. In this paper, a system that uses a recurrent neural network (RNN) is explored as a potential method for detecting intrusions. The investigated system is applied to an unlabeled cyber-security data set in order to determine its effectiveness. The goal is to train the system on every individual user included in the data set so as to learn their behavior and then to allow for the identification of any deviations in their behavior. It should be stressed here that deviations in behavior (or anomalies) cannot be labeled as “intrusions” without the involvement of domain experts. Nevertheless, they can be used to identify potential attacks, and they can also be presented to cyber-security experts for further evaluation. Several architectures for the system are explored with the aim of identifying the optimal one. A system is developed to be both fast and good at identifying anomalous behavior, while at the same time it must be able to adapt to any changes the attackers might implement to avoid detection, thus the results shown in this work using an unlabeled data set to train the network does not allow for the accuracy of the system for identifying the attackers. This means that identifying the optimal architecture is a difficult task. Yet, the system used in this paper is able to identify likely anomalies, which leads to the conclusion that RNNs do represent an effective means of flagging anomalous behavior.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here