Search Paper
  • Home
  • Login
  • Categories
  • Post URL
  • Academic Resources
  • Contact Us

 

Comparative Analysis of Feature Selection Techniques for LSTM Based Network Intrusion Detection Models

google+
Views: 11                 

Author :  Shahir Kottilingal

Affiliation :  Wakeb Data

Country :  KSA

Category :  Software Engineering & Security

Volume, Issue, Month, Year :  16, 5, September, 2024

Abstract :


Network intrusion systems are inevitable in protecting enterprise assets and improving cybersecurity. The research community is always on the lookout for new approaches to improve network intrusion detection. Network intrusion systems with deep learning models are the major advancement in this field. There are many varieties of network intrusion detection systems with deep learning models that are used nowadays. Even though researchers are investing heavily in their efforts on developing better network intrusion detection systems, rapid advancement in network intrusion attempts warrant further studies in this area. In this study, I am trying to explore the impact of the different most common feature selection methods on the performance of the LSTM-based network intrusion detection system. Benchmark network intrusion dataset UNSW-NB15 was explored for this study. This study explored 8 types of LSTM models in combination with different feature selection methods. The outcome of the study was very interesting as the LSTM model without applying any feature selection method, outperformed other combinations of models.

Keyword :  Network Intrusion Detection, Deep Learning, LSTM, Feature Selection & UNSW-NB15

URL :  https://aircconline.com/ijnsa/V16N5/16524ijnsa01.pdf

User Name : Brendon Clarke
Posted 09-10-2024 on 19:48:24 AEDT



Related Research Work

  • The Effect Of Information Technology Using Enterprise Security Risk Management
  • Controlling Information Flows During Software Development
  • An Autonomous Ball-picking Mechanic To Reduce Manual Labor During Ball Retrieval Using Sensors And Machine Learning
  • Benchmarks For Evaluating Anomaly Based Intrusion Detection Solutions

About Us | Post Cfp | Share URL Main | Share URL category | Post URL
All Rights Reserved @ Call for Papers - Conference & Journals