Please use this identifier to cite or link to this item:
https://rda.sliit.lk/handle/123456789/981
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Madhuvantha, K.A.N. | - |
dc.contributor.author | Hussain, M.H. | - |
dc.contributor.author | De Silva, H.W.D.T. | - |
dc.contributor.author | Liyanage, U.I.D. | - |
dc.contributor.author | Rupasinghe, L. | - |
dc.contributor.author | Liyanapathirana, C. | - |
dc.date.accessioned | 2022-02-07T08:10:30Z | - |
dc.date.available | 2022-02-07T08:10:30Z | - |
dc.date.issued | 2021-12-09 | - |
dc.identifier.issn | 978-1-6654-0862-2/21 | - |
dc.identifier.uri | http://rda.sliit.lk/handle/123456789/981 | - |
dc.description.abstract | Since available signature-based Intrusion Detection systems (IDS) are lacking in performance to identify such cyber threats and defend against novel attacks. It does not have the ability to detect zero-day or advanced malicious activities. To address the issue with signature-based IDS, a possible solution is to adopt anomaly-based detections to identify the latest cyber threats including zero days. We initially focused on network intrusions. This research paper discusses detecting network anomalies using AIbased technologies such as machine learning (ML) and natural language processing (NLP). In the proposed solution, network traffic logs and HTTP traffic data are taken as inputs using a mechanism called beats. Once relevant data has been extracted from the captured traffic, it will be passed to the AI engine to conduct further analysis. Algorithms such as Word2vec, Convolution Neural Network (CNN), Artificial Neural networks (ANN), and autoencoders are used in order to conduct the threat analysis. HTTP DATASET CSIC 2010, that NSL-KDD, CICIDS are the benchmarking datasets used in parallel with the above algorithms in order to receive high accuracy in detection. The outputted data is integrated and visualized using the Kibana dashboard and blockchain model is implemented to maintain and handle all the data. | en_US |
dc.description.sponsorship | Co-Sponsor:Institute of Electrical and Electronic Engineers (IEEE) Academic sponsor:SLIIT UNI Gold Sponsor :London Stock Exchange Group (LSEG) | en_US |
dc.language.iso | en | en_US |
dc.publisher | 2021 3rd International Conference on Advancements in Computing (ICAC), SLIIT | en_US |
dc.subject | NLP | en_US |
dc.subject | Anomaly detection | en_US |
dc.subject | Deep learning | en_US |
dc.subject | word2vec | en_US |
dc.subject | ANN | en_US |
dc.subject | CNN | en_US |
dc.subject | Beats | en_US |
dc.title | Autonomous Cyber AI for Anomaly Detection | en_US |
dc.type | Article | en_US |
dc.identifier.doi | 10.1109/ICAC54203.2021.9671203 | en_US |
Appears in Collections: | 3rd International Conference on Advancements in Computing (ICAC) | 2021 Department of Mechanical Engineering-Scopes Research Papers - Department of Mechanical Engineering Research Papers - IEEE |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
Autonomous_Cyber_AI_for_Anomaly_Detection.pdf Until 2050-12-31 | 1.48 MB | Adobe PDF | View/Open Request a copy |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.