IDEAS home Printed from https://ideas.repec.org/a/gam/jmathe/v11y2023i18p3894-d1238788.html
   My bibliography  Save this article

A Double-Layer Indemnity Enhancement Using LSTM and HASH Function Technique for Intrusion Detection System

Author

Listed:
  • Abdullah Marish Ali

    (Department of Computer Science, Faculty of Computing and Information Technology, King Abdulaziz University, Jeddah 21589, Saudi Arabia)

  • Fahad Alqurashi

    (Department of Computer Science, Faculty of Computing and Information Technology, King Abdulaziz University, Jeddah 21589, Saudi Arabia)

  • Fawaz Jaber Alsolami

    (Department of Computer Science, Faculty of Computing and Information Technology, King Abdulaziz University, Jeddah 21589, Saudi Arabia)

  • Sana Qaiyum

    (School of Computing and Informatics, University of Louisiana at Lafayette, Lafayette, LA 70504, USA)

Abstract

The Intrusion Detection System (IDS) is the most widely used network security mechanism for distinguishing between normal and malicious traffic network activities. It aids network security in that it may identify unforeseen hazards in network traffic. Several techniques have been put forth by different researchers for network intrusion detection. However, because network attacks have increased dramatically, making it difficult to execute precise detection rates quickly, the demand for effectively recognizing network incursion is growing. This research proposed an improved solution that uses Long Short-Term Memory (LSTM) and hash functions to construct a revolutionary double-layer security solution for IoT Network Intrusion Detection. The presented framework utilizes standard and well-known real-time IDS datasets such as KDDCUP99 and UNSWNB-15. In the presented framework, the dataset was pre-processed, and it employed the Shuffle Shepherd Optimization (SSO) algorithm for tracking the most informative attributes from the filtered database. Further, the designed model used the LSTM algorithm for classifying the normal and malicious network traffic precisely. Finally, a secure hash function SHA3-256 was utilized for countering the attacks. The intensive experimental assessment of the presented approach with the conventional algorithms emphasized the efficiency of the proposed framework in terms of accuracy, precision, recall, etc. The analysis showed that the presented model attained attack prediction accuracy of 99.92% and 99.91% for KDDCUP99 and UNSWNB-15, respectively.

Suggested Citation

  • Abdullah Marish Ali & Fahad Alqurashi & Fawaz Jaber Alsolami & Sana Qaiyum, 2023. "A Double-Layer Indemnity Enhancement Using LSTM and HASH Function Technique for Intrusion Detection System," Mathematics, MDPI, vol. 11(18), pages 1-25, September.
  • Handle: RePEc:gam:jmathe:v:11:y:2023:i:18:p:3894-:d:1238788
    as

    Download full text from publisher

    File URL: https://www.mdpi.com/2227-7390/11/18/3894/pdf
    Download Restriction: no

    File URL: https://www.mdpi.com/2227-7390/11/18/3894/
    Download Restriction: no
    ---><---

    References listed on IDEAS

    as
    1. OPhir Nave, 2020. "Modification of Semi-Analytical Method Applied System of ODE," Modern Applied Science, Canadian Center of Science and Education, vol. 14(6), pages 1-75, June.
    Full references (including those not matched with items on IDEAS)

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Gufran Abass & Suha Shihab, 2023. "Operational Matrix of New Shifted Wavelet Functions for Solving Optimal Control Problem," Mathematics, MDPI, vol. 11(14), pages 1-14, July.
    2. Loriana Andrei & Vasile-Aurel Caus, 2024. "Subordinations Results on a q -Derivative Differential Operator," Mathematics, MDPI, vol. 12(2), pages 1-20, January.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:gam:jmathe:v:11:y:2023:i:18:p:3894-:d:1238788. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: MDPI Indexing Manager (email available below). General contact details of provider: https://www.mdpi.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.