New Intrusion Detection Technology Driven by Artificial Intelligence

A special issue of Applied Sciences (ISSN 2076-3417). This special issue belongs to the section "Computing and Artificial Intelligence".

Deadline for manuscript submissions: closed (20 August 2023) | Viewed by 6470

Special Issue Editors


E-Mail Website
Guest Editor
School of Computer Science and Technology, Zhoukou Normal University, Zhoukou, China
Interests: computer network; network security; pattern recognition and intelligent systems; wireless sensor networks; edge computing

E-Mail Website
Guest Editor
Centre for Smart Analytics, Federation University Australia, Ballarat, VIC 3842, Australia
Interests: Internet of Things; machine learning; data analytics; cybersecurity
Special Issues, Collections and Topics in MDPI journals

E-Mail Website
Guest Editor
Department of Computing, Macquarie University, Sydney 2109, Australia
Interests: graph data mining; social networks; trust computing
Special Issues, Collections and Topics in MDPI journals

Special Issue Information

Dear Colleagues,

Intrusion detection first needs to extract important features in the computer system and network, then compare and analyze these features with normal features and known intrusion features and find in advance any potential intrusion that might cause harm to the computer system and network. Early detection of intrusion will thwart attackers by adopting appropriate security measures to eliminate the impending threat. Therefore, intrusion detection is a key research focus and an important aspect in the field of computer and network security. The recent Cyber Incident Response Reports show an increased level of intrusion during the pandemic, which further underpins the importance of this research. However, with the continuous emergence of new network architectures such as the Internet of Things (IoT) and software-defined networks (SDN), a large number of intelligent terminals and heterogeneous IoT devices are deployed in the network. The openness of many new network architectures and the limited computing resources of terminal devices will bring certain threats and challenges to the security of existing networks. The emergence of new artificial intelligence technology has brought innovative solutions to intrusion detection. Determining how to use new artificial intelligence technologies such as deep learning and pattern recognition to improve the accuracy of intrusion detection and reduce its time complexity is still an open problem.

Our Special Issue will serve as a forum to bring together active researchers all over the world to share their recent advances in intrusion detection based on artificial intelligence in different aspects. Our targets include: (1) state-of-the-art theories and novel applications in intrusion detection model based on deep learning; (2) novel intrusion detection framework based on artificial intelligence; (3) intrusion detection methods based on artificial intelligence in a specific environment (such as IoT or edge computing environment); (4) new intelligent optimization methods of artificial intelligence intrusion detection; (5) analyses and studies on the behavioral characteristics of network traffic and new traffic identification method based deep learning; and (6) survey articles reporting recent progress in intrusion detection methods based on artificial intelligence.

Potential topics include but are not limited to the following:

  • Innovative intrusion detection models based on deep learning;
  • Novel intrusion detection framework based on Artificial Intelligence;
  • Intrusion detection method based on artificial intelligence for the Internet of Things;
  • Intrusion detection method based on artificial intelligence for edge computing;
  • New intelligent optimization methods for intrusion detection based on artificial intelligence;
  • Novel traffic identification methods based on deep learning;
  • How to mine and select more effective network behavior features to identify malicious network traffic;
  • New network abnormal traffic detection models based on deep learning/reinforcement learning;
  • How to build new intrusion detection benchmark data sets;
  • Hybrid/integrated deep learning model for efficient intrusion detection in big data environment;
  • Novel intrusion detection models based on machine learning/deep learning using blockchain;
  • Encrypted traffic identification in high-speed network environment;
  • How to address the data imbalance problem in building intrusion detection models;
  • Comprehensive survey articles on recent intrusion detection techniques highlighting future challenges.

Prof. Dr. Shi Dong
Prof. Dr. Joarder Kamruzzaman
Dr. Guanfeng Liu
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Applied Sciences is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2400 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Published Papers (3 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Research

28 pages, 1591 KiB  
Article
DCIDS—Distributed Container IDS
by Savio Levy Rocha, Fabio Lucio Lopes de Mendonca, Ricardo Staciarini Puttini, Rafael Rabelo Nunes and Georges Daniel Amvame Nze
Appl. Sci. 2023, 13(16), 9301; https://doi.org/10.3390/app13169301 - 16 Aug 2023
Cited by 1 | Viewed by 998
Abstract
Intrusion Detection Systems (IDS) still prevail as an important line of defense in modern computing environments. Cloud environment characteristics such as resource sharing, extensive connectivity, and agility in deploying new applications pose security risks that are increasingly exploited. New technologies like container platforms [...] Read more.
Intrusion Detection Systems (IDS) still prevail as an important line of defense in modern computing environments. Cloud environment characteristics such as resource sharing, extensive connectivity, and agility in deploying new applications pose security risks that are increasingly exploited. New technologies like container platforms require IDS to evolve to effectively detect intrusive activities in these environments, and advancements in this regard are still necessary. In this context, this work proposes a framework for implementing an IDS focused on container platforms using machine learning techniques for anomaly detection in system calls. We contribute with the ability to build a dataset of system calls and share it with the community; the generation of anomaly detection alerts in open-source applications to support the SOC through the analysis of these system calls; the possibility of implementing different machine learning algorithms and approaches to detect anomalies in system calls (such as frequency, sequence, and arguments among other type of data) aiming greater detection efficiency; and the ability to integrate the framework with other tools, improving collaborative security. A five-layer architecture was built using free tools and tested in a corporate environment emulated in the GNS3 software version 2.2.29. In an experiment conducted with a public system call dataset, it was possible to validate the operation and integration of the framework layers, achieving detection results superior to the work that originated the dataset. Full article
(This article belongs to the Special Issue New Intrusion Detection Technology Driven by Artificial Intelligence)
Show Figures

Figure 1

19 pages, 3329 KiB  
Article
An Intuitionistic Fuzzy-Rough Set-Based Classification for Anomaly Detection
by Fokrul Alom Mazarbhuiya and Mohamed Shenify
Appl. Sci. 2023, 13(9), 5578; https://doi.org/10.3390/app13095578 - 30 Apr 2023
Cited by 1 | Viewed by 1205
Abstract
The challenging issues of computer networks and databases are not only the intrusion detection but also the reduction of false positives and increase of detection rate. In any intrusion detection system, anomaly detection mainly focuses on modeling the normal behavior of the users [...] Read more.
The challenging issues of computer networks and databases are not only the intrusion detection but also the reduction of false positives and increase of detection rate. In any intrusion detection system, anomaly detection mainly focuses on modeling the normal behavior of the users and detecting the deviations from normal behavior, which are assumed to be potential intrusions or threats. Several techniques have already been successfully tried for this purpose. However, the normal and suspicious behaviors are hard to predict as there is no precise boundary differentiating one from another. Here, rough set theory and fuzzy set theory come into the picture. In this article, a hybrid approach consisting of rough set theory and intuitionistic fuzzy set theory is proposed for the detection of anomaly. The proposed approach is a classification approach which takes the advantages of both rough set and intuitionistic fuzzy set to deal with inherent uncertainty, vagueness, and indiscernibility in the dataset. The algorithm classifies the data instances in such a way that they can be expressed using natural language. A data instance can possibly or certainly belong to a class with degrees of membership and non-membership. The empirical study with a real-world and a synthetic dataset demonstrates that the proposed algorithm has normal true positive rates of 91.989% and 96.99% and attack true positive rates of 91.289% and 96.29%, respectively. Full article
(This article belongs to the Special Issue New Intrusion Detection Technology Driven by Artificial Intelligence)
Show Figures

Figure 1

17 pages, 11300 KiB  
Article
FPGA Implementation of a Real-Time Edge Detection System Based on an Improved Canny Algorithm
by Laigong Guo and Sitong Wu
Appl. Sci. 2023, 13(2), 870; https://doi.org/10.3390/app13020870 - 08 Jan 2023
Cited by 9 | Viewed by 3146
Abstract
Canny edge detection is one of the most widely used edge detection algorithms due to its superior performance. However, it is a complex, time-consuming process and has a high hardware cost. To overcome these issues, an improved Canny algorithm is proposed in this [...] Read more.
Canny edge detection is one of the most widely used edge detection algorithms due to its superior performance. However, it is a complex, time-consuming process and has a high hardware cost. To overcome these issues, an improved Canny algorithm is proposed in this paper. It uses the Sobel operator and approximation methods to calculate the gradient magnitude and direction for replacing complex operations with reduced hardware costs. Otsu’s algorithm is introduced to adaptively determine the image threshold. However, Otsu’s algorithm has division operations, and the division operation is complex and has low efficiency and slow speed. We introduce a logarithmic unit to turn the division into a subtraction operation that is easy to implement by hardware but does not affect the selection of the threshold. Experimental results show that the system can detect the edge of the image well without adjusting the threshold value when the external environment changes and requires only 1.231 ms to detect the edges of the 512 × 512 image when clocked at 50 MHz. Compared with existing FPGA implementations, our implementation uses the least amount of logical resources. Thus, it is more suitable for platforms that have limited logical resources. Full article
(This article belongs to the Special Issue New Intrusion Detection Technology Driven by Artificial Intelligence)
Show Figures

Figure 1

Back to TopTop