A Robust Intrusion Detection System Empowered by Generative Adversarial Networks
A Robust Intrusion Detection System Empowered by Generative Adversarial Networks
II. LITERATURE REVIEW research. With the goal of supporting the Internet of Things
and machine-to-machine communications, as well as
In this research, Felix Obite [1]et al. suggest that the providing faster wireless broadband connectivity, both
substantial increase in Internet traffic validates the transition cellular and Wi-Fi technologies seek to improve
of the backbone of the telecommunications industry from a performance. These technologies can therefore be
time division multiplexing (TDM) orientation to an considered technical alternatives in a variety of use cases.
emphasis on Ethernet solutions. In a market historically The authors draw the conclusion that both technologies will
dominated by DSL and cable modems, Ethernet PON, which be significant players in the future, acting as both
combines inexpensive Ethernet and fibre infrastructures, has competitors and allies at the same time. Due to its cheaper
emerged as the leading technology. With the help of this deployment costs, Wi-Fi 6 is expected to remain the
innovative technology, which is easy to use, reasonably favoured option for interior use, while 5G is expected to
priced, and scalable, end customers can receive a vast array remain the preferred technology for wide-area coverage.
of data services across a single network. A summary of
EPON's history is given in the paper, with an emphasis on Somayye Hajiheidari [3] et al. has suggested a system
the present work being done on next-generation high-data- that lowers the power consumption of electrical appliances,
rate access networks including NG-PON2, WDM PON, and adding a new dimension to intelligent things. By integrating
OFDM PON. Furthermore, the recently finished 100G- electronic devices and linking them to the Internet, this
EPON is reviewed to illustrate the most current system enhances commonplace physical things and allows
developments in the sector. The document is to provide for communication with cyberspace and local intelligence.
network operators and interested practitioners with the The network of connected things is referred to as the
knowledge they need to plan and prioritise their actions by Internet of Things (IoT) in this notion. Nevertheless,
providing a thorough and current review. The study also because IoT items are directly connected to the Internet,
attempts to find technological answers for additional malevolent people can attack them. These assaults, referred
research. Broadband services that are capable of supporting to as internal attacks, take advantage of IoT devices'
high-speed internet transmission are required due to the rise resource limitations to compromise internal nodes and
in data traffic and the increasing number of online users who launch network attacks. Thus, it is impossible to exaggerate
spend more time online and use bandwidth-intensive apps. It the significance of Intrusion Detection Systems (IDSs) in the
is anticipated that this would help the economy grow. Internet of Things. Notwithstanding its importance, there
Therefore, in order to support these novel and real-time aren't many thorough and organised evaluations that address
broadband applications, future access networks will need to and examine the workings of IDSs in Internet of Things
have a lot of capacity and mobility. environments. This work proposes a Systematic Literature
Review (SLR) of IDSs in the IoT to fill this vacuum. The
The fifth generation (5G) of wireless broadband article offers comprehensive classifications of intrusion
access, which is presently being deployed by Mobile detection systems (IDSs) according to their methodology
Network Operators, has garnered considerable attention in (anomaly-based, signature-based, specification-based, and
recent years [2]. Surprisingly, though, not as much focus has hybrid), architecture (centralised, distributed, hybrid),
been placed on "Wi-Fi 6," the latest IEEE 802.1ax standard evaluation technique (simulation, theoretical), and attack
in the family of wireless local area networks that is intended types (denial of service, Sybil, replay, selective forwarding,
for private edge networks. The suitability of cellular and Wi- wormhole, black hole, sinkhole, jamming, false data,
Fi technologies for providing high-speed wireless Internet attack).
connectivity is reviewed by Edward J. Oughtonet al. in this
parameter. The number of users who may be named is the D. Modified Random Forest Detection Method
subject of the second kind of infinite. We use the Chinese We covered change-point detection based on MRF and
Restaurant Process (CRP), which is well-known for its DTO in the earlier parts. We have tested our approach in
application in handling infinite vocabularies, for estimating conjunction with Kleinberg's Modified Random Forest
in order to avoid limiting the amount of potential references. detection method in this module. Specifically, we have put
into practice Kleinberg's Modified Random Forest detection
approach in two states. Since a non-hierarchical structure is
anticipated in this experiment, the two-state variant was
selected. A probabilistic automata model with two states—
the Modified Random Forest state and the non-Modified
Random Forest state—serves as the foundation for the
Modified Random Forest detection technique. It is assumed
that some events, like posts arriving, occur in accordance
with a time-varying Poisson process, the rate parameter of
which is dependent on the state at any given moment.
V. ALGORITHM DETAILS
VI. RESULT ANALYSIS detect a wide range of network threats, such as malware,
port scanning, and denial-of-service attacks. It is imperative
Results from the empirical analysis of the KDD dataset to recognise that no intrusion detection system is perfect.
using the Modified Random Forest (MRF) technique are Like other IDS systems, MRF-based systems are vulnerable
instructive for the Intrusion Detection Systems (IDS) to evasion strategies. Furthermore, MRF-based IDS systems
industry. By dividing the dataset into four categories— can be computationally demanding to train and run.
Basic, Content, Traffic, and Host—the study illustrates the
distinct contributions of each attribute class to the Detection FUTURE WORK
Rate (DR) and False Alarm Rate (FAR). By reducing false
alarm rate (FAR), which stops unnecessary false alerts, and MRF classifiers are well known for their remarkable
increasing detection ratio (DR), which is a measure of accuracy in classification tasks; however, there is room for
successful intrusion detection, the dataset may be optimised improvement. Later research could focus on developing new
by this thorough study. The findings demonstrate the critical MRF algorithms with improved precision and performance.
role attribute class considerations play in the development of Hackers are always coming up with new ways to get around
trustworthy intrusion detection models and provide useful IDS systems. Subsequent efforts can focus on creating MRF
data for enhancing the efficacy of cyber security protocols. classifiers that are more resistant to these evasion strategies.
Training and operation can involve significant computing
Table 1: Comparison Table costs. Subsequent investigations may focus on developing
Algorithm Accuracy novel training algorithms and optimisation strategies that
NB, and DT 75 can reduce the computing load of MRF classifiers.
MRF 88
REFERENCES