JOURNAL ARTICLE

ENHANCED NETWORK INTRUSION DETECTION USING LONG SHORT-TERM MEMORY FOR IMPROVED SECURITY ANALYSIS

Venkataramesh InduruPurandhar. N

Year: 2019 Journal:   Zenodo (CERN European Organization for Nuclear Research)   Publisher: European Organization for Nuclear Research

Abstract

The traditional signature-based and rule-based intrusion detection systems to keep up with the times, especiallywhen the enemy or threats become sophisticated. In this paper, we aim to present an advanced intrusion detectiontechnique based on the Long Short-Term Memory (LSTM) network, a special kind of recurrent neural network(RNN) able to capture long-term dependencies in sequential data through enhanced learning. LSTMs areparticularly tuned for analyzing time-series data, such as network traffic, whose normal and malicious behaviorpatterns change over time. The proposed method involves data pre-processing, cleaning, and normalization forconsistency and reliability. The preprocessed data is then classified into the LSTM model, which automaticallylearns intricate patterns from the network traffic to classify them as intrusion or normal activity. The model'sability to detect both known attacks and newly established patterns of attack significantly enhances accuracy whilereducing false positives and false negatives. Moreover, cloud storage integration enriches the system further, thusscaling it to provide data management with real-time analysis. A cloud-based infrastructure will ensure elasticityand scalability to handle large datasets for the ever-available pool of data for model training and intrusiondetection. The outcome of the LSTM-based system indicates that it could easily be termed a simplistic approachtoward robust detection and mitigation of network security threats with enhanced performance and scalabilityover the traditional approach.

Keywords:
Intrusion detection system Scalability Anomaly-based intrusion detection system Normalization (sociology) False positive paradox Cloud computing Network security

Metrics

0
Cited By
0.00
FWCI (Field Weighted Citation Impact)
0
Refs
0.45
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Topics

Network Security and Intrusion Detection
Physical Sciences →  Computer Science →  Computer Networks and Communications
Anomaly Detection Techniques and Applications
Physical Sciences →  Computer Science →  Artificial Intelligence
Data Stream Mining Techniques
Physical Sciences →  Computer Science →  Artificial Intelligence
© 2026 ScienceGate Book Chapters — All rights reserved.