AI Enhanced Automatic Response System for Resisting Network Threats

  • Song Xia
  • Meikang QiuEmail author
  • Meiqin Liu
  • Ming Zhong
  • Hui Zhao
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 11910)


Network threats are malicious attacks that endanger network security. With terabits of information stored in the network and much of this information being confidential, cyber security turns to be very important. Most network protection mechanisms are based on firewall and Intrusion Detection System (IDS). However, with the diversification of cyber-attacks, traditional defense mechanisms cannot fully guarantee the security of the network. In this paper, we propose an automatic network threat response system based on machine learning and deep learning. It comprises three sub-modules: threat detection module, threat identification module and threat mitigation module. The experimental results show that the proposed system can handle 22 types of network threats in the KDD99 dataset and the rate of successful response is over 97%, which is much better than the traditional ways.


Cyber security Artificial intelligence Automatic response system Threat detection Threat identification Threat mitigation 



This work is supported by the National Natural Science Foundation of China (No.61728303) and the Open Research Project of the State Key Laboratory of Industrial Control Technology, Zhejiang University, China (No. ICT1800417); this work is also supported by China NSFC 61836005 and 61672358.


  1. 1.
    Thakur, K., Qiu, M., Gai, K., Ali, M.: An investigation on cyber security threats and security models. In: 2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing, pp. 307–311. IEEE, New York, November 2015Google Scholar
  2. 2.
    Tidwell, K., Saurabh, K., Dash, D., Njemanze, H.S., Kothari, P.S.: Threat detection in a network security system. U.S. Patent 7,260,844. Washington, DC, August 2007Google Scholar
  3. 3.
    Alfayyadh, B., Ponting, J., Alzomai, M., Jøsang, A.: Vulnerabilities in personal firewalls caused by poor security usability. In: 2010 IEEE International Conference on Information Theory and Information Security, pp. 682–688, Beijing, January 2011Google Scholar
  4. 4.
    Rietta, F.: Application layer intrusion detection for SQL injection. In: ACM-SE 44 Proceedings of the 44th Annual Southeast Regional Conference, pp. 531–536, Florida, March 2016Google Scholar
  5. 5.
    Ross, K.: SQL injection detection using machine learning techniques and multiple data sources. Master’s Projects. 650.
  6. 6.
    Li, W., Yi, P., Wu, Y., Pan, L., Li, J.: A new intrusion detection system based on KNN classification algorithm in wireless sensor network. J. Electr. Comput. Eng. 2014(240217), 1–9 (2014)Google Scholar
  7. 7.
    Punithavathani, D.S., Sujatha, K., Jain, J.M.: Surveillance of anomaly and misuse in critical networks to counter insider threats using computational intelligence. Clust. Comput. 18(1), 435–451 (2015)CrossRefGoogle Scholar
  8. 8.
    Vinayakumar, R., Soman, K., Poornachandran, P.: Applying convolutional neural network for network intrusion detection. In: IEEE International Conference on Advances in Computing, Communications and Informatics (ICACCI), p. 2017. Udupi, September 2017Google Scholar
  9. 9.
    Hamed, H., Ali, D., Raouf, K., Kim-Kwang, R.: A deep Recurrent Neural Network based approach for Internet of Things malware threat hunting. Future Gener. Comput. Syst. 85, 88–96 (2018)CrossRefGoogle Scholar
  10. 10.
    Denning, D.E.: An intrusion-detection model. IEEE Trans. Softw. Eng. SE-13(2), 222–232 (1987)CrossRefGoogle Scholar
  11. 11.
    Liao, H., Lin, C., Lin, Y., Tung, K.: Intrusion detection system: a comprehensive review. J. Netw. Comput. Appl. 36(1), 16–24 (2013)CrossRefGoogle Scholar
  12. 12.
    Mena, J.: Investigative Data Mining for Security and Criminal Detection. Butterworth Heinemann (2003)Google Scholar
  13. 13.
    Teodoro, P.G., Verdejo, J.D., Fernández, G.M., Vázquez, E.: Anomaly-based network intrusion detection: techniques, systems and challenges. Comput. Secur. 28(1–2), 18–28 (2009)Google Scholar
  14. 14.
    Ma, Z., Xue, J., Leijon, A., Tan, Z., Yang, Z., Guo, J.: Decorrelation of neutral vector variables: theory and applications. IEEE Trans. Neural Netw. Learn. Syst. 29(1), 129–143 (2016)MathSciNetCrossRefGoogle Scholar
  15. 15.
    Ma, Z., Lai, Y., Kleijn, W.B., Wang, L.K., Guo, J.: Variational Bayesian learning for Dirichlet process mixture of inverted Dirichlet distributions in non-Gaussian image feature modeling. IEEE Trans. Neural Netw. Learn. Syst. 30(2), 449–463 (2016)MathSciNetCrossRefGoogle Scholar
  16. 16.
    Hodo, E., et al.: Threat analysis of IoT networks using artificial neural network intrusion detection system. In: 2016 International Symposium on Networks. Computers and Communications (ISNCC), pp. 1–6, Yasmine, May 2016Google Scholar
  17. 17.
    Gai, K., Qiu, M., Zhao, H., Tao, L., Zong, Z.: Dynamic energy-aware cloudlet-based mobile cloud computing model for green computing. J. Netw. Comput. Appl. 59, 46–54 (2016)CrossRefGoogle Scholar
  18. 18.
    Gai, K., Qiu, M., Zhao, H.: Energy-aware task assignment for mobile cyber-enabled applications in heterogeneous cloud computing. J. Parallel Distrib. Comput. 111, 126–135 (2018)CrossRefGoogle Scholar
  19. 19.
    Gai, K., Xu, K., Lu, Z., Qiu, M., Zhu, L.: Fusion of cognitive wireless networks and edge computing. IEEE Wirel. Commun. 26(3), 69–75 (2019)CrossRefGoogle Scholar
  20. 20.
    Qiu, H., Noura, H., Qiu, M., Ming, Z., Memmi, G.: A user-centric data protection method for cloud storage based on invertible DWT. IEEE Trans. Cloud Comput.

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  • Song Xia
    • 1
  • Meikang Qiu
    • 2
    • 3
    Email author
  • Meiqin Liu
    • 4
  • Ming Zhong
    • 2
  • Hui Zhao
    • 5
  1. 1.College of Electronic and InformationWuhan UniversityWuhanChina
  2. 2.College of Computer ScienceShenzhen UniversityShenzhenChina
  3. 3.Department of Computer ScienceHarrisburg University of Science and TechnologyHarrisburgUSA
  4. 4.College of Electrical EngineeringZhejiang UniversityZhejiangChina
  5. 5.School of SoftwareHenan UniversityKaifengChina

Personalised recommendations