Hybrid Intrusion Detection System Based on Data Resampling and Deep Learning

被引:0
作者
Chen, Huan [1 ]
You, Gui-Rong [2 ]
Shiue, Yeou-Ren [3 ]
机构
[1] Fujian Business Univ, Coll Informat Engn, Fuzhou, Peoples R China
[2] Fujian Business Univ, Fujian Prov Univ Engn Res Ctr Big Data Analyt Bus, Fuzhou, Peoples R China
[3] Natl Tsing Hua Univ, Dept Ind Engn & Engn Management, Hsinchu, Taiwan
关键词
Intrusion detection; deep learning; random undersampling; synthetic minority oversampling technique; convolutional neural network; transformer;
D O I
10.14569/IJACSA.2024.0150214
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The growth of the internet has advanced information- sharing capabilities and vastly increased the importance of global network security. However, because new and inconspicuous abnormal behaviors are nearly impossible to detect in massive network access environments, modern intrusion detection systems have identified a high rate of false-positive (FP) and false-negative (FN) attacks. To overcome this, this paper proposes a hybrid deep learning model that significantly mitigates the disadvantages of consistently imbalanced sample attack data. First, it resolves imbalanced data using random undersampling and synthetic minority oversampling techniques. Then, convolutional neural networks (CNNs) extract local and spatial features, and a transformer encoder extracts global and temporal features. The novelty of this combination increases recognition accuracy at the algorithm level, which is crucial to reducing FPs and FNs. The model was subjected to multiclassification testing on the NSL-KDD and CICIDS2017 benchmark datasets, and the results show that our model has higher classification accuracy and lower FP rates than state-of-the-art intrusion detection models. Moreover, it significantly improves the detection rate of low-frequency attacks.
引用
收藏
页码:121 / 135
页数:15
相关论文
共 68 条
[61]   Fusion of transformer and ML-CNN-BiLSTM for network intrusion detection [J].
Xiang, Zelin ;
Li, Xuwei .
EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2023, 2023 (01)
[62]   An Intrusion Detection Model Based on Feature Reduction and Convolutional Neural Networks [J].
Xiao, Yihan ;
Xing, Cheng ;
Zhang, Taining ;
Zhao, Zhongkai .
IEEE ACCESS, 2019, 7 :42210-42219
[63]  
Xing N, 2023, INT J ADV COMPUT SC, V14, P391
[64]  
Yan B.H., 2018, Chin. J. Netw. Inf. Sec., P48, DOI DOI 10.11959/J.ISSN.2096-109X.2018056
[65]   Intrusion detection: A model based on the improved vision transformer [J].
Yang, Yu-Guang ;
Fu, Hong-Mei ;
Gao, Shang ;
Zhou, Yi-Hua ;
Shi, Wei-Min .
TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2022, 33 (09)
[66]   A Deep Learning Approach for Intrusion Detection Using Recurrent Neural Networks [J].
Yin, Chuanlong ;
Zhu, Yuefei ;
Fei, Jinlong ;
He, Xinzheng .
IEEE ACCESS, 2017, 5 :21954-21961
[67]   CTIF-Net: A CNN-Transformer Iterative Fusion Network for Salient Object Detection [J].
Yuan, Junbin ;
Zhu, Aiqing ;
Xu, Qingzhen ;
Wattanachote, Kanoksak ;
Gong, Yongyi .
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2024, 34 (05) :3795-3805
[68]   Intrusion Detection for IoT Based on Improved Genetic Algorithm and Deep Belief Network [J].
Zhang, Ying ;
Li, Peisong ;
Wang, Xinheng .
IEEE ACCESS, 2019, 7 :31711-31722