Hybrid network intrusion detection system based on sliding window and information entropy in imbalanced dataset

被引:0
作者
Mo, Jingrong [1 ]
Ke, Jie [1 ]
Zhou, Huiyi [1 ]
Li, Xunzhang [1 ]
机构
[1] Guilin Univ Aerosp Technol, Guilin 541004, Peoples R China
关键词
Anomaly detection; CNN; Bi_LSTM; Information entropy technology; ANOMALY DETECTION; DETECTION MODEL; CLASSIFICATION; PERFORMANCE;
D O I
10.1007/s10489-025-06307-6
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Enhancing the integrity of the information security infrastructure requires the monitoring and analysis of anomalous network activities. And due to the network ecosystem's increased diversity and complexity as a result of information technology's rapid growth, classic intrusion detection techniques are no longer adequate for identifying and evaluating network anomaly patterns from a variety of integration and channel viewpoints. Meanwhile, the class imbalance problem associated with intrusion detection datasets limits classifiers' ability to recognize minority classes. To improve the detection rate of minority classes while ensuring efficiency, we propose a multi-channel intrusion detection model based on CNN_LSTM, referred to as ENS_CLSTM.The model that is being provided resamples the data using the sliding window approach and information entropy technology in order to balance the amount of normal and abnormal classes. The spatial features of the data are retrieved using a Convolution Neural Network (CNN), while the temporal features are extracted using a Bidirectional Long-Short Term Memory (Bi_LSTM), after integrates the dual-channel features stream into the final Deep Neural Network (DNN). The advantages of the proposed model are verified using the NSL-KDD,UNSW-NB15,CICIDS2017,CSE-CIC-IDS-2018 and ISCX-IDS2012 datasets. According to the experimental results, an accuracy of 99.67% was attained on the UNSW-NB15 dataset and 99.997% on the NSL-KDD dataset. Furthermore, on the CICIDS2017, CSE-CIC-IDS-2018, and ISCX-IDS2012 datasets, respectively, accuracy rates of 99.9997%, 99.998%, and 99.74% were attained.The ENS_CLSTM model can effectively improve the detection performance and generalization ability when compared to the findings of current studies.
引用
收藏
页数:21
相关论文
共 59 条
[1]   Addressing the class imbalance problem in network intrusion detection systems using data resampling and deep learning [J].
Abdelkhalek, Ahmed ;
Mashaly, Maggie .
JOURNAL OF SUPERCOMPUTING, 2023, 79 (10) :10611-10644
[2]   Analysis of error-based machine learning algorithms in network anomaly detection and categorization [J].
Ajila, Samuel A. ;
Lung, Chung-Horng ;
Das, Anurag .
ANNALS OF TELECOMMUNICATIONS, 2022, 77 (5-6) :359-370
[3]   A new intrusion detection system based on Moth–Flame Optimizer algorithm [J].
Alazab M. ;
Khurma R.A. ;
Awajan A. ;
Camacho D. .
Expert Systems with Applications, 2022, 210
[4]   Timely Classification and Verification of Network Traffic Using Gaussian Mixture Models [J].
Alizadeh, Hassan ;
Vranken, Harald ;
Zuquete, Andre ;
Miri, Ali .
IEEE ACCESS, 2020, 8 :91287-91302
[5]   An Anomaly-based Detection System for Monitoring Kubernetes Infrastructures [J].
Almaraz-Rivera, Josue Genaro .
IEEE LATIN AMERICA TRANSACTIONS, 2023, 21 (03) :457-465
[6]   Online Distributed Denial of Service (DDoS) intrusion detection based on adaptive sliding window and morphological fractal dimension [J].
Baldini, Gianmarco ;
Amerini, Irene .
COMPUTER NETWORKS, 2022, 210
[7]   Enhanced CNN-LSTM Deep Learning for SCADA IDS Featuring Hurst Parameter Self-Similarity [J].
Balla, Asaad ;
Habaebi, Mohamed Hadi ;
Elsheikh, Elfatih A. A. ;
Islam, Md. Rafiqul ;
Suliman, Fakher Eldin Mohamed ;
Mubarak, Sinil .
IEEE ACCESS, 2024, 12 :6100-6116
[8]   An Entropy-Based Network Anomaly Detection Method [J].
Berezinski, Przemyslaw ;
Jasiul, Bartosz ;
Szpyrka, Marcin .
ENTROPY, 2015, 17 (04) :2367-2408
[9]   Online DDoS attack detection using Mahalanobis distance and Kernel-based learning algorithm [J].
Cakmakci, Salva Daneshgadeh ;
Kemmerich, Thomas ;
Ahmed, Tarem ;
Baykal, Nazife .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2020, 168
[10]   A Fuzzing-Based Method for Testing Rules in Intrusion Detection Systems in 6G Networks [J].
Chen, Haoyu ;
Yuan, Bin ;
Zou, Deqing ;
Lin, Hai .
IEEE NETWORK, 2022, 36 (04) :150-158