SADCNN: Supervised anomaly detection based on convolutional neural network models

被引:0
作者
Hatami, Maryam [1 ]
Gharaee, Hossein [2 ]
Mohammadzadeh, Naser [1 ]
机构
[1] Shahed Univ, Dept Comp Engn, Tehran, Iran
[2] ICT Res Inst ITRC, Tehran, Iran
来源
INFORMATION SECURITY JOURNAL | 2025年
关键词
Convolution neural network; deep learning; intrusion detection; network anomaly detection; supervised learning; SQUARE FEATURE-SELECTION; INTRUSION DETECTION; ENSEMBLE;
D O I
10.1080/19393555.2025.2493108
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As the importance of the Internet increases and computer networks get more extensive, network security becomes one of the most important aspects that must be considered. Since the network attacks evolve at an astounding pace and the network data is high-volume, anomaly detection approaches based on Deep Learning (DL) are introduced as a solution to detect unknown attacks in voluminous network data. In this paper, we focus on the problem of supervised anomaly detection. Since Convolutional Neural Networks (CNN) are widely used in data processing with voluminous data, we proposed a model based on CNN named SADCNN. SADCNN is a CNN with two convolutional layers, the Glorot uniform weight initializer, the Tanh activation function, 20 epochs, 32 filters, and the Adam optimizer. To evaluate our approach on real network traffic, the KDDCUP'99, NSL-KDD-Train+, and UNSW-NB15 datasets are attempted. The simulation results demonstrate that SADCNN is a proper feature extractor for network data. It gives better results for F1-score and AUC1 in comparison to the previous models.
引用
收藏
页数:16
相关论文
共 50 条
  • [31] Ensemble classifiers for supervised anomaly based network intrusion detection
    Timcenko, Valentina
    Gajin, Slavko
    2017 13TH IEEE INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTER COMMUNICATION AND PROCESSING (ICCP), 2017, : 13 - 19
  • [32] Network anomaly detection based on semi-supervised clustering
    Wei Xiaotao
    Huang Houkuan
    Tian Shengfeng
    NEW ADVANCES IN SIMULATION, MODELLING AND OPTIMIZATION (SMO '07), 2007, : 440 - +
  • [33] Face image manipulation detection based on a convolutional neural network
    Dang, L. Minh
    Hassan, Syed Ibrahim
    Im, Suhyeon
    Moon, Hyeonjoon
    EXPERT SYSTEMS WITH APPLICATIONS, 2019, 129 : 156 - 168
  • [34] A survey of deep learning-based network anomaly detection
    Donghwoon Kwon
    Hyunjoo Kim
    Jinoh Kim
    Sang C. Suh
    Ikkyun Kim
    Kuinam J. Kim
    Cluster Computing, 2019, 22 : 949 - 961
  • [35] A survey of deep learning-based network anomaly detection
    Kwon, Donghwoon
    Kim, Hyunjoo
    Kim, Jinoh
    Suh, Sang C.
    Kim, Ikkyun
    Kim, Kuinam J.
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2019, 22 (Suppl 1): : 949 - 961
  • [36] Accelerating convolutional neural network-based malware traffic detection through ant-colony clustering
    Huang, He
    Deng, Haojiang
    Sheng, Yiqiang
    Ye, Xiaozhou
    JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2019, 37 (01) : 409 - 423
  • [37] Wavelet Fuzzy Neural Network based on modified QPSO for Network Anomaly Detection
    Ma, Ruhui
    Liu, Yuan
    INFORMATION TECHNOLOGY FOR MANUFACTURING SYSTEMS, PTS 1 AND 2, 2010, : 1378 - +
  • [38] Convolutional Neural Network Based Handgun Detection
    Kocer, Sabri
    Akdag, Ali
    2017 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND ENGINEERING (UBMK), 2017, : 89 - 93
  • [39] Robust Detection of Network Intrusion using Tree-based Convolutional Neural Networks
    Mishra, Sanket
    Dwivedula, Rohit
    Kshirsagar, Varad
    Hota, Chittaranjan
    CODS-COMAD 2021: PROCEEDINGS OF THE 3RD ACM INDIA JOINT INTERNATIONAL CONFERENCE ON DATA SCIENCE & MANAGEMENT OF DATA (8TH ACM IKDD CODS & 26TH COMAD), 2021, : 233 - 237
  • [40] An Intrusion Detection System Based on Convolutional Neural Network for Imbalanced Network Traffic
    Zhang, Xiaoxuan
    Ran, Jing
    Mi, Jize
    PROCEEDINGS OF 2019 IEEE 7TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT 2019), 2019, : 456 - 460