A deep learning technique for intrusion detection system using a Recurrent Neural Networks based framework

被引:140
作者
Kasongo, Sydney Mambwe [1 ,2 ]
机构
[1] Stellenbosch Univ, Dept Ind Engn, Stellenbosch, South Africa
[2] Stellenbosch Univ, Sch Data Sci & Computat Thinking, Stellenbosch, South Africa
关键词
Machine learning; Feature selection; Intrusion detection; Feature extraction;
D O I
10.1016/j.comcom.2022.12.010
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In recent years, the spike in the amount of information transmitted through communication infrastructures has increased due to the advances in technologies such as cloud computing, vehicular networks systems, the Internet of Things (IoT), etc. As a result, attackers have multiplied their efforts for the purpose of rendering network systems vulnerable. Therefore, it is of utmost importance to improve the security of those network systems. In this study, an IDS framework using Machine Learning (ML) techniques is implemented. This framework uses different types of Recurrent Neural Networks (RNNs), namely, Long-Short Term Memory (LSTM), Gated Recurrent Unit (GRU) and Simple RNN. To assess the performance of the proposed IDS framework, the NSL-KDD and the UNSW-NB15 benchmark datasets are considered. Moreover, existing IDSs suffer from low test accuracy scores in detecting new attacks as the feature dimension grows. In this study, an XGBoost-based feature selection algorithm was implemented to reduce the feature space of each dataset. Following that process, 17 and 22 relevant attributes were picked from the UNSW-NB15 and NSL-KDD, respectively. The accuracy obtained through the test subsets was used as the main performance metric in conjunction with the F1-Score, the validation accuracy, and the training time (in seconds). The results showed that for the binary classification tasks using the NSL-KDD, the XGBoost-LSTM achieved the best performance with a test accuracy (TAC) of 88.13%, a validation accuracy (VAC) of 99.49% and a training time of 225.46 s. For the UNSW-NB15, the XGBoost-Simple-RNN was the most efficient model with a TAC of 87.07%. For the multiclass classification scheme, the XGBoost-LSTM achieved a TAC of 86.93% over the NSL-KDD and the XGBoost-GRU obtained a TAC of 78.40% over the UNSW-NB15 dataset. These results demonstrated that our proposed IDS framework performed optimally in comparison to existing methods.
引用
收藏
页码:113 / 125
页数:13
相关论文
共 43 条
[21]   Deep learning [J].
LeCun, Yann ;
Bengio, Yoshua ;
Hinton, Geoffrey .
NATURE, 2015, 521 (7553) :436-444
[22]   A method of SVM with Normalization in Intrusion Detection [J].
Li, Weijun ;
Liu, Zhenyu .
2011 2ND INTERNATIONAL CONFERENCE ON CHALLENGES IN ENVIRONMENTAL SCIENCE AND COMPUTER ENGINEERING (CESCE 2011), VOL 11, PT A, 2011, 11 :256-262
[23]   Machine Learning Techniques for Classifying Network Anomalies and Intrusions [J].
Li, Zhida ;
Rios, Ana Laura Gonzalez ;
Xu, Guangyu ;
Trajkovic, Ljiljana .
2019 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS), 2019,
[24]   A Semantic Parsing Based LSTM Model for Intrusion Detection [J].
Li, Zhipeng ;
Qin, Zheng .
NEURAL INFORMATION PROCESSING (ICONIP 2018), PT IV, 2018, 11304 :600-609
[25]   Network intrusion detection system using supervised learning paradigm [J].
Mebawondu, J. Olamantanmi ;
Alowolodu, Olufunso D. ;
Mebawondu, Jacob O. ;
Adetunmbi, Adebayo O. .
SCIENTIFIC AFRICAN, 2020, 9
[26]  
Meena G, 2017, 2017 INTERNATIONAL CONFERENCE ON COMPUTER, COMMUNICATIONS AND ELECTRONICS (COMPTELIX), P553, DOI 10.1109/COMPTELIX.2017.8004032
[27]  
Meng FZ, 2017, 2017 INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS, ELECTRONICS AND CONTROL (ICCSEC), P568, DOI 10.1109/ICCSEC.2017.8447022
[28]  
Miao S, 2017, ELS MIC SOC BOOK SER, P271, DOI 10.1016/B978-0-12-810408-8.00016-X
[29]  
Mirza Ali H., 2018, SIGNAL PROCESSING CO
[30]  
Moustafa N, 2015, 2015 MILITARY COMMUNICATIONS AND INFORMATION SYSTEMS CONFERENCE (MILCIS)