Network Anomaly Intrusion Detection Based on Deep Learning Approach

被引:34
作者
Wang, Yung-Chung [1 ]
Houng, Yi-Chun [1 ]
Chen, Han-Xuan [1 ]
Tseng, Shu-Ming [2 ]
机构
[1] Natl Taipei Univ Technol, Dept Elect Engn, Taipei 106, Taiwan
[2] Natl Taipei Univ Technol, Dept Elect Engn, Taipei 106, Taiwan
关键词
deep learning; network intrusion detection; data processing;
D O I
10.3390/s23042171
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
The prevalence of internet usage leads to diverse internet traffic, which may contain information about various types of internet attacks. In recent years, many researchers have applied deep learning technology to intrusion detection systems and obtained fairly strong recognition results. However, most experiments have used old datasets, so they could not reflect the latest attack information. In this paper, a current state of the CSE-CIC-IDS2018 dataset and standard evaluation metrics has been employed to evaluate the proposed mechanism. After preprocessing the dataset, six models-deep neural network (DNN), convolutional neural network (CNN), recurrent neural network (RNN), long short-term memory (LSTM), CNN + RNN and CNN + LSTM-were constructed to judge whether network traffic comprised a malicious attack. In addition, multi-classification experiments were conducted to sort traffic into benign traffic and six categories of malicious attacks: BruteForce, Denial-of-service (DoS), Web Attacks, Infiltration, Botnet, and Distributed denial-of-service (DDoS). Each model showed a high accuracy in various experiments, and their multi-class classification accuracy were above 98%. Compared with the intrusion detection system (IDS) of other papers, the proposed model effectively improves the detection performance. Moreover, the inference time for the combinations of CNN + RNN and CNN + LSTM is longer than that of the individual DNN, RNN and CNN. Therefore, the DNN, RNN and CNN are better than CNN + RNN and CNN + LSTM for considering the implementation of the algorithm in the IDS device.
引用
收藏
页数:21
相关论文
共 33 条
[1]  
acronis, Acronis Cyberthreats Report 2022
[2]   Attacks to Automatous Vehicles: A Deep Learning Algorithm for Cybersecurity [J].
Aldhyani, Theyazn H. H. ;
Alkahtani, Hasan .
SENSORS, 2022, 22 (01)
[3]  
Canadian Institute for Cybersecurity, About us
[4]  
Communications Security Establishment, about us
[5]  
fbi, FBI STATEMENT INCIDE
[6]   Deep learning for cyber security intrusion detection: Approaches, datasets, and comparative study [J].
Ferrag, Mohamed Amine ;
Maglaras, Leandros ;
Moschoyiannis, Sotiris ;
Janicke, Helge .
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2020, 50
[7]  
Glob, LIBRARY
[8]  
Gopinath M., 2023, COMPUT SCI REV, V47
[9]   A Novel Wireless Network Intrusion Detection Method Based on Adaptive Synthetic Sampling and an Improved Convolutional Neural Network [J].
Hu, Zhiquan ;
Wang, Liejun ;
Qi, Lei ;
Li, Yongming ;
Yang, Wenzhong .
IEEE ACCESS, 2020, 8 :195741-195751
[10]   A bidirectional LSTM deep learning approach for intrusion detection [J].
Imrana, Yakubu ;
Xiang, Yanping ;
Ali, Liaqat ;
Abdul-Rauf, Zaharawu .
EXPERT SYSTEMS WITH APPLICATIONS, 2021, 185 (185)