A Method for Network Intrusion Detection Based on GAN-CNN-BiLSTM

被引:0
作者
Li, Shuangyuan [1 ]
Li, Qichang [2 ]
Li, Mengfan [2 ]
机构
[1] Jilin Inst Chem Technol, Informat Construction Off, Jilin, Peoples R China
[2] Jilin Inst Chem Technol, Sch Informat & Control Engn, Jilin, Peoples R China
关键词
Intrusion detection; GAN; CNN; BiLSTM;
D O I
10.14569/IJACSA.2023.0140554
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
As network attacks are more and more frequent and network security is more and more serious, it is important to detect network intrusion accurately and efficiently. With the continuous development of deep learning, a lot of research achievements are applied to intrusion detection. Deep learning is more accurate than machine learning, but in the face of a large amount of data learning, the performance will be degraded due to data imbalance. In view of the serious imbalance of network traffic data sets at present, this paper proposes to process data expansion with GAN to solve data imbalance and detect network intrusion in combination with CNN and BiLSTM. In order to verify the efficiency of the model, the CIC-IDS 2017 data set is used for evaluation, and the model is compared with machine learning methods such as Random Forest and Decision Tree. The experiment shows that the performance of this model is significantly improved over other traditional models, and the GAN-CNN-BiLSTM model can improve the efficiency of intrusion detection, and its overall accuracy is improved compared with SVM, DBN, CNN, BiLSTM and other models.
引用
收藏
页码:507 / 515
页数:9
相关论文
共 21 条
[1]   A Novel Hierarchical Intrusion Detection System based on Decision Tree and Rules-based Models [J].
Ahmim, Ahmed ;
Maglaras, Leandros ;
Ferrag, Mohamed Amine ;
Derdour, Makhlouf ;
Janicke, Helge .
2019 15TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING IN SENSOR SYSTEMS (DCOSS), 2019, :228-233
[2]   Network Intrusion Detection System using Deep Learning [J].
Ashiku, Lirim ;
Dagli, Cihan .
BIG DATA, IOT, AND AI FOR A SMARTER FUTURE, 2021, 185 :239-247
[3]  
Chaibi Nassima, 2020, ISPR '20: Proceedings of the 1st International Conference on Intelligent Systems and Pattern Recognition, P45, DOI 10.1145/3432867.3432889
[4]   A bidirectional LSTM deep learning approach for intrusion detection [J].
Imrana, Yakubu ;
Xiang, Yanping ;
Ali, Liaqat ;
Abdul-Rauf, Zaharawu .
EXPERT SYSTEMS WITH APPLICATIONS, 2021, 185 (185)
[5]  
Jing X., 2016, INNOVATIVE 2 STAGE F, DOI [10.25148/etd.FIDC000288, DOI 10.25148/ETD.FIDC000288]
[6]   GAN-based imbalanced data intrusion detection system [J].
Lee, JooHwa ;
Park, KeeHyun .
PERSONAL AND UBIQUITOUS COMPUTING, 2021, 25 (01) :121-128
[7]  
Liu Yuefeng, 2019, Computer Engineering and Applications, V55, P90, DOI 10.3778/j.issn.1002-8331.1712-0021
[8]   TR-IDS: Anomaly-Based Intrusion Detection through Text-Convolutional Neural Network and Random Forest [J].
Min, Erxue ;
Long, Jun ;
Liu, Qiang ;
Cui, Jianjing ;
Chen, Wei .
SECURITY AND COMMUNICATION NETWORKS, 2018,
[9]  
Naseer S, 2018, KSII T INTERNET INF, V12, P5159
[10]   Some similarity coefficients and application of data mining techniques to the anomaly-based IDS [J].
Nikolova, Evgeniya ;
Jecheva, Veselina .
TELECOMMUNICATION SYSTEMS, 2012, 50 (02) :127-135