Hierarchical LSTM-Based Network Intrusion Detection System Using Hybrid Classification

被引:7
作者
Han, Jonghoo [1 ]
Pak, Wooguil [1 ]
机构
[1] Yeungnam Univ, Dept Informat & Commun Engn, Gyongsan 38541, South Korea
来源
APPLIED SCIENCES-BASEL | 2023年 / 13卷 / 05期
基金
新加坡国家研究基金会;
关键词
hybrid classifier; network intrusion detection; hierarchical LSTM; dual LSTM; IDS;
D O I
10.3390/app13053089
中图分类号
O6 [化学];
学科分类号
0703 ;
摘要
Most existing network intrusion detection systems (NIDSs) perform intrusion detection using only a partial packet data of fixed size, but they suffer to increase the detection rate. In this study, in order to find the cause of a limited detection rate, accurate intrusion detection performance was analyzed by adjusting the amount of information used as features according to the size of the packet and length of the session. The results indicate that the total packet data and all packets in the session should be used for the maximum detection rate. However, existing NIDS cannot be extended to use all packet data of each session because the model could be too large owing to the excessive number of features, hampering realistic training and classification speeds. Therefore, in this paper, we present a novel approach for the classifier of NIDSs. The proposed NIDS can effectively handle the entire packet information using the hierarchical long short-term memory and achieves higher detection accuracy than existing methods. Performance evaluation confirms that detection performance can be greatly improved compared to existing NIDSs that use only partial packet information. The proposed NIDS achieves a detection rate of 95.16% and 99.70% when the existing NIDS show the highest detection rate of 93.49% and 98.31% based on the F1-score using two datasets. The proposed method can improve the limitations of existing NIDS and safeguard the network from malicious users by utilizing information on the entire packet.
引用
收藏
页数:22
相关论文
共 29 条
  • [1] Oriented stochastic loss descent algorithm to train very deep multi-layer neural networks without vanishing gradients
    Abuqaddom, Inas
    Mahafzah, Basel A.
    Faris, Hossam
    [J]. KNOWLEDGE-BASED SYSTEMS, 2021, 230
  • [2] Deep Learning Approach Combining Sparse Autoencoder With SVM for Network Intrusion Detection
    Al-Qatf, Majjed
    Yu Lasheng
    Al-Habib, Mohammed
    Al-Sabahi, Kamal
    [J]. IEEE ACCESS, 2018, 6 : 52843 - 52856
  • [3] [Anonymous], DESCRIPTION KYOTO U
  • [4] Bilge Leyla, 2012, P 2012 ACM C COMPUTE, P833, DOI [10.1145/2382196.2382284, DOI 10.1145/2382196.2382284]
  • [5] Draper-Gil Gerard, 2016, ICISSP 2016. 2nd International Conference on Information Systems Security and Privacy. Proceedings, P407
  • [6] Ektefa Mohammadreza, 2010, Proceedings of the 2010 International Conference on Information Retrieval and Knowledge Management (CAMP 2010), P200, DOI 10.1109/INFRKM.2010.5466919
  • [7] An introduction to ROC analysis
    Fawcett, Tom
    [J]. PATTERN RECOGNITION LETTERS, 2006, 27 (08) : 861 - 874
  • [8] A Composite Approach of Intrusion Detection Systems: Hybrid RNN and Correlation-Based Feature Optimization
    Gautam, Sunil
    Henry, Azriel
    Zuhair, Mohd
    Rashid, Mamoon
    Javed, Abdul Rehman
    Maddikunta, Praveen Kumar Reddy
    [J]. ELECTRONICS, 2022, 11 (21)
  • [9] Gu J., 2014, PROC POWER SYST COMP, P1, DOI [10.1145/2637166.2637229, DOI 10.1007/978-3-319-07428-3]
  • [10] Evaluating and Improving Adversarial Robustness of Machine Learning-Based Network Intrusion Detectors
    Han, Dongqi
    Wang, Zhiliang
    Zhong, Ying
    Chen, Wenqi
    Yang, Jiahai
    Lu, Shuqiang
    Shi, Xingang
    Yin, Xia
    [J]. IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2021, 39 (08) : 2632 - 2647