CNN-CGAN: A New Approach for Intrusion Detection Based on Generative Adversarial Networks

被引:0
作者
Ji, Zhengxia [1 ]
Gao, Xin [1 ]
机构
[1] Beijing Jiaotong Univ, Sch Elect & Informat Engn, Beijing 100044, Peoples R China
来源
EMERGING NETWORKING ARCHITECTURE AND TECHNOLOGIES, ICENAT 2022 | 2023年 / 1696卷
关键词
Intrusion detection; Chi-square test; Generative adversarial network; DEEP LEARNING APPROACH; SMOTE;
D O I
10.1007/978-981-19-9697-9_26
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
With malicious traffic occurring all the time, network intrusion detection remains a critical task. However, data imbalance in the network and the increasing number of unknown attack types make the detection difficult. Therefore, in this study, we propose an anomalous traffic detection method named CNN-CGAN, which achieves data equalization by a modified generative adversarial network (GAN) and uses an convolutional neural network (CNN) as the detection model. First, chi-square test is used to extract various types of features from network attack data to accelerate the convergence of the model. Then, we use a improved generative adversarial network to generate data with similar distribution to the small sample data to complete the data equalization. Finally, CNN effectively extracts data features for attack detection and classification. Experiments on the network security dataset NSL-KDD prove that the CNN-GAN model in this paper outperforms the classical detection models in performance indicators such as F1 score, precision and recall. In addition to this, the detection rate of unknown attacks and attack types is also higher with fewer samples.
引用
收藏
页码:324 / 335
页数:12
相关论文
共 16 条
  • [1] Performance Comparison of Support Vector Machine, Random Forest, and Extreme Learning Machine for Intrusion Detection
    Ahmad, Iftikhar
    Basheri, Mohammad
    Iqbal, Muhammad Javed
    Rahim, Aneel
    [J]. IEEE ACCESS, 2018, 6 : 33789 - 33795
  • [2] Learning Deep Landmarks for Imbalanced Classification
    Bao, Feng
    Deng, Yue
    Kong, Youyong
    Ren, Zhiquan
    Suo, Jinli
    Dai, Qionghai
    [J]. IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS, 2020, 31 (08) : 2691 - 2704
  • [3] SMOTE: Synthetic minority over-sampling technique
    Chawla, Nitesh V.
    Bowyer, Kevin W.
    Hall, Lawrence O.
    Kegelmeyer, W. Philip
    [J]. 2002, American Association for Artificial Intelligence (16)
  • [4] Dong B, 2016, I C COMM SOFTW NET, P581, DOI 10.1109/ICCSN.2016.7586590
  • [5] ADASYN: Adaptive Synthetic Sampling Approach for Imbalanced Learning
    He, Haibo
    Bai, Yang
    Garcia, Edwardo A.
    Li, Shutao
    [J]. 2008 IEEE INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS, VOLS 1-8, 2008, : 1322 - 1328
  • [6] IGAN-IDS: An imbalanced generative adversarial network towards intrusion detection system in ad-hoc networks
    Huang, Shuokang
    Lei, Kai
    [J]. AD HOC NETWORKS, 2020, 105 (105)
  • [7] A Taxonomy of Machine-Learning-Based Intrusion Detection Systems for the Internet of Things: A Survey
    Jamalipour, Abbas
    Murali, Sarumathi
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (12) : 9444 - 9466
  • [8] CANintelliIDS: Detecting In-Vehicle Intrusion Attacks on a Controller Area Network Using CNN and Attention-Based GRU
    Javed, Abdul Rehman
    Rehman, Saif Ur
    Khan, Mohib Ullah
    Alazab, Mamoun
    Reddy, Thippa G.
    [J]. IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2021, 8 (02): : 1456 - 1466
  • [9] Lemaître G, 2017, J MACH LEARN RES, V18
  • [10] Variational Few-Shot Learning for Microservice-Oriented Intrusion Detection in Distributed Industrial IoT
    Liang, Wei
    Hu, Yiyong
    Zhou, Xiaokang
    Pan, Yi
    Wang, Kevin I-Kai
    [J]. IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2022, 18 (08) : 5087 - 5095