Weight embedding autoencoder as feature representation learning in an intrusion detection systems

被引:5
作者
Mulyanto, Mulyanto [1 ]
Leu, Jenq-Shiou [1 ]
Faisal, Muhamad [1 ]
Yunanto, Wawan [2 ]
机构
[1] Natl Taiwan Univ Sci & Technol NTUST, Elect & Comp Engn, Taipei, Taiwan
[2] Politekn Caltex Riau, Kota Pekanbaru, Indonesia
关键词
Weight embedding; Autoencoder; Neural network; Intrusion detection;
D O I
10.1016/j.compeleceng.2023.108949
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The increasing need for safe internet access that withstands against various malicious attacks has gained much attention, especially in this abundant information age. Network intrusion detection systems have been proposed to tackle these kinds of attacks. Various machine learning algorithms, including deep learning, have been utilized in network intrusion detection systems. However, the limitations of current feature extraction methods for feature representation learning result in low detection accuracy. Our method utilizes an autoencoder to extract the low-level features in order to provide the necessary information for the classifier. We propose a weight embedding autoencoder to share feature representations between the autoencoder and the classifier. We apply our proposed method to improve two types of networks, a weight embedding autoencoder with a multi layers neural network (WE-AE DNN) and a weight embedding autoencoder with a convolutional neural network (WE-AE CNN) as the classifier. Experiments on two demanding benchmark datasets, such as NSL-KDD and UNSW-NB15 show the effectiveness and superiority of our proposed algorithm in terms of accuracy. The WE-AE DNN and WE-AE CNN improve the accuracy by 0.4% and 0.5% on NSL-KDD, respectively. Meanwhile, on the UNSWNB15 dataset, the WE-AE DNN and WE-AE CNN improve the accuracy by 2.8% and 0.5%, respectively.
引用
收藏
页数:17
相关论文
共 30 条
  • [1] Deep Abstraction and Weighted Feature Selection for Wi-Fi Impersonation Detection
    Aminanto, Muhamad Erza
    Choi, Rakyong
    Tanuwidjaja, Harry Chandra
    Yoo, Paul D.
    Kim, Kwangjo
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2018, 13 (03) : 621 - 636
  • [2] Representation Learning: A Review and New Perspectives
    Bengio, Yoshua
    Courville, Aaron
    Vincent, Pascal
    [J]. IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 2013, 35 (08) : 1798 - 1828
  • [3] Chen ZM, 2018, WIREL TELECOMM SYMP
  • [4] Analysis of KDD-Cup'99, NSL-KDD and UNSW-NB15 Datasets using Deep Learning in IoT
    Choudhary, Sarika
    Kesswani, Nishtha
    [J]. INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND DATA SCIENCE, 2020, 167 : 1561 - 1573
  • [5] Deep learning for cyber security intrusion detection: Approaches, datasets, and comparative study
    Ferrag, Mohamed Amine
    Maglaras, Leandros
    Moschoyiannis, Sotiris
    Janicke, Helge
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2020, 50
  • [6] Reducing the dimensionality of data with neural networks
    Hinton, G. E.
    Salakhutdinov, R. R.
    [J]. SCIENCE, 2006, 313 (5786) : 504 - 507
  • [7] Hinton G. E., 1993, Advances in Neural Information Processing Systems, P3, DOI [DOI 10.5555/2987189.2987190, 10.5555/2987189.2987190]
  • [8] Hodo E, 2016, 2016 INTERNATIONAL SYMPOSIUM ON NETWORKS, COMPUTERS AND COMMUNICATIONS (ISNCC)
  • [9] Network Intrusion Detection Combined Hybrid Sampling With Deep Hierarchical Network
    Jiang, Kaiyuan
    Wang, Wenya
    Wang, Aili
    Wu, Haibin
    [J]. IEEE ACCESS, 2020, 8 : 32464 - 32476
  • [10] A deep learning method with wrapper based feature extraction for wireless intrusion detection system
    Kasongo, Sydney Mambwe
    Sun, Yanxia
    [J]. COMPUTERS & SECURITY, 2020, 92 (92)