Detecting Network Transmission Anomalies using Autoencoders-SVM Neural Network on Multi-class NSL-KDD Dataset

被引:9
作者
Khan, Shehram Sikander [1 ]
Mailewa, Akalanka Bandara [2 ]
机构
[1] St Cloud State Univ, Dept Informat Assurance, St Cloud, MN 56301 USA
[2] St Cloud State Univ, Dept Comp Sci & IT, St Cloud, MN 56301 USA
来源
2023 IEEE 13TH ANNUAL COMPUTING AND COMMUNICATION WORKSHOP AND CONFERENCE, CCWC | 2023年
关键词
NSL-KDD; Network Security; Intrusion Detection System; Deep Autoencoders; Anomaly Detection; Support Vector Machine (SVM); t-SNE; Deep Learning; DEEP LEARNING APPROACH; INTRUSION; CLASSIFIER;
D O I
10.1109/CCWC57344.2023.10099056
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
As modern manufacturing shifts towards industry 4.0, mass adoption of vulnerable Internet-of-Things (IoT), Operational Technology (OT), and IT-OT convergence have precipitated the rise of malware. Accordingly, there is a need for a security mechanism that is both low-resource and highly accurate to address sophisticated attacks like zero-day and Mirai botnets. The study proposed a novel scheme that combined Deep Autoencoder (DAE) and Support Vector Machine (SVM); the hybrid scheme was tested on NSL-KDD: an imbalanced, multi-class, and high-dimensional dataset. We conducted a grid search analysis on L1 and L2 regularization to avoid overfitting and examined varying neural network formations to improve F1-micro and balance accuracy. The paper thoroughly evaluated all four attack classes within the NSL-KDD dataset: U2R, Denial of Service, R2L, and Probe. We demonstrated that DAE-SVM had a significant classification advantage over PCA-SVM; our model outperformed the baseline models at detecting low-frequency attacks with a micro-average score of 0.72 compared to 0.63 for PCA-SVM. To minimize computational overhead, we examined optimal feature fusion usage on Principal Component Analysis (PCA) and deep autoencoders. Our models, namely SVM, PCA-SVM, and DAE-SVM, were evaluated based on train and test times for rapid predictions. The DAE-SVM with L1 penalty was the model of choice for binary classes with a train and test time of 145 seconds, while DAE-SVM without any penalty term outperformed other models in the multi-class scenario delivering 142.62 seconds compared to 300 seconds for PCA-SVM.
引用
收藏
页码:835 / 843
页数:9
相关论文
共 38 条
[1]   Deep Learning Approach Combining Sparse Autoencoder With SVM for Network Intrusion Detection [J].
Al-Qatf, Majjed ;
Yu Lasheng ;
Al-Habib, Mohammed ;
Al-Sabahi, Kamal .
IEEE ACCESS, 2018, 6 :52843-52856
[2]  
[Anonymous], COST DAT BREACH 2022
[3]  
[Anonymous], 2015, Neural Networks and Deep Learning
[4]  
[Anonymous], MICR DIG DEF REP 202
[5]  
Asif MK, 2013, 2013 IEEE BUSINESS ENGINEERING AND INDUSTRIAL APPLICATIONS COLLOQUIUM (BEIAC 2013), P140
[6]   A machine learning based IoT for providing an intrusion detection system for security [J].
Atul, Dhanke Jyoti ;
Kamalraj, R. ;
Ramesh, G. ;
Sankaran, K. Sakthidasan ;
Sharma, Sudhir ;
Khasim, Syed .
MICROPROCESSORS AND MICROSYSTEMS, 2021, 82
[7]  
Bandara Mailewa A, 2019, SECURITY THREATS ATT
[8]  
Charte D., PRACTICAL TUTORIAL A
[9]   Prediction using step-wise L1, L2 regularization and feature selection for small data sets with large number of features [J].
Demir-Kavuk, Ozgur ;
Kamada, Mayumi ;
Akutsu, Tatsuya ;
Knapp, Ernst-Walter .
BMC BIOINFORMATICS, 2011, 12
[10]  
Dissanayaka Akalanka Mailewa, 2020, ICCDA 2020: Proceedings of the 2020 4th International Conference on Compute and Data Analysis, P58, DOI 10.1145/3388142.3388168