Hybrid Deep Learning Based Attack Detection for Imbalanced Data Classification

被引:13
作者
Almarshdi, Rasha [1 ,2 ]
Nassef, Laila [1 ]
Fadel, Etimad [1 ]
Alowidi, Nahed [1 ]
机构
[1] King Abdulaziz Univ, Fac Comp & Informat Technol, Dept Comp Sci, Jeddah, Saudi Arabia
[2] Univ Hail, Fac Comp Sci & Engn, Dept Comp Sci, Hail, Saudi Arabia
关键词
IoT; IDS; deep learning; machine learning; CNN; LSTM; INTERNET; CHALLENGES; SECURITY;
D O I
10.32604/iasc.2023.026799
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Internet of Things (IoT) is the most widespread and fastest growing technology today. Due to the increasing of IoT devices connected to the Internet, the IoT is the most technology under security attacks. The IoT devices are not designed with security because they are resource constrained devices. Therefore, having an accurate IoT security system to detect security attacks is challenging. Intrusion Detection Systems (IDSs) using machine learning and deep learning techniques can detect security attacks accurately. This paper develops an IDS architecture based on Convolutional Neural Network (CNN) and Long Short-Term Memory (LSTM) deep learning algorithms. We implement our model on the UNSW-NB15 dataset which is a new network intrusion dataset that categorizes the network traffic into normal and attacks traffic. In this work, interpolation data preprocessing is used to compute the missing values. Also, the imbalanced data problem is solved using a synthetic data generation method. Extensive experiments have been implemented to compare the performance results of the proposed model (CNN+LSTM) with a basic model (CNN only) using both balanced and imbalanced dataset. Also, with some state-of-the-art machine learning classifiers (Decision Tree (DT) and Random Forest (RF)) using both balanced and imbalanced dataset. The results proved the impact of the balancing technique. The proposed hybrid model with the balance technique can classify the traffic into normal class and attack class with reasonable accuracy (92.10%) compared with the basic CNN model (89.90%) and the machine learning (DT 88.57% and RF 90.85%) models. Moreover, comparing the proposed model results with the most related works shows that the proposed model gives good results compared with the related works that used the balance techniques.
引用
收藏
页码:297 / 320
页数:24
相关论文
共 37 条
[1]  
Abdul-Ghani HA, 2018, INT J ADV COMPUT SC, V9, P355
[2]   LSTM and Bat-Based RUSBoost Approach for Electricity Theft Detection [J].
Adil, Muhammad ;
Javaid, Nadeem ;
Qasim, Umar ;
Ullah, Ibrar ;
Shafiq, Muhammad ;
Choi, Jin-Ghoo .
APPLIED SCIENCES-BASEL, 2020, 10 (12)
[3]  
[Anonymous], KSM BLOOD BANK
[4]   Big data analytics for identifying electricity theft using machine learning approaches in microgrids for smart communities [J].
Arif, Arooj ;
Javaid, Nadeem ;
Aldegheishem, Abdulaziz ;
Alrajeh, Nabil .
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2021, 33 (17)
[5]  
Azizjon Meliboev, 2020, 2020 International Conference on Artificial Intelligence in Information and Communication (ICAIIC), P218, DOI 10.1109/ICAIIC48513.2020.9064976
[6]   Resampling imbalanced data for network intrusion detection datasets [J].
Bagui, Sikha ;
Li, Kunqi .
JOURNAL OF BIG DATA, 2021, 8 (01)
[7]   Using machine learning techniques to identify rare cyber-attacks on the UNSW-NB15 dataset [J].
Bagui, Sikha ;
Kalaimannan, Ezhil ;
Bagui, Subhash ;
Nandi, Debarghya ;
Pinto, Anthony .
SECURITY AND PRIVACY, 2019, 2 (06)
[8]   Middleware for Internet of Things: Survey and Challenges [J].
Chelloug, Samia Allaoua ;
Ei-Zawawy, Mohamed A. .
INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2018, 24 (02) :309-317
[9]   Internet of Things security and forensics: Challenges and opportunities [J].
Conti, Mauro ;
Dehghantanha, Ali ;
Franke, Katrin ;
Watson, Steve .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 78 :544-546
[10]  
Dhanabal L., 2015, INT J ADV RES COMPUT, V4, P446, DOI [DOI 10.17148/IJARCCE.2015.4696, 10.17148/IJARCCE.2015.4696]