Network Intrusion Detection Based on Novel Feature Selection Model and Various Recurrent Neural Networks

被引:76
作者
Thi-Thu-Huong Le [1 ,2 ]
Kim, Yongsu [1 ]
Kim, Howon [1 ]
机构
[1] Pusan Natl Univ, Sch Comp Sci & Engn, Busan 609735, South Korea
[2] Hung Yen Univ Technol & Educ, Informat Technol Fac, Hung Yen 16000, Vietnam
来源
APPLIED SCIENCES-BASEL | 2019年 / 9卷 / 07期
关键词
intrusion detection; IDS; machine learning; deep learning; RNN; LSTM; GRU; SFS; Decision Tree;
D O I
10.3390/app9071392
中图分类号
O6 [化学];
学科分类号
0703 ;
摘要
The recent increase in hacks and computer network attacks around the world has intensified the need to develop better intrusion detection and prevention systems. The intrusion detection system (IDS) plays a vital role in detecting anomalies and attacks on the network which have become larger and more pervasive in nature. However, most anomaly-based intrusion detection systems are plagued by high false positives. Furthermore, Remote-to-Local (R2L) and User-to-Root (U2R) are two kinds of attack which have low predicted accuracy scores in advance IDS methods. Therefore, this paper proposes a novel IDS framework to overcome these IDS problems. The proposed framework including three main parts. The first part is to build SFSDT model which is the feature selection model. SFSDT is to generate the best feature subset from the original feature set. This model is a hybrid Sequence Forward Selection (SFS) algorithm and Decision Tree (DT) model. The second part is to build various IDS models to train on the best-selected feature subset. The various Recurrent Neural Networks (RNN) are traditional RNN, Long Short-Term Memory (LSTM), and Gated Recurrent Unit (GRU). Two IDS datasets are used for the learned models in experiments including NSL-KDD in 2010 and ISCX in 2012. The final part is to evaluate the proposed model by comparing the proposed models to other IDS models. The experimental results show the proposed models achieve significantly improved accuracy detection rate as well as attack types classification. Furthermore, this approach can reduce the computation time by memory profilers measurement.
引用
收藏
页数:29
相关论文
共 46 条
[1]  
Abolhasanzadeh B., 2015, 2015 7th Conference on Information and Knowledge Technology (IKT), P1, DOI [DOI 10.1109/IKT.2015.7288799, 10.1109/IKT.2015.7288799]
[2]  
Alom MZ, 2015, PROC NAECON IEEE NAT, P339, DOI 10.1109/NAECON.2015.7443094
[3]  
[Anonymous], 2009, P 2009 IEEE S COMP I
[4]  
[Anonymous], 2017, CORR
[5]  
[Anonymous], PROCEEDINGS OF THE T
[6]  
[Anonymous], ICIMP 2013
[7]  
Anyanwu Longy O., 2010, Proceedings of the Seventh International Conference on Information Technology: New Generations (ITNG 2010), P919, DOI 10.1109/ITNG.2010.45
[8]  
Chand N, 2016, 2016 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATION AND AUTOMATION (ICACCA 2016), P40, DOI 10.1109/ICACCA.2016.7578859
[9]  
Cho K, 2014, P SSST EMNLP 2014 8
[10]   AN INTRUSION-DETECTION MODEL [J].
DENNING, DE .
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 1987, 13 (02) :222-232