Network Intrusion Detection Based on Novel Feature Selection Model and Various Recurrent Neural Networks

被引:76
作者
Thi-Thu-Huong Le [1 ,2 ]
Kim, Yongsu [1 ]
Kim, Howon [1 ]
机构
[1] Pusan Natl Univ, Sch Comp Sci & Engn, Busan 609735, South Korea
[2] Hung Yen Univ Technol & Educ, Informat Technol Fac, Hung Yen 16000, Vietnam
来源
APPLIED SCIENCES-BASEL | 2019年 / 9卷 / 07期
关键词
intrusion detection; IDS; machine learning; deep learning; RNN; LSTM; GRU; SFS; Decision Tree;
D O I
10.3390/app9071392
中图分类号
O6 [化学];
学科分类号
0703 ;
摘要
The recent increase in hacks and computer network attacks around the world has intensified the need to develop better intrusion detection and prevention systems. The intrusion detection system (IDS) plays a vital role in detecting anomalies and attacks on the network which have become larger and more pervasive in nature. However, most anomaly-based intrusion detection systems are plagued by high false positives. Furthermore, Remote-to-Local (R2L) and User-to-Root (U2R) are two kinds of attack which have low predicted accuracy scores in advance IDS methods. Therefore, this paper proposes a novel IDS framework to overcome these IDS problems. The proposed framework including three main parts. The first part is to build SFSDT model which is the feature selection model. SFSDT is to generate the best feature subset from the original feature set. This model is a hybrid Sequence Forward Selection (SFS) algorithm and Decision Tree (DT) model. The second part is to build various IDS models to train on the best-selected feature subset. The various Recurrent Neural Networks (RNN) are traditional RNN, Long Short-Term Memory (LSTM), and Gated Recurrent Unit (GRU). Two IDS datasets are used for the learned models in experiments including NSL-KDD in 2010 and ISCX in 2012. The final part is to evaluate the proposed model by comparing the proposed models to other IDS models. The experimental results show the proposed models achieve significantly improved accuracy detection rate as well as attack types classification. Furthermore, this approach can reduce the computation time by memory profilers measurement.
引用
收藏
页数:29
相关论文
共 46 条
[31]   A survey of intrusion detection techniques in Cloud [J].
Modi, Chirag ;
Patel, Dhiren ;
Borisaniya, Bhavesh ;
Patel, Hiren ;
Patel, Avi ;
Rajarajan, Muttukrishnan .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2013, 36 (01) :42-57
[32]   NETWORK INTRUSION DETECTION [J].
MUKHERJEE, B ;
HEBERLEIN, LT ;
LEVITT, KN .
IEEE NETWORK, 1994, 8 (03) :26-41
[33]  
Osama A., 2012, J APPL SCI RES, V8, P1748
[34]  
Pascanu Razvan, 2013, PROC INT C MACH LEAR
[35]  
Quinlan J. R., 1986, Machine Learning, V1, P81, DOI 10.1023/A:1022643204877
[36]  
Rao A., 2005, Proceedings of the First International Conference on Information and Communication Technologies, ICICT 2005 IEEE, P233, DOI [10.1109/ICICT.2005.1598592, DOI 10.1109/ICICT.2005.1598592]
[37]  
Revathi S., 2013, Int. J. Eng. Res. Technol. (IJERT), V2, P1848
[38]  
Sabahi F., 2008, 2008 3rd International Conference on Systems and Networks Communications, P23, DOI 10.1109/ICSNC.2008.44
[39]   Toward developing a systematic approach to generate benchmark datasets for intrusion detection [J].
Shiravi, Ali ;
Shiravi, Hadi ;
Tavallaee, Mahbod ;
Ghorbani, Ali A. .
COMPUTERS & SECURITY, 2012, 31 (03) :357-374
[40]  
Stavroulakis P, 2010, HANDBOOK OF INFORMATION AND COMMUNICATION SECURITY, P829, DOI 10.1007/978-3-642-04117-4_38