Deep learning methods in network intrusion detection: A survey and an objective comparison

被引:207
作者
Gamage, Sunanda [1 ]
Samarabandu, Jagath [1 ]
机构
[1] Univ Western Ontario, Dept Elect & Comp Engn, London, ON, Canada
基金
加拿大自然科学与工程研究理事会;
关键词
Network intrusion detection; Deep learning; Deep neural networks; Survey; ATTACK DETECTION;
D O I
10.1016/j.jnca.2020.102767
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The use of deep learning models for the network intrusion detection task has been an active area of research in cybersecurity. Although several excellent surveys cover the growing body of research on this topic, the literature lacks an objective comparison of the different deep learning models within a controlled environment, especially on recent intrusion detection datasets. In this paper, we first introduce a taxonomy of deep learning models in intrusion detection and summarize the research papers on this topic. Then we train and evaluate four key deep learning models - feed-forward neural network, autoencoder, deep belief network and long short-term memory network - for the intrusion classification task on two legacy datasets (KDD 99, NSL-KDD) and two modern datasets (CIC-IDS2017, CIC-IDS2018). Our results suggest that deep feed-forward neural networks yield desirable evaluation metrics on all four datasets in terms of accuracy, F1-score and training and inference time. The results also indicate that two popular semi-supervised learning models, autoencoders and deep belief networks do not perform better than supervised feed-forward neural networks. The implementation and the complete set of results have been released for future use by the research community. Finally, we discuss the issues in the research literature that were revealed in the survey and suggest several potential future directions for research in machine learning methods for intrusion detection.
引用
收藏
页数:21
相关论文
共 83 条
[41]  
Kneale C., 2019, SEMISUPERVISED ADVER
[42]   ImageNet Classification with Deep Convolutional Neural Networks [J].
Krizhevsky, Alex ;
Sutskever, Ilya ;
Hinton, Geoffrey E. .
COMMUNICATIONS OF THE ACM, 2017, 60 (06) :84-90
[43]  
Kwon D., 2017, CLUSTER COMPUT
[44]   An Empirical Study on Network Anomaly Detection using Convolutional Neural Networks [J].
Kwon, Donghwoon ;
Natarajan, Kathiravan ;
Suh, Sang C. ;
Kim, Hyunjoo ;
Kim, Jinoh .
2018 IEEE 38TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS (ICDCS), 2018, :1595-1598
[45]   Unmasking Clever Hans predictors and assessing what machines really learn [J].
Lapuschkin, Sebastian ;
Waeldchen, Stephan ;
Binder, Alexander ;
Montavon, Gregoire ;
Samek, Wojciech ;
Mueller, Klaus-Robert .
NATURE COMMUNICATIONS, 2019, 10 (1)
[46]  
Li Y., 2015, HYBRID MALICIOUS COD
[47]   Cloud-Based Cyber-Physical Intrusion Detection for Vehicles Using Deep Learning [J].
Loukas, George ;
Tuan Vuong ;
Heartfield, Ryan ;
Sakellari, Georgia ;
Yoon, Yongpil ;
Gan, Diane .
IEEE ACCESS, 2018, 6 :3491-3508
[48]   A Hybrid Spectral Clustering and Deep Neural Network Ensemble Algorithm for Intrusion Detection in Sensor Networks [J].
Ma, Tao ;
Wang, Fen ;
Cheng, Jianjun ;
Yu, Yang ;
Chen, Xiaoyun .
SENSORS, 2016, 16 (10)
[49]   A Detailed Investigation and Analysis of Using Machine Learning Techniques for Intrusion Detection [J].
Mishra, Preeti ;
Varadharajan, Vijay ;
Tupakula, Uday ;
Pilli, Emmanuel S. .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2019, 21 (01) :686-728
[50]   Methods for interpreting and understanding deep neural networks [J].
Montavon, Gregoire ;
Samek, Wojciech ;
Mueller, Klaus-Robert .
DIGITAL SIGNAL PROCESSING, 2018, 73 :1-15