A network intrusion detection system based on convolutional neural network

被引:57
作者
Wang, Hui [1 ]
Cao, Zijian [1 ]
Hong, Bo [1 ]
机构
[1] Xian Technol Univ, Sch Comp Sci & Engn, Xian 710021, Peoples R China
关键词
Convolutional Neural Network; intrusion detection; NSL-KDD; data flow analysis; FEATURE-SELECTION;
D O I
10.3233/JIFS-179833
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Intrusion detection systems (IDSs) play an important point in resisting hacker intrusion. With the rapid development of the network technology, network security has received more and more attention from researchers of different fields, and the traditional network security system based on the regular intrusion detection rules cannot meet the growing demand of changeable and timely intrusion prevention. Therefore, the development of efficient IDSs always is an open challenge. Firstly, a novel intrusion detection method based on the Convolutional Neural Network (CNN) is proposed in this paper. Secondly, based on the proposed method, an efficient, real-time and automated intrusion detection system named IDS-CNN is well designed. The system is built by several open source tools, such as the packet capture interface Tcpdump, the traffic analysis Bro and the machine learning interface Tensorflow. The system is composed of data preprocessing, neural network training, network testing and intrusion response based on Linux platform. Finally, through the simulation experiment with NSL-KDD data set and the actual network flow test, the experimental results indicate that the proposed IDS-CNN system can not only complete the intrusion detection for network data streams efficiently, but also its detection precision is better than the state-of-the-art method.
引用
收藏
页码:7623 / 7637
页数:15
相关论文
共 34 条
[1]   A survey of intrusion detection systems based on ensemble and hybrid classifiers [J].
Aburomman, Abdulla Amin ;
Reaz, Mamun Bin Ibne .
COMPUTERS & SECURITY, 2017, 65 :135-152
[2]   A feature reduced intrusion detection system using ANN classifier [J].
Akashdeep ;
Manzoor, Ishfaq ;
Kumar, Neeraj .
EXPERT SYSTEMS WITH APPLICATIONS, 2017, 88 :249-257
[3]   Anomaly-based intrusion detection system through feature selection analysis and building hybrid efficient model [J].
Aljawarneh, Shadi ;
Aldwairi, Monther ;
Yassein, Muneer Bani .
JOURNAL OF COMPUTATIONAL SCIENCE, 2018, 25 :152-160
[4]   Fuzziness based semi-supervised learning approach for intrusion detection system [J].
Ashfaq, Rana Aamir Raza ;
Wang, Xi-Zhao ;
Huang, Joshua Zhexue ;
Abbas, Haider ;
He, Yu-Lin .
INFORMATION SCIENCES, 2017, 378 :484-497
[5]   Comparison of classification techniques applied for network intrusion detection and classification [J].
Aziz, Amira Sayed A. ;
EL-Ola Hanafi, Sanaa ;
Hassanien, Aboul Ella .
JOURNAL OF APPLIED LOGIC, 2017, 24 :109-118
[6]   An effective intrusion detection framework based on MCLP/SVM optimized by time-varying chaos particle swarm optimization [J].
Bamakan, Seyed Mojtaba Hosseini ;
Wang, Huadong ;
Tian Yingjie ;
Shi, Yong .
NEUROCOMPUTING, 2016, 199 :90-102
[7]   Application of Matched-Filter Concepts to Unbiased Selection of Data in Pump-Probe Experiments with Free Electron Lasers [J].
Callegari, Carlo ;
Takanashi, Tsukasa ;
Fukuzawa, Hironobu ;
Motomura, Koji ;
Iablonskyi, Denys ;
Kumagai, Yoshiaki ;
Mondal, Subhendu ;
Tachibana, Tetsuya ;
Nagaya, Kiyonobu ;
Nishiyama, Toshiyuki ;
Matsunami, Kenji ;
Johnsson, Per ;
Piseri, Paolo ;
Sansone, Giuseppe ;
Dubrouil, Antoine ;
Reduzzi, Maurizio ;
Carpeggiani, Paolo ;
Vozzi, Caterina ;
Devetta, Michele ;
Facciala, Davide ;
Calegari, Francesca ;
Castrovilli, Mattea Carmen ;
Coreno, Marcello ;
Alagia, Michele ;
Schuette, Bernd ;
Berrah, Nora ;
Plekan, Oksana ;
Finetti, Paola ;
Ferrari, Eugenio ;
Prince, Kevin Charles ;
Ueda, Kiyoshi .
APPLIED SCIENCES-BASEL, 2017, 7 (06)
[8]  
Chung Y.Y., 2012, APPL SOFT COMPUTING, V12
[9]   A study on intrusion detection using neural networks trained with evolutionary algorithms [J].
Dash, Tirtharaj .
SOFT COMPUTING, 2017, 21 (10) :2687-2700
[10]   Mining network data for intrusion detection through combining SVMs with ant colony networks [J].
Feng, Wenying ;
Zhang, Qinglei ;
Hu, Gongzhu ;
Huang, Jimmy Xiangji .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2014, 37 :127-140