Machine Learning vs Deep Learning for Anomaly Detection and Categorization in Multi-cloud Environments

被引:2
作者
Akoto, John [1 ]
Salman, Tara [1 ]
机构
[1] Texas Tech Univ, Lubbock, TX 79409 USA
来源
2022 IEEE CLOUD SUMMIT | 2022年
关键词
anomaly; categorization; CICIDS-2017; dataset; neural networks;
D O I
10.1109/CloudSummit54781.2022.00013
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Detecting intrusions is a critical issue in cybersecurity. One way to overcome this issue is to build efficient and robust Network Intrusion Detection Systems (NIDS) using existing Machine Learning (ML) algorithms. Such an approach has been proposed in the literature and has been shown to perform well. However, a comparative analysis of the performance of ML and Deep Learning (DL) based NIDS for both detection and categorization of intrusions is still needed. This paper investigates the performance of ML and DL models for both intrusion detection and categorization. We use the publicly available Canadian Institute of Cybersecurity Intrusion Detection System 2017 (CICIDS-2017) dataset to train and test ML and DL models. We apply three traditional ML models, namely, Logistic Regression (LR), Random Forest (RF), K-Nearest Neighbor (KNN), and three DL models - 1-D Convolutional Neural Network (Conv1D), Recurrent Neural Network (RNN), and a two-staged model that combines an unsupervised Dense Autoencoders (DAE) for pre-training and an Artificial Neural Network (ANN) for classification. Our results demonstrate that RF is the best performing ML model with a detection accuracy of 99.5% and DAE-ANN is the best performing DL model with a detection accuracy of 98.7%. We also show the advantages of using a stepwise multi-classification over a classical single-stage multi-classification. Finally, we observe that RF outperforms DAE-ANN in categorization with detection rates of 91.35% and 84.66%, respectively.
引用
收藏
页码:44 / 50
页数:7
相关论文
共 48 条
[1]   Network intrusion detection system: A systematic study of machine learning and deep learning approaches [J].
Ahmad, Zeeshan ;
Shahid Khan, Adnan ;
Wai Shiang, Cheah ;
Abdullah, Johari ;
Ahmad, Farhan .
TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2021, 32 (01)
[2]   A Survey of Random Forest Based Methods for Intrusion Detection Systems [J].
Alves Resende, Paulo Angelo ;
Drummond, Andre Costa .
ACM COMPUTING SURVEYS, 2018, 51 (03)
[3]  
[Anonymous], 1999, KDD Cup 1999 Data
[4]   Random forests [J].
Breiman, L .
MACHINE LEARNING, 2001, 45 (01) :5-32
[5]   A Novel Network Intrusion Detection System Based on CNN [J].
Chen, Lin ;
Kuang, Xiaoyun ;
Xu, Aidong ;
Suo, Siliang ;
Yang, Yiwei .
2020 EIGHTH INTERNATIONAL CONFERENCE ON ADVANCED CLOUD AND BIG DATA (CBD 2020), 2020, :243-247
[6]   Random Forest Modeling for Network Intrusion Detection System [J].
Farnaaz, Nabila ;
Jabbar, M. A. .
TWELFTH INTERNATIONAL CONFERENCE ON COMMUNICATION NETWORKS, ICCN 2016 / TWELFTH INTERNATIONAL CONFERENCE ON DATA MINING AND WAREHOUSING, ICDMW 2016 / TWELFTH INTERNATIONAL CONFERENCE ON IMAGE AND SIGNAL PROCESSING, ICISP 2016, 2016, 89 :213-217
[7]  
Gates C., 2006, Proceedings of the 2006 Workshop on New Security Paradigms (NSPW), P21
[8]  
Gharib A., 2016, P 2016 INT C INF SCI, P1
[9]  
Gharib Amirhossein, 2018, Softw. Netw., V2018, P177, DOI [10.13052/JSN2445-9739.2017.009, DOI 10.13052/JSN2445-9739.2017.009]
[10]   MLH-IDS: A Multi-Level Hybrid Intrusion Detection Method [J].
Gogoi, Prasanta ;
Bhattacharyya, D. K. ;
Borah, B. ;
Kalita, Jugal K. .
COMPUTER JOURNAL, 2014, 57 (04) :602-623