Real-Time Network Intrusion Detection System Based on Deep Learning

被引:0
作者
Dong, Yuansheng [1 ]
Wang, Rong [2 ]
He, Juan [2 ]
机构
[1] Huazhong Univ Sci & Technol, Luoyu Rd 1037, Wuhan, Peoples R China
[2] Beihang Univ, Digital Soc & Blockchain Lab, Beijing, Peoples R China
来源
PROCEEDINGS OF 2019 IEEE 10TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND SERVICE SCIENCE (ICSESS 2019) | 2019年
关键词
intrusion detection; deep learning; self-encoder; adaptive acquisition;
D O I
10.1109/icsess47205.2019.9040718
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Computer network is vulnerable to hackers, computer viruses, and other malicious attacks. As an active defense technology, intrusion detection plays an important role in the field of network security. Traditional intrusion detection technologies face problems such as low accuracy, low detection efficiency, high false positive rate, and inability to cope with new types of intrusions. To solve these problems, we propose a real-time network intrusion detection system based on deep learning, which uses big data technology, natural language processing technology and deep learning technology. Our main contributions are as follows: (1) Use Flume as the agent for log collection to realize real-time massive log collection, using Flink as real-time computation engine. (2) Aiming at the high dimensional problem of traffic data, a self-encoder-based intrusion detection dimension reduction method is proposed, and the intrusion detection data is preprocessed, including data cleaning, coding, extraction and integration, and normalization. (3) Propos a deep learning-based intrusion detection model, AE-AlexNet, which uses Auto-Encoder AlexNet neural network. The experimental results of the intrusion detection data set KDD 99 show that the accuracy of the AE-AlexNet, model is as high as 94.32%.
引用
收藏
页码:1 / 4
页数:4
相关论文
共 19 条
[1]   A Neural Network Architecture Combining Gated Recurrent Unit (GRU) and Support Vector Machine (SVM) for Intrusion Detection in Network Traffic Data [J].
Agarap, Abien Fred M. .
PROCEEDINGS OF 2018 10TH INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND COMPUTING (ICMLC 2018), 2018, :26-30
[2]  
Anderson James P., 1980, Tech. Rep
[3]  
[Anonymous], THESIS
[4]   A Survey of Intrusion Detection Systems in Wireless Sensor Networks [J].
Butun, Ismail ;
Morgera, Salvatore D. ;
Sankar, Ravi .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2014, 16 (01) :266-282
[5]   AN INTRUSION-DETECTION MODEL [J].
DENNING, DE .
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 1987, 13 (02) :222-232
[6]  
Heberlein L. Todd, 1990, 1990 IEEE COMP SOC S
[7]   Reducing the dimensionality of data with neural networks [J].
Hinton, G. E. ;
Salakhutdinov, R. R. .
SCIENCE, 2006, 313 (5786) :504-507
[8]  
Iandola F.N., 2016, SQUEEZENET ALEXNET L
[9]   STATE TRANSITION ANALYSIS - A RULE-BASED INTRUSION DETECTION APPROACH [J].
ILGUN, K ;
KEMMERER, RA ;
PORRAS, PA .
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 1995, 21 (03) :181-199
[10]  
Kim G, 2016, ARXIV161101726