Hierarchical Autoencoder for Network Intrusion Detection

被引:5
作者
Kye, Hyoseon [1 ]
Kim, Miru [1 ]
Kwon, Minhae [1 ]
机构
[1] Soongsil Univ, Sch Elect Engn, Seoul, South Korea
来源
IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC 2022) | 2022年
基金
新加坡国家研究基金会;
关键词
anomaly detection; machine learning; hierarchical systems;
D O I
10.1109/ICC45855.2022.9839056
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
With the development of the Internet and networks, various types of network data have been shared. Intelligent and various cyber attacks are continuously increasing as the amount of network data increases rapidly. Although anomaly detection based on autoencoders worked actively, autoencoder has a limitation that it cannot utilize hidden space and detects abnormal data with various anomalies only at one point. We propose a step-by-step anomaly detection using the hidden space of the autoencoder. The proposed system improves the performance of anomaly detection by utilizing hidden spaces. The pre-detection rate of the abnormal data is 20%, enabling proactive response. The total detection rate of the abnormal data is 99%, which outperforms other existing solutions.
引用
收藏
页码:2700 / 2705
页数:6
相关论文
共 18 条
[1]  
Amor NB, 2004, P 2004 ACM S APPL CO, P420
[2]  
Andropov S, 2017, PROC CONF OPEN INNOV, P26, DOI 10.23919/FRUCT.2017.8071288
[3]  
[Anonymous], 2019, IEEE ACCESS, DOI DOI 10.1177/2325967119890382
[4]   Machine Learning-Based Anomaly Detection for Load Forecasting Under Cyberattacks [J].
Cui, Mingjian ;
Wang, Jianhui ;
Yue, Meng .
IEEE TRANSACTIONS ON SMART GRID, 2019, 10 (05) :5724-5734
[5]  
Dhanabal L., 2015, Int. J. Adv. Res. Comput. Commun. Eng., V4, P446
[6]  
Hang XS, 2005, GECCO 2005: GENETIC AND EVOLUTIONARY COMPUTATION CONFERENCE, VOLS 1 AND 2, P345
[7]  
Haripriya L., 2018, 2018 Second International Conference on Electronics, Communication and Aerospace Technology (ICECA), P925, DOI 10.1109/ICECA.2018.8474576
[8]  
Kim Ki Hyun, 2019, INT C LEARNING REPRE
[9]   Improving one-class SVM for anomaly detection [J].
Li, KL ;
Huang, HK ;
Tian, SF ;
Xu, W .
2003 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-5, PROCEEDINGS, 2003, :3077-3081
[10]   Behavior-Rule Based Intrusion Detection Systems for Safety Critical Smart Grid Applications [J].
Mitchell, Robert ;
Chen, Ing-Ray .
IEEE TRANSACTIONS ON SMART GRID, 2013, 4 (03) :1254-1263