Network intrusion detection using fusion features and convolutional bidirectional recurrent neural network

被引:2
|
作者
Jagruthi, H. [1 ]
Kavitha, C. [2 ]
Mulimani, Manjunath [3 ]
机构
[1] BNM Inst Technol, Dept Informat Sci & Engn, Bangalore, Karnataka, India
[2] Dayananda Sagar Acad Technol & Management, Dept Comp Sci & Engn, Bangalore, Karnataka, India
[3] Manipal Acad Higher Educ, Manipal Inst Technol, Dept Comp Sci & Engn, Manipal, Karnataka, India
关键词
intrusion detection; fusion features; convolutional neural network; bidirectional long short-term memory; convolutional bidirectional recurrent neural network; UNSW-NB15 data set; SYSTEM; ALGORITHM; ATTACKS; MISUSE;
D O I
10.1504/IJCAT.2022.10051192
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
In this paper, novel fusion features to train Convolutional Bidirectional Recurrent Neural Network (CBRNN) are proposed for network intrusion detection. UNSW-NB15 data sets' attack behaviours (input features) are fused with their first and second-order derivatives at different stages to get fusion features. In this work, we have taken architectural advantage and combine both Convolutional Neural Network (CNN) and bidirectional Long Short-Term Memory (LSTM) as Recurrent Neural Network (RNN) to get CBRNN. The input features and their first and second-order derivatives are fused and considered as input to CNN and this fusion is known as early fusion. Outputs of the CNN layers are fused and used as input to the bidirectional LSTM, this fusion is known as late fusion. Results show that late fusion features are more suitable for intrusion detection and outperform the state-of-the-art approaches with average recognition accuracies of 98.00% and 91.50% for binary and multiclass classification configurations, respectively.
引用
收藏
页码:93 / 100
页数:9
相关论文
共 50 条
  • [1] Intrusion Detection Model for IoT Using Recurrent Kernel Convolutional Neural Network
    Kumar, C. U. Om
    Marappan, Suguna
    Murugeshan, Bhavadharini
    Beaulah, V. Mercy Rajaselvi
    WIRELESS PERSONAL COMMUNICATIONS, 2023, 129 (02) : 783 - 812
  • [2] Intrusion Detection Model for IoT Using Recurrent Kernel Convolutional Neural Network
    C. U. Om Kumar
    Suguna Marappan
    Bhavadharini Murugeshan
    P. Mercy Rajaselvi Beaulah
    Wireless Personal Communications, 2023, 129 : 783 - 812
  • [3] Remora based Deep Maxout Network model for network intrusion detection using Convolutional Neural Network features
    Pingale, Subhash, V
    Sutar, Sanjay R.
    COMPUTERS & ELECTRICAL ENGINEERING, 2023, 110
  • [4] Correction to: Intrusion Detection Model for IoT Using Recurrent Kernel Convolutional Neural Network
    C. U. Om Kumar
    Suguna Marappan
    Bhavadharini Murugeshan
    P. Mercy Rajaselvi Beaulah
    Wireless Personal Communications, 2023, 129 : 813 - 813
  • [5] Applying Convolutional Neural Network for Network Intrusion Detection
    Vinayakumar, R.
    Soman, K. P.
    Poornachandran, Prabaharan
    2017 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2017, : 1222 - 1228
  • [6] SOUND EVENT DETECTION USING SPATIAL FEATURES AND CONVOLUTIONAL RECURRENT NEURAL NETWORK
    Adavanne, Sharath
    Pertila, Pasi
    Virtanen, Tuomas
    2017 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING (ICASSP), 2017, : 771 - 775
  • [7] In-vehicle network intrusion detection using deep convolutional neural network
    Song, Hyun Min
    Woo, Jiyoung
    Kim, Huy Kang
    VEHICULAR COMMUNICATIONS, 2020, 21
  • [8] HCRNNIDS: Hybrid Convolutional Recurrent Neural Network-Based Network Intrusion Detection System
    Khan, Muhammad Ashfaq
    PROCESSES, 2021, 9 (05)
  • [9] Network Intrusion Detection Based on Convolutional Recurrent Neural Network, Random Forest, and Federated Learning
    Zou, Qianying
    Li, Yushi
    Jiang, Xinyue
    Zan, Yuepeng
    Liu, Fengyu
    Journal of Computing and Information Technology, 2024, 32 (02) : 97 - 125
  • [10] Convolutional neural network for intrusion detection using blockchain technology
    Aljabri A.
    Jemili F.
    Korbaa O.
    International Journal of Computers and Applications, 2024, 46 (02) : 67 - 77