A Deep Learning Approach for Intrusion Detection Using Recurrent Neural Networks

被引:1069
作者
Yin, Chuanlong [1 ]
Zhu, Yuefei [1 ]
Fei, Jinlong [1 ]
He, Xinzheng [1 ]
机构
[1] State Key Lab Math Engn & Adv Comp, Zhengzhou 450001, Henan, Peoples R China
关键词
Recurrent neural networks; RNN-IDS; intrusion detection; deep learning; machine learning;
D O I
10.1109/ACCESS.2017.2762418
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Intrusion detection plays an important role in ensuring information security, and the key technology is to accurately identify various attacks in the network. In this paper, we explore how to model an intrusion detection system based on deep learning, and we propose a deep learning approach for intrusion detection using recurrent neural networks (RNN-IDS). Moreover, we study the performance of the model in binary classification and multiclass classification, and the number of neurons and different learning rate impacts on the performance of the proposed model. We compare it with those of J48, artificial neural network, random forest, support vector machine, and other machine learning methods proposed by previous researchers on the benchmark data set. The experimental results show that RNN-IDS is very suitable for modeling a classification model with high accuracy and that its performance is superior to that of traditional machine learning classification methods in both binary and multiclass classification. The RNN-IDS model improves the accuracy of the intrusion detection and provides a new research method for intrusion detection.
引用
收藏
页码:21954 / 21961
页数:8
相关论文
共 25 条
[1]  
[Anonymous], 2015, ANDREJ KARPATHY BLOG
[2]   Fuzziness based semi-supervised learning approach for intrusion detection system [J].
Ashfaq, Rana Aamir Raza ;
Wang, Xi-Zhao ;
Huang, Joshua Zhexue ;
Abbas, Haider ;
He, Yu-Lin .
INFORMATION SCIENCES, 2017, 378 :484-497
[3]  
Bhattacharjee P.S., 2017, Adv. Comput. Sci. Technol, V10, P235
[4]   A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection [J].
Buczak, Anna L. ;
Guven, Erhan .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2016, 18 (02) :1153-1176
[5]   Random Forest Modeling for Network Intrusion Detection System [J].
Farnaaz, Nabila ;
Jabbar, M. A. .
TWELFTH INTERNATIONAL CONFERENCE ON COMMUNICATION NETWORKS, ICCN 2016 / TWELFTH INTERNATIONAL CONFERENCE ON DATA MINING AND WAREHOUSING, ICDMW 2016 / TWELFTH INTERNATIONAL CONFERENCE ON IMAGE AND SIGNAL PROCESSING, ICISP 2016, 2016, 89 :213-217
[6]  
Ingre B, 2015, 2015 INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING AND COMMUNICATION ENGINEERING SYSTEMS (SPACES), P92, DOI 10.1109/SPACES.2015.7058223
[7]  
Javaid A, 2016, P 9 EAI INT C BIOINS, P21, DOI DOI 10.4108/EAI.3-12-2015.2262516
[8]  
Khan J.A., 2016, Int. J. Sci. Res. Sci., V2, P202
[9]   A novel hybrid KPCA and SVM with GA model for intrusion detection [J].
Kuang, Fangjun ;
Xu, Weihong ;
Zhang, Siyang .
APPLIED SOFT COMPUTING, 2014, 18 :178-184
[10]  
LeCun Y., 2015, NATURE, V521, DOI [DOI 10.1038/NATURE14539, 10.1038/nature14539]