BAT: Deep Learning Methods on Network Intrusion Detection Using NSL-KDD Dataset

被引:261
作者
Su, Tongtong [1 ]
Sun, Huazhi [1 ]
Zhu, Jinqi [1 ]
Wang, Sheng [1 ]
Li, Yabo [1 ]
机构
[1] Tianjin Normal Univ, Sch Comp & Informat Engn, Tianjin 300387, Peoples R China
关键词
Network traffic; intrusion detection; deep learning; BLSTM; attention mechanism; DETECTION SYSTEM; MODEL;
D O I
10.1109/ACCESS.2020.2972627
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Intrusion detection can identify unknown attacks from network traffics and has been an effective means of network security. Nowadays, existing methods for network anomaly detection are usually based on traditional machine learning models, such as KNN, SVM, etc. Although these methods can obtain some outstanding features, they get a relatively low accuracy and rely heavily on manual design of traffic features, which has been obsolete in the age of big data. To solve the problems of low accuracy and feature engineering in intrusion detection, a traffic anomaly detection model BAT is proposed. The BAT model combines BLSTM (Bidirectional Long Short-term memory) and attention mechanism. Attention mechanism is used to screen the network flow vector composed of packet vectors generated by the BLSTM model, which can obtain the key features for network traffic classification. In addition, we adopt multiple convolutional layers to capture the local features of traffic data. As multiple convolutional layers are used to process data samples, we refer BAT model as BAT-MC. The softmax classifier is used for network traffic classification. The proposed end-to-end model does not use any feature engineering skills and can automatically learn the key features of the hierarchy. It can well describe the network traffic behavior and improve the ability of anomaly detection effectively. We test our model on a public benchmark dataset, and the experimental results demonstrate our model has better performance than other comparison methods.
引用
收藏
页码:29575 / 29585
页数:11
相关论文
共 54 条
[1]  
[Anonymous], [No title captured]
[2]  
[Anonymous], 2016, P INT C ADV COMP
[3]  
[Anonymous], [No title captured]
[4]  
[Anonymous], [No title captured]
[5]  
[Anonymous], [No title captured]
[6]  
[Anonymous], [No title captured]
[7]  
[Anonymous], 2013, P S AFR I COMP SCI I
[8]   A survey on deep learning based approaches for action and gesture recognition in image sequences [J].
Asadi-Aghbolaghi, Maryam ;
Clapes, Albert ;
Bellantonio, Marco ;
Escalante, Hugo Jair ;
Ponce-Lopez, Victor ;
Baro, Xavier ;
Guyon, Isabelle ;
Kasaei, Shohreh ;
Escalera, Sergio .
2017 12TH IEEE INTERNATIONAL CONFERENCE ON AUTOMATIC FACE AND GESTURE RECOGNITION (FG 2017), 2017, :476-483
[9]   Application of global optimization methods to model and feature selection [J].
Boubezoul, Abderrahmane ;
Paris, Sebastien .
PATTERN RECOGNITION, 2012, 45 (10) :3676-3686
[10]  
Deshmukh Datta H., 2015, 2015 International Conference on Communication, Information & Computing Technology (ICCICT), P1, DOI 10.1109/ICCICT.2015.7045674