A hybrid deep learning model for efficient intrusion detection in big data environment

被引:225
作者
Hassan, Mohammad Mehedi [1 ]
Gumaei, Abdu [2 ]
Alsanad, Ahmed [1 ]
Alrubaian, Majed [1 ]
Fortino, Giancarlo [3 ]
机构
[1] King Saud Univ, Coll Comp & Informat Sci, Informat Syst Dept, Riyadh 11543, Saudi Arabia
[2] King Saud Univ, Coll Comp & Informat Sci, Comp Sci Dept, Riyadh 11543, Saudi Arabia
[3] Univ Calabria, Dept Informat Modeling Elect & Syst, I-87036 Arcavacata Di Rende, Italy
关键词
Big data; Intrusion detection; Deep learning; Convolution neural network; Weight-dropped long short-term memory network; DETECTION SYSTEMS; NEURAL-NETWORKS; FEEDFORWARD;
D O I
10.1016/j.ins.2019.10.069
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The volume of network and Internet traffic is expanding daily, with data being created at the zettabyte to petabyte scale at an exceptionally high rate. These can be characterized as big data, because they are large in volume, variety, velocity, and veracity. Security threats to networks, the Internet, websites, and organizations are growing alongside this growth in usage. Detecting intrusions in such a big data environment is difficult. Various intrusion-detection systems (IDSs) using artificial intelligence or machine learning have been proposed for different types of network attacks, but most of these systems either cannot recognize unknown attacks or cannot respond to such attacks in real time. Deep learning models, recently applied to large-scale big data analysis, have shown remarkable performance in general but have not been examined for detection of intrusions in a big data environment. This paper proposes a hybrid deep learning model to efficiently detect network intrusions based on a convolutional neural network (CNN) and a weight-dropped, long short-term memory (WDLSTM) network. We use the deep CNN to extract meaningful features from IDS big data and WDLSTM to retain long-term dependencies among extracted features to prevent overfitting on recurrent connections. The proposed hybrid method was compared with traditional approaches in terms of performance on a publicly available dataset, demonstrating its satisfactory performance. (C) 2019 Elsevier Inc. All rights reserved.
引用
收藏
页码:386 / 396
页数:11
相关论文
共 36 条
[1]   Deep convolutional neural network for the automated detection and diagnosis of seizure using EEG signals [J].
Acharya, U. Rajendra ;
Oh, Shu Lih ;
Hagiwara, Yuki ;
Tan, Jen Hong ;
Adeli, Hojjat .
COMPUTERS IN BIOLOGY AND MEDICINE, 2018, 100 :270-278
[2]  
[Anonymous], SIMULATION NEURONALE
[3]  
[Anonymous], ARXIV170908907
[4]  
[Anonymous], IEEE T COMPUT AID DE
[5]   An unconventional Arithmetic Logic Unit design and computing in Actin Quantum Cellular Automata [J].
Das, Biplab ;
Paul, Avijit Kumar ;
De, Debashis .
MICROSYSTEM TECHNOLOGIES-MICRO-AND NANOSYSTEMS-INFORMATION STORAGE AND PROCESSING SYSTEMS, 2022, 28 (03) :809-822
[6]  
[Anonymous], 2016, P C ASS MACH TRANSL
[7]  
[Anonymous], UNSW NB15 DAT
[8]  
Bijone M., 2016, AM J INFORM SYSTEMS, V4, P69, DOI DOI 10.12691/AJIS-4-3-2
[9]   COMPUTING 2ND DERIVATIVES IN FEEDFORWARD NETWORKS - A REVIEW [J].
BUNTINE, WL ;
WEIGEND, AS .
IEEE TRANSACTIONS ON NEURAL NETWORKS, 1994, 5 (03) :480-488
[10]   A Survey of Intrusion Detection Systems in Wireless Sensor Networks [J].
Butun, Ismail ;
Morgera, Salvatore D. ;
Sankar, Ravi .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2014, 16 (01) :266-282