Unsupervised network traffic anomaly detection with deep autoencoders

被引:7
作者
Dutta, Vibekananda [1 ,2 ]
Pawlicki, Marek [1 ]
Kozik, Rafal [1 ]
Choras, Michal [1 ]
机构
[1] Bydgoszcz Univ Sci & Technol, Inst Telecommun & Comp Sci, Al Prof Sylwestra Kaliskiego 7, PL-85976 Bydgoszcz, Poland
[2] Warsaw Univ Technol, Inst Micromech & Photon, Sw Andrzeja Boboli 8-507, PL-02525 Warsaw, Poland
关键词
Machine learning; deep learning; cybersecurity; intrusion detection system; autoencoder; deep neural network; INTRUSION DETECTION SYSTEM; MACHINE; ENSEMBLE; ATTACKS;
D O I
10.1093/jigpal/jzac002
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
Contemporary Artificial Intelligence methods, especially their subset-deep learning, are finding their way to successful implementations in the detection and classification of intrusions at the network level. This paper presents an intrusion detection mechanism that leverages Deep AutoEncoder and several Deep Decoders for unsupervised classification. This work incorporates multiple network topology setups for comparative studies. The efficiency of the proposed topologies is validated on two established benchmark datasets: UNSW-NB15 and NetML-2020. The results of their analysis are discussed in terms of classification accuracy, detection rate, false-positive rate, negative predictive value, Matthews correlation coefficient and F1-score. Furthermore, comparing against the state-of-the-art methods used for network intrusion detection is also disclosed.
引用
收藏
页码:912 / 925
页数:14
相关论文
共 39 条
[1]   A survey of intrusion detection systems based on ensemble and hybrid classifiers [J].
Aburomman, Abdulla Amin ;
Reaz, Mamun Bin Ibne .
COMPUTERS & SECURITY, 2017, 65 :135-152
[2]   Anomaly-based intrusion detection system through feature selection analysis and building hybrid efficient model [J].
Aljawarneh, Shadi ;
Aldwairi, Monther ;
Yassein, Muneer Bani .
JOURNAL OF COMPUTATIONAL SCIENCE, 2018, 25 :152-160
[3]   Unsupervised deep learning approach for network intrusion detection combining convolutional autoencoder and one-class SVM [J].
Binbusayyis, Adel ;
Vaiyapuri, Thavavel .
APPLIED INTELLIGENCE, 2021, 51 (10) :7094-7108
[4]   Tight Arms Race: Overview of Current Malware Threats and Trends in Their Detection [J].
Caviglione, Luca ;
Choras, Michal ;
Corona, Igino ;
Janicki, Artur ;
Mazurczyk, Wojciech ;
Pawlicki, Marek ;
Wasielewska, Katarzyna .
IEEE ACCESS, 2021, 9 :5371-5396
[5]   Intrusion detection approach based on optimised artificial neural network [J].
Choras, Michal ;
Pawlicki, Marek .
NEUROCOMPUTING, 2021, 452 :705-715
[6]   Machine learning techniques applied to detect cyber attacks on web applications [J].
Choras, Michal ;
Kozik, Rafal .
LOGIC JOURNAL OF THE IGPL, 2015, 23 (01) :45-56
[7]  
Corchado, 2020, INT C COMPL INT SOFT, P405, DOI DOI 10.1007/978-3-030-57805-3_38
[8]   Adapted K-Nearest Neighbors for Detecting Anomalies on Spatio-Temporal Traffic Flow [J].
Djenouri, Youcef ;
Belhadi, Asma ;
Lin, Jerry Chun-Wei ;
Cano, Alberto .
IEEE ACCESS, 2019, 7 :10015-10027
[9]  
Dutta Vibekananda, 2015, International Journal of Advanced Studies in Computer Science and Engineering, V4, P45
[10]  
Dutta V, 2020, J UNIVERS COMPUT SCI, V26, P1422