Model of the intrusion detection system based on the integration of spatial-temporal features

被引:87
作者
Zhang, Jianwu [1 ]
Ling, Yu [1 ]
Fu, Xingbing [2 ,3 ]
Yang, Xiongkun [4 ]
Xiong, Gang [4 ]
Zhang, Rui [5 ]
机构
[1] Hangzhou Dianzi Univ, Sch Commun Engn, Hangzhou 310018, Peoples R China
[2] Hangzhou Dianzi Univ, Sch Cyberspace, Hangzhou 310018, Peoples R China
[3] Sci & Technol Commun Networks Lab, Shijiazhuang, Hebei, Peoples R China
[4] Natl Key Lab Sci & Technol Blind Signal Proc, Chengdu 610041, Peoples R China
[5] Chinese Acad Sci, Inst Informat Engn, Beijing, Peoples R China
基金
美国国家科学基金会;
关键词
Intrusion detection system; Long short-term memory; Multiscale convolutional neural network; Spatial-temporal features; UNSW-NB15; NEURAL-NETWORKS;
D O I
10.1016/j.cose.2019.101681
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The intrusion detection system can distinguish normal traffic from attack traffic by analyzing the characteristics of network traffic. Recently, neural networks have advanced in the fields of natural language processing, computer vision, intrusion detection and so on. In this paper, we propose a unified model combining Multiscale Convolutional Neural Network with Long Short-Term Memory (MSCNN-LSTM). The model first employs Multiscale Convolutional Neural Network(MSCNN) to analyze the spatial features of the dataset, and then employs Long Short-Term Memory (LSTM) Network to process the temporal features. Finally, the model employs the spatial-temporal features to perform the classification. In the experiment, the public intrusion detection dataset, UNSW-NBI5 was employed as experimental training set and test set. Compared with the model based on the conventional neural networks, the MSCNN-LSTM model has better accuracy, false alarm rate and false negative rate. (C) 2019 Published by Elsevier Ltd.
引用
收藏
页数:9
相关论文
共 23 条
[1]  
[Anonymous], [No title captured]
[2]  
[Anonymous], P 17 ACM SIGKDD INT
[3]  
Antonakakis M., 2012, 21 USENIX SEC S USEN, P491
[4]   A CNN-based approach for a class of non-standard hyperbolic partial differential equations modeling distributed parameters (nonlinear) control systems [J].
Danciu, Daniela .
NEUROCOMPUTING, 2015, 164 :56-70
[5]   A Primer on Neural Network Models for Natural Language Processing [J].
Goldberg, Yoav .
JOURNAL OF ARTIFICIAL INTELLIGENCE RESEARCH, 2016, 57 :345-420
[6]   A GA-LR wrapper approach for feature selection in network intrusion detection [J].
Khammassi, Chaouki ;
Krichen, Saoussen .
COMPUTERS & SECURITY, 2017, 70 :255-277
[7]   A novel hybrid KPCA and SVM with GA model for intrusion detection [J].
Kuang, Fangjun ;
Xu, Weihong ;
Zhang, Siyang .
APPLIED SOFT COMPUTING, 2014, 18 :178-184
[8]   Gradient-based learning applied to document recognition [J].
Lecun, Y ;
Bottou, L ;
Bengio, Y ;
Haffner, P .
PROCEEDINGS OF THE IEEE, 1998, 86 (11) :2278-2324
[9]  
Li J, 2016, IEEE IJCNN, P1570, DOI 10.1109/IJCNN.2016.7727385
[10]  
Marie-Sainte SL, 2019, IEEE ACCESS, V7, P7011, DOI 10.1109/ACCESS.2018.2890076