Intrusion Detection Mechanism for Large Scale Networks using CNN-LSTM

被引:9
作者
Karanam, Lokesh [1 ]
Pattanaik, Kiran Kumar [1 ]
Aldmour, Rakan [2 ]
机构
[1] ABV Indian Inst Informat Technol & Management, Gwalior, India
[2] Staffordshire Univ, Sch Comp & Digital Tech, Stoke On Trent, Staffs, England
来源
2020 13TH INTERNATIONAL CONFERENCE ON DEVELOPMENTS IN ESYSTEMS ENGINEERING (DESE 2020) | 2020年
关键词
CNN-LSTM; Intrusion Detection; Detection Rate;
D O I
10.1109/DeSE51703.2020.9450732
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In today's world, Network and System Security are of paramount importance in the digital communication environment. To avoid breaches, it is badly needed for a security administrator to detect the intruder and prevent him from entering into the network. Machine Learning techniques are used to solve these types of problems, but they are not highly able to generalize as they fail to obtain relation among the features. Several works have also been done in Deep Learning using Artificial Neural Networks, Deep Neural Networks, RNN, etc. are not computationally efficient. This paper suggests a new machine learning model for intrusion detection that uses LSTMs and CNNs. This work uses CNN to choose feature characteristics from the input data, and send these features to LSTM for sequence analysis, and to address the imbalanced data set problem, Based on the total number of training examples in each class, each example will have its weight calculated based on cost function method. The raw input data format is transformed into a matrix format(image) to further decrease the computation cost. To test the efficiency of the CNN-LSTM model this work uses a conventional NSL-KDD dataset. The computation time has been reduced to 1 10 th the time that a fully connected layer took to train. The experimental results show that the model achieves an accuracy of 99.6% and a Detection rate of 96.75% while training.
引用
收藏
页码:323 / 328
页数:6
相关论文
共 13 条
  • [1] Abu Taher K, 2019, 2019 1ST INTERNATIONAL CONFERENCE ON ROBOTICS, ELECTRICAL AND SIGNAL PROCESSING TECHNIQUES (ICREST), P643, DOI [10.1109/ICREST.2019.8644161, 10.1109/icrest.2019.8644161]
  • [2] Anomaly-based intrusion detection system through feature selection analysis and building hybrid efficient model
    Aljawarneh, Shadi
    Aldwairi, Monther
    Yassein, Muneer Bani
    [J]. JOURNAL OF COMPUTATIONAL SCIENCE, 2018, 25 : 152 - 160
  • [3] Alom MZ, 2015, PROC NAECON IEEE NAT, P339, DOI 10.1109/NAECON.2015.7443094
  • [4] [Anonymous], 2015, Nature, DOI [DOI 10.1038/NATURE14539, 10.1038/nature14539]
  • [5] Chowdhury MMU, 2017, 2017 IEEE 8TH ANNUAL UBIQUITOUS COMPUTING, ELECTRONICS AND MOBILE COMMUNICATION CONFERENCE (UEMCON), P456, DOI 10.1109/UEMCON.2017.8249084
  • [6] Farahnakian F, 2018, INT CONF ADV COMMUN, P178, DOI 10.23919/ICACT.2018.8323688
  • [7] Ferens K., 2016, 2016 3 INT C ELECT E, P1, DOI DOI 10.1109/CEEICT.2016.7873126
  • [8] Network anomaly detection with the restricted Boltzmann machine
    Fiore, Ugo
    Palmieri, Francesco
    Castiglione, Aniello
    De Santis, Alfredo
    [J]. NEUROCOMPUTING, 2013, 122 : 13 - 23
  • [9] Robust detection for network intrusion of industrial IoT based on multi-CNN fusion
    Li, Yanmiao
    Xu, Yingying
    Liu, Zhi
    Hou, Haixia
    Zheng, Yushuo
    Xin, Yang
    Zhao, Yuefeng
    Cui, Lizhen
    [J]. MEASUREMENT, 2020, 154
  • [10] Liu Y, 2016, DESTECH TRANS ENG