Recurrent deep learning-based feature fusion ensemble meta-classifier approach for intelligent network intrusion detection system

被引:98
作者
Ravi, Vinayakumar [1 ]
Chaganti, Rajasekhar [2 ]
Alazab, Mamoun [3 ]
机构
[1] Prince Mohammad Bin Fahd Univ, Ctr Artificial Intelligence, Khobar, Saudi Arabia
[2] Univ Texas San Antonio, Dept Comp Sci, San Antonio, TX 78249 USA
[3] Charles Darwin Univ, Coll Engn IT & Environm, Casuarina, NT, Australia
关键词
Cyber-physical systems; Cyberattacks; Cybercrime; Intrusion detection; Recurrent model; Deep learning; Feature fusion; Meta-classifier;
D O I
10.1016/j.compeleceng.2022.108156
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
This work proposes an end-to-end model for network attack detection and network attack classification using deep learning-based recurrent models. The proposed model extracts the features of hidden layers of recurrent models and further employs a kernel-based principal component analysis (KPCA) feature selection approach to identify optimal features. Finally, the optimal features of recurrent models are fused together and classification is done using an ensemble meta-classifier. Experimental analysis and results of the proposed method on more than one benchmark network intrusion dataset show that the proposed method performed better than the existing methods and other most commonly used machine learning and deep learning models. In particular, the proposed method showed maximum accuracy 99% in network attacks detection and 97% network attacks classification using the SDN-IoT dataset. Similar performances were obtained by the proposed model on other network intrusion datasets such as KDD-Cup-1999, UNSW-NB15, WSN-DS, and CICIDS-2017.
引用
收藏
页数:17
相关论文
共 24 条
[1]  
Ajaeiya GA, 2017, IEEE SYMP COMP COMMU, P787, DOI 10.1109/ISCC.2017.8024623
[2]   An intelligent cognitive computing based intrusion detection for industrial cyber-physical systems [J].
Althobaiti, Maha M. ;
Kumar, K. Pradeep Mohan ;
Gupta, Deepak ;
Kumar, Sachin ;
Mansour, Romany F. .
MEASUREMENT, 2021, 186
[3]   Designing a Network Intrusion Detection System Based on Machine Learning for Software Defined Networks [J].
Alzahrani, Abdulsalam O. ;
Alenazi, Mohammed J. E. .
FUTURE INTERNET, 2021, 13 (05)
[4]  
[Anonymous], 2016, P 2 ACM INT WORKSH C
[5]  
Dey S.K., 2020, P INT JOINT C COMP I, P483
[6]   Robust Multivariate Anomaly-Based Intrusion Detection System for Cyber-Physical Systems [J].
Dutta, Aneet Kumar ;
Negi, Rohit ;
Shukla, Sandeep Kumar .
CYBER SECURITY CRYPTOGRAPHY AND MACHINE LEARNING, 2021, 12716 :86-93
[7]   A novel hybrid model for intrusion detection systems in SDNs based on CNN and a new regularization technique [J].
ElSayed, Mahmoud Said ;
Le-Khac, Nhien-An ;
Albahar, Marwan Ali ;
Jurcut, Anca .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2021, 191
[8]   Who's in Control of Your Control System? Device Fingerprinting for Cyber-Physical Systems [J].
Formby, David ;
Srinivasan, Preethi ;
Leonard, Andrew ;
Rogers, Jonathan ;
Beyah, Raheem .
23RD ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2016), 2016,
[9]   An SDN-based Intrusion Detection System using SVM with Selective Logging for IP Traceback [J].
Hadem, Pynbianglut ;
Saikia, Dilip Kumar ;
Moulik, Soumen .
COMPUTER NETWORKS, 2021, 191
[10]   Using Sensitivity Analysis and Cross-Association for the Design of Intrusion Detection Systems in Industrial Cyber-Physical Systems [J].
Haller, Piroska ;
Genge, Bela .
IEEE ACCESS, 2017, 5 :9336-9347