Recurrent deep learning-based feature fusion ensemble meta-classifier approach for intelligent network intrusion detection system

被引:98
作者
Ravi, Vinayakumar [1 ]
Chaganti, Rajasekhar [2 ]
Alazab, Mamoun [3 ]
机构
[1] Prince Mohammad Bin Fahd Univ, Ctr Artificial Intelligence, Khobar, Saudi Arabia
[2] Univ Texas San Antonio, Dept Comp Sci, San Antonio, TX 78249 USA
[3] Charles Darwin Univ, Coll Engn IT & Environm, Casuarina, NT, Australia
关键词
Cyber-physical systems; Cyberattacks; Cybercrime; Intrusion detection; Recurrent model; Deep learning; Feature fusion; Meta-classifier;
D O I
10.1016/j.compeleceng.2022.108156
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
This work proposes an end-to-end model for network attack detection and network attack classification using deep learning-based recurrent models. The proposed model extracts the features of hidden layers of recurrent models and further employs a kernel-based principal component analysis (KPCA) feature selection approach to identify optimal features. Finally, the optimal features of recurrent models are fused together and classification is done using an ensemble meta-classifier. Experimental analysis and results of the proposed method on more than one benchmark network intrusion dataset show that the proposed method performed better than the existing methods and other most commonly used machine learning and deep learning models. In particular, the proposed method showed maximum accuracy 99% in network attacks detection and 97% network attacks classification using the SDN-IoT dataset. Similar performances were obtained by the proposed model on other network intrusion datasets such as KDD-Cup-1999, UNSW-NB15, WSN-DS, and CICIDS-2017.
引用
收藏
页数:17
相关论文
共 24 条
[11]   Intrusion Detection in Cyber-Physical Systems: Techniques and Challenges [J].
Han, Song ;
Xie, Miao ;
Chen, Hsiao-Hwa ;
Ling, Yun .
IEEE SYSTEMS JOURNAL, 2014, 8 (04) :1049-1059
[12]   Neural Network-Based Approach for Detection and Mitigation of DDoS Attacks in SDN Environments [J].
Hannache, Oussama ;
Batouche, Mohamed Chaouki .
INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2020, 14 (03) :50-71
[13]  
Krundyshev V., 2018, 2018 INT RUSS AUT C, P1
[14]   Towards an efficient anomaly-based intrusion detection for software-defined networks [J].
Latah, Majd ;
Toker, Levent .
IET NETWORKS, 2018, 7 (06) :453-459
[15]   Behavior Rule Specification-Based Intrusion Detection for Safety Critical Medical Cyber Physical Systems [J].
Mitchell, Robert ;
Chen, Ing-Ray .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2015, 12 (01) :16-30
[16]  
Mitchell R, 2011, 2011 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC), P2095, DOI 10.1109/WCNC.2011.5779477
[17]   CNN based method for the development of cyber-attacks detection algorithms in industrial control systems [J].
Nedeljkovic, Dusan ;
Jakovljevic, Zivana .
COMPUTERS & SECURITY, 2022, 114
[18]   Distributed-Graph-Based Statistical Approach for Intrusion Detection in Cyber-Physical Systems [J].
Sadreazami, Hamidreza ;
Mohammadi, Arash ;
Asif, Amir ;
Plataniotis, Konstantinos N. .
IEEE TRANSACTIONS ON SIGNAL AND INFORMATION PROCESSING OVER NETWORKS, 2018, 4 (01) :137-147
[19]   A Novel SDN Dataset for Intrusion Detection in IoT Networks [J].
Sarica, Alper Kaan ;
Angin, Pelin .
2020 16TH INTERNATIONAL CONFERENCE ON NETWORK AND SERVICE MANAGEMENT (CNSM), 2020,
[20]   A cyber-physical model for SCADA system and its intrusion detection [J].
Sheng, Chuan ;
Yao, Yu ;
Fu, Qiang ;
Yang, Wei .
COMPUTER NETWORKS, 2021, 185