A Survey of CNN-Based Network Intrusion Detection

被引:78
作者
Mohammadpour, Leila [1 ]
Ling, Teck Chaw [1 ]
Liew, Chee Sun [1 ]
Aryanfar, Alihossein [1 ]
机构
[1] Univ Malaya, Fac Comp Sci & Informat Technol, Dept Comp Syst & Technol, Kuala Lumpur 50603, Malaysia
来源
APPLIED SCIENCES-BASEL | 2022年 / 12卷 / 16期
关键词
convolutional neural network; CNN; network security; intrusion detection; deep learning; CONVOLUTIONAL NEURAL-NETWORK; DETECTION SYSTEM; MODEL; LAYER;
D O I
10.3390/app12168162
中图分类号
O6 [化学];
学科分类号
0703 ;
摘要
Over the past few years, Internet applications have become more advanced and widely used. This has increased the need for Internet networks to be secured. Intrusion detection systems (IDSs), which employ artificial intelligence (AI) methods, are vital to ensuring network security. As a branch of AI, deep learning (DL) algorithms are now effectively applied in IDSs. Among deep learning neural networks, the convolutional neural network (CNN) is a well-known structure designed to process complex data. The CNN overcomes the typical limitations of conventional machine learning approaches and is mainly used in IDSs. Several CNN-based approaches are employed in IDSs to handle privacy issues and security threats. However, there are no comprehensive surveys of IDS schemes that have utilized CNN to the best of our knowledge. Hence, in this study, our primary focus is on CNN-based IDSs so as to increase our understanding of various uses of the CNN in detecting network intrusions, anomalies, and other types of attacks. This paper innovatively organizes the studied CNN-IDS approaches into multiple categories and describes their primary capabilities and contributions. The main features of these approaches, such as the dataset, architecture, input shape, evaluated metrics, performance, feature extraction, and classifier method, are compared. Because different datasets are used in CNN-IDS research, their experimental results are not comparable. Hence, this study also conducted an empirical experiment to compare different approaches based on standard datasets, and the comparative results are presented in detail.
引用
收藏
页数:34
相关论文
共 112 条
[1]   Deep Learning-Based Framework for the Detection of Cyberattack Using Feature Engineering [J].
Akhtar, Muhammad Shoaib ;
Feng, Tao .
SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
[2]   A Convolutional Neural Network for Improved Anomaly-Based Network Intrusion Detection [J].
Al-Turaiki, Isra ;
Altwaijry, Najwa .
BIG DATA, 2021, 9 (03) :233-252
[3]  
Albawi S, 2017, I C ENG TECHNOL
[4]   Deep learning approaches for anomaly-based intrusion detection systems: A survey, taxonomy, and open issues [J].
Aldweesh, Arwa ;
Derhab, Abdelouahid ;
Emam, Ahmed Z. .
KNOWLEDGE-BASED SYSTEMS, 2020, 189
[5]   IoT-based intrusion detection system using convolution neural networks [J].
Aljumah, Abdullah .
PEERJ COMPUTER SCIENCE, 2021, 7 :1-19
[6]  
Andalib A, 2020, IRAN CONF ELECTR ENG, P828
[7]  
[Anonymous], 2015, arXiv
[8]  
[Anonymous], 1999, KDD Cup
[9]  
[Anonymous], 2015, 3 INT C LEARN REPR I
[10]   Two Applications of Deep Learning in the Physical Layer of Communication Systems [J].
Bjornson, Emil ;
Giselsson, Pontus .
IEEE SIGNAL PROCESSING MAGAZINE, 2020, 37 (05) :134-140