IDS-attention: an efficient algorithm for intrusion detection systems using attention mechanism

被引:25
作者
Laghrissi, FatimaEzzahra [1 ]
Douzi, Samira [2 ]
Douzi, Khadija [1 ]
Hssina, Badr [1 ]
机构
[1] FSTM Univ Hassan II, Casablanca, Morocco
[2] FMPR Univ Mohammed V, Rabat, Morocco
关键词
Intrusion detection systems; Deep learning; Attention mechanism; LSTM; UMAP; Chi-Square; PCA; Mutual information; SELECTION;
D O I
10.1186/s40537-021-00544-5
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Network attacks are illegal activities on digital resources within an organizational network with the express intention of compromising systems. A cyber attack can be directed by individuals, communities, states or even from an anonymous source. Hackers commonly conduct network attacks to alter, damage, or steal private data. Intrusion detection systems (IDS) are the best and most effective techniques when it comes to tackle these threats. An IDS is a software application or hardware device that monitors traffic to search for malevolent activity or policy breaches. Moreover, IDSs are designed to be deployed in different environments, and they can either be host-based or network-based. A host-based intrusion detection system is installed on the client computer, while a network-based intrusion detection system is located on the network. IDSs based on deep learning have been used in the past few years and proved their effectiveness. However, these approaches produce a big false negative rate, which impacts the performance and potency of network security. In this paper, a detection model based on long short-term memory (LSTM) and Attention mechanism is proposed. Furthermore, we used four reduction algorithms, namely: Chi-Square, UMAP, Principal Components Analysis (PCA), and Mutual information. In addition, we evaluated the proposed approaches on the NSL-KDD dataset. The experimental results demonstrate that using Attention with all features and using PCA with 03 components had the best performance, reaching an accuracy of 99.09% and 98.49% for binary and multiclass classification, respectively.
引用
收藏
页数:21
相关论文
共 32 条
[1]   An intelligent cognitive computing based intrusion detection for industrial cyber-physical systems [J].
Althobaiti, Maha M. ;
Kumar, K. Pradeep Mohan ;
Gupta, Deepak ;
Kumar, Sachin ;
Mansour, Romany F. .
MEASUREMENT, 2021, 186
[2]  
Bahdanau D., 2015, 3 INT C LEARN REPR
[3]   A Novel Intrusion Detection System for Internet of Things Network Security [J].
Bediya, Arun Kumar ;
Kumar, Rajendra .
JOURNAL OF INFORMATION TECHNOLOGY RESEARCH, 2021, 14 (03) :20-37
[4]   Image-Based Scam Detection Method Using an Attention Capsule Network [J].
Bian, Lingyu ;
Zhang, Linlin ;
Zhao, Kai ;
Wang, Hao ;
Gong, Shengjia .
IEEE ACCESS, 2021, 9 :33654-33665
[5]   Fast multi-language LSTM-based online handwriting recognition [J].
Carbune, Victor ;
Gonnet, Pedro ;
Deselaers, Thomas ;
Rowley, Henry A. ;
Daryin, Alexander ;
Calvo, Marcos ;
Wang, Li-Lun ;
Keysers, Daniel ;
Feuz, Sandro ;
Gervais, Philippe .
INTERNATIONAL JOURNAL ON DOCUMENT ANALYSIS AND RECOGNITION, 2020, 23 (02) :89-102
[6]   Analysis of KDD-Cup'99, NSL-KDD and UNSW-NB15 Datasets using Deep Learning in IoT [J].
Choudhary, Sarika ;
Kesswani, Nishtha .
INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND DATA SCIENCE, 2020, 167 :1561-1573
[7]  
Cover TM, 2006, Elements of information theory, P18
[8]  
Deepa M., 2020, IOP Conference Series: Materials Science and Engineering, V993, DOI 10.1088/1757-899X/993/1/012049
[9]   AN INTRUSION-DETECTION MODEL [J].
DENNING, DE .
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 1987, 13 (02) :222-232
[10]   Intrusion Detection System for Internet of Things Based on Temporal Convolution Neural Network and Efficient Feature Engineering [J].
Derhab, Abdelouahid ;
Aldweesh, Arwa ;
Emam, Ahmed Z. ;
Khan, Farrukh Aslam .
WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2020, 2020