Genetic convolutional neural network for intrusion detection systems

被引:94
作者
Nguyen, Minh Tuan [1 ]
Kim, Kiseon [2 ]
机构
[1] Duy Tan Univ, Inst Res & Dev, Da Nang 550000, Vietnam
[2] Gwangju Inst Sci & Technol, Sch Elect Engn & Comp Sci, Gwangju, South Korea
来源
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE | 2020年 / 113卷
关键词
Intrusion detection system; Genetic algorithm; Machine learning; Deep learning; Fuzzy C-mean clustering; DEEP LEARNING APPROACH; INTERNET; SCHEME; MODEL;
D O I
10.1016/j.future.2020.07.042
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Intrusion detection is the identification of unauthorized access of a computer network. This paper proposes a novel algorithm for a network intrusion detection system (NIDS) using an improved feature subset selected directly by a genetic algorithm (GA)-based exhaustive search and fuzzy C-means clustering (FCM). The algorithm identifies the bagging (BG) classifier and the convolutional neural network (CNN) model as an effective extractor by implementing the GA in combination with 5-fold cross validation (CV) to select the CNN model structure. The deep feature subset extracted by the selected CNN model is put into the BG classifier to validate the performance with the 5-fold CV. The high quality feature set obtained by the three-layered feature construction using the GA, FCM, CNN extractor, and a hybrid CNN and BG learning method significantly improves the final detection performance. Moreover, the highly reliable validation performance results achieved by the 5-fold CV procedure for the proposed algorithm imply a well-fitted application in a practical computer network environment NIDS. (c) 2020 Published by Elsevier B.V.
引用
收藏
页码:418 / 427
页数:10
相关论文
共 49 条
[1]   A novel SVM-kNN-PSO ensemble method for intrusion detection system [J].
Aburomman, Abdulla Amin ;
Reaz, Mamun Bin Ibne .
APPLIED SOFT COMPUTING, 2016, 38 :360-372
[2]   Robust adaptive multivariate Hotelling's T2 control chart based on kernel density estimation for intrusion detection system [J].
Ahsan, Muhammad ;
Mashuri, Muhammad ;
Lee, Muhammad Hisyam ;
Kuswanto, Heri ;
Prastyo, Dedy Dwi .
EXPERT SYSTEMS WITH APPLICATIONS, 2020, 145
[3]   Deep Learning Approach Combining Sparse Autoencoder With SVM for Network Intrusion Detection [J].
Al-Qatf, Majjed ;
Yu Lasheng ;
Al-Habib, Mohammed ;
Al-Sabahi, Kamal .
IEEE ACCESS, 2018, 6 :52843-52856
[4]  
[Anonymous], 2018, PRACTICAL GENETIC AL, DOI [DOI 10.1002/JMRS.288, DOI 10.1002/0471671746]
[5]  
[Anonymous], 2006, Feature Extraction Foundations and Applications
[6]   From intrusion detection to an intrusion response system: Fundamentals, requirements, and future directions [J].
Anwar S. ;
Zain J.M. ;
Zolkipli M.F. ;
Inayat Z. ;
Khan S. ;
Anthony B. ;
Chang V. .
Algorithms, 2017, 10 (02)
[7]   Identifying and Benchmarking Key Features for Cyber Intrusion Detection: An Ensemble Approach [J].
Binbusayyis, Adel ;
Vaiyapuri, Thavavel .
IEEE ACCESS, 2019, 7 :106495-106513
[8]   A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection [J].
Buczak, Anna L. ;
Guven, Erhan .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2016, 18 (02) :1153-1176
[9]   A New Architecture for Network Intrusion Detection and Prevention [J].
Bul'Ajoul, Waleed ;
James, Anne ;
Shaikh, Siraj .
IEEE ACCESS, 2019, 7 :18558-18573
[10]   Group-Wise Principal Component Analysis for Exploratory Intrusion Detection [J].
Camacho, Jose ;
Theron, Roberto ;
Garcia-Gimenez, Jose M. ;
Macia-Fernandez, Gabriel ;
Garcia-Teodoro, Pedro .
IEEE ACCESS, 2019, 7 :113081-113093