A bidirectional LSTM deep learning approach for intrusion detection

被引:214
作者
Imrana, Yakubu [1 ]
Xiang, Yanping [1 ]
Ali, Liaqat [2 ,3 ]
Abdul-Rauf, Zaharawu [4 ]
机构
[1] Univ Elect Sci & Technol China UESTC, Sch Comp Sci & Engn, Chengdu 611731, Peoples R China
[2] Univ Elect Sci & Technol China UESTC, Sch Informat & Commun Engn, Chengdu 611731, Peoples R China
[3] Univ Sci & Technol, Dept Elect Engn, Bannu, Pakistan
[4] Univ Dev Studies UDS, Dept Educ, Tamale, Ghana
关键词
Machine learning; Deep learning; Recurrent neural networks; Bidirectional LSTM; Intrusion detection; ANOMALY DETECTION; NEURAL-NETWORKS;
D O I
10.1016/j.eswa.2021.115524
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The rise in computer networks and internet attacks has become alarming for most service providers. It has triggered the need for the development and implementation of intrusion detection systems (IDSs) to help prevent and or mitigate the challenges posed by network intruders. Over the years, intrusion detection systems have played and continue to play a very significant role in spotting network attacks and anomalies. Numerous researchers around the globe have proposed many IDSs to combat the threat of network invaders. However, most of the previously proposed IDSs have high rates of raising false alarms. Additionally, most existing models suffer the difficulty of detecting the different attack types, especially User-to-Root (U2R) and Remote-to-Local (R2L) attacks. These two types of attacks often appear to have lower detection accuracy for the existing models. Hence, in this paper, we propose a bidirectional Long-Short-Term-Memory (BiDLSTM) based intrusion detection system to handle the challenges mentioned above. To train and measure our model's performance, we use the NSL-KDD dataset, a benchmark dataset for most IDSs. Experimental results show and validate the effectiveness of the BiDLSTM approach. It outperforms conventional LSTM and other state-of-the-art models in terms of accuracy, precision, recall, and F-score values. It also has a much more reduced false alarm rate than the existing models. Furthermore, the BiDLSTM model achieves a higher detection accuracy for U2R and R2L attacks than the conventional LSTM.
引用
收藏
页数:12
相关论文
共 48 条
[31]   Modeling network traffic for traffic matrix estimation and anomaly detection based on Bayesian network in cloud computing networks [J].
Nie, Laisen ;
Jiang, Dingde ;
Lv, Zhihan .
ANNALS OF TELECOMMUNICATIONS, 2017, 72 (5-6) :297-305
[32]  
Niyaz Q., 2015, EAI INT C BIOINSP IN, DOI [DOI 10.4108/EAI.3-12-2015.2262516, 10.4108/eai.3-12-2015.2262516]
[33]   Big Data Analytics for User-Activity Analysis and User-Anomaly Detection in Mobile Wireless Network [J].
Parwez, Md Salik ;
Rawat, Danda B. ;
Garuba, Moses .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2017, 13 (04) :2058-2065
[34]   GRADIENT CALCULATIONS FOR DYNAMIC RECURRENT NEURAL NETWORKS - A SURVEY [J].
PEARLMUTTER, BA .
IEEE TRANSACTIONS ON NEURAL NETWORKS, 1995, 6 (05) :1212-1228
[35]  
Pineda F., 1987, Neural information processing systems, P602
[36]  
Reddy RR, 2016, 2016 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), P1148, DOI 10.1109/ICACCI.2016.7732199
[37]  
Staudemeyer R.C., 2013, P S AFRICAN I COMPUT, DOI DOI 10.1145/2513456.2513490
[38]  
Staudemeyer RC., 2015, S AFR COMPUT J, V56, P136, DOI DOI 10.18489/SACJ.V56I1.248
[39]  
Tang TA, 2018, 2018 4TH IEEE CONFERENCE ON NETWORK SOFTWARIZATION AND WORKSHOPS (NETSOFT), P202, DOI 10.1109/NETSOFT.2018.8460090
[40]  
Tang TA, 2016, 2016 INTERNATIONAL CONFERENCE ON WIRELESS NETWORKS AND MOBILE COMMUNICATIONS (WINCOM), pP258, DOI 10.1109/WINCOM.2016.7777224