Model fusion of deep neural networks for anomaly detection

被引:7
作者
AlDahoul, Nouar [1 ]
Karim, Hezerul Abdul [1 ]
Wazir, Abdulaziz Saleh Ba [1 ]
机构
[1] Multimedia Univ, Fac Engn, Cyberjaya, Malaysia
关键词
Anomaly detection; Deep neural network; Highly imbalanced data; Model fusion; Class weight optimization; INTRUSION; MACHINE;
D O I
10.1186/s40537-021-00496-w
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Network Anomaly Detection is still an open challenging task that aims to detect anomalous network traffic for security purposes. Usually, the network traffic data are large-scale and imbalanced. Additionally, they have noisy labels. This paper addresses the previous challenges and utilizes million-scale and highly imbalanced ZYELL's dataset. We propose to train deep neural networks with class weight optimization to learn complex patterns from rare anomalies observed from the traffic data. This paper proposes a novel model fusion that combines two deep neural networks including binary normal/attack classifier and multi-attacks classifier. The proposed solution can detect various network attacks such as Distributed Denial of Service (DDOS), IP probing, PORT probing, and Network Mapper (NMAP) probing. The experiments conducted on a ZYELL's real-world dataset show promising performance. It was found that the proposed approach outperformed the baseline model in terms of average macro F beta score and false alarm rate by 17% and 5.3%, respectively.
引用
收藏
页数:18
相关论文
共 31 条
[1]   A survey of network anomaly detection techniques [J].
Ahmed, Mohiuddin ;
Mahmood, Abdun Naser ;
Hu, Jiankun .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2016, 60 :19-31
[2]  
Amer M., 2013, P ACM SIGKDD WORKSH, P8, DOI DOI 10.1145/2500853.2500857
[3]  
[Anonymous], 2000, Pattern Classification, DOI DOI 10.1007/978-3-319-57027-3_4
[4]   Network Anomaly Detection: Methods, Systems and Tools [J].
Bhuyan, Monowar H. ;
Bhattacharyya, D. K. ;
Kalita, J. K. .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2014, 16 (01) :303-336
[5]   Combining sketches and wavelet analysis for multi time-scale network anomaly detection [J].
Callegari, C. ;
Giordano, S. ;
Pagano, M. ;
Pepe, T. .
COMPUTERS & SECURITY, 2011, 30 (08) :692-704
[6]   An autonomous labeling approach to support vector machines algorithms for network traffic anomaly detection [J].
Catania, Carlos A. ;
Bromberg, Facundo ;
Garcia Garino, Carlos .
EXPERT SYSTEMS WITH APPLICATIONS, 2012, 39 (02) :1822-1829
[7]  
Chen L, ZYELL NCTU NETTRAFFC
[8]  
Fernndez A., 2018, LEARNING IMBALANCED, V10, DOI DOI 10.1007/978-3-319-98074-4
[9]  
Ganganwar V, 2012, Int J Emerg Technol Adv Eng, V2, P42
[10]   Distributed Intrusion Detection System for Cloud Environments based on Data Mining techniques [J].
Idhammad, Mohamed ;
Afdel, Karim ;
Belouch, Mustapha .
PROCEEDINGS OF THE FIRST INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING IN DATA SCIENCES (ICDS2017), 2018, 127 :35-41