SPIDER: A shallow PCA based network intrusion detection system with enhanced recurrent neural networks

被引:29
作者
Udas, Pritom Biswas [1 ]
Karim, Md. Ebtidaul [1 ]
Roy, Kowshik Sankar [1 ]
机构
[1] Khulna Univ Engn & Technol, Dept Elect & Commun Engn, Khulna, Bangladesh
关键词
Network Security; Intrusion detection system; Principal component analysis; Recurrent Neural Network; Deep learning; SELECTION; ENSEMBLE;
D O I
10.1016/j.jksuci.2022.10.019
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In recent years, ensuring the stability of the huge volume of data generated by billions of users has become the main concern in the field of cyber security. Network security is an extensive part of the cyber security system where intrusions are the leading threat in its way of defense. As a countermeasure to such intrusions in the network, Intrusion Detection Systems (IDSs) have played a major role over the years. Although countless works have already been carried out in this field, most of these works have lagged at some points, considering the scope of exploration through recent extensions. So in this paper, a network anomaly detection model, SPIDER, has been proposed. The SPIDER model combines four updated versions of conventional Recurrent Neural Networks (RNNs), namely Bi-LSTM (Bidirectional Long Short Term Memory), LSTM (Long Short Term Memory), Bi-GRU (Bidirectional Gated Recurrent Unit), and GRU (Gated Recurrent Unit). To deal with the dimensionality problems, Principal Component Analysis (PCA) has been adapted to reduce the data dimensions. The performance of the proposed SPIDER model has been evaluated using the well-known NSL-KDD and UNSW-NB15 datasets to ensure its robustness. When compared to the corresponding values of different models, the proposed model shows a significant improvement in detecting intrusions over existing models.
引用
收藏
页码:10246 / 10272
页数:27
相关论文
共 42 条
  • [1] Differential Evolution Wrapper Feature Selection for Intrusion Detection System
    Almasoudy, Faezah Hamad
    Al-Yaseen, Wathiq Laftah
    Idrees, Ali Kadhum
    [J]. INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND DATA SCIENCE, 2020, 167 : 1230 - 1239
  • [2] Belouch M., 2017, INT J ADV COMPUTER S, V8
  • [3] Chawla Ashima, 2019, ECML PKDD 2018 Workshops. Nemesis 2018, UrbReas 2018, SoGood 2018 IWAISe 2018, and Green Data Mining 2018. Proceedings: Lecture Notes in Artificial Intelligence (LNAI 11329), P149, DOI 10.1007/978-3-030-13453-2_12
  • [4] Extreme Learning Machines for Intrusion Detection
    Cheng, Chi
    Tay, Wee Peng
    Huang, Guang-Bin
    [J]. 2012 INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS (IJCNN), 2012,
  • [5] Chung J., 2015, arXiv
  • [6] Dagar V., 2016, P 2016 INT C ADV COM
  • [7] Intrusion Detection System for NSL-KDD Dataset Using Convolutional Neural Networks
    Ding, Yalei
    Zhai, Yuqing
    [J]. PROCEEDINGS OF 2018 THE 2ND INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND ARTIFICIAL INTELLIGENCE (CSAI 2018) / 2018 THE 10TH INTERNATIONAL CONFERENCE ON INFORMATION AND MULTIMEDIA TECHNOLOGY (ICIMT 2018), 2018, : 81 - 85
  • [8] Dong YS, 2019, INT CONF SOFTW ENG, P1, DOI [10.1109/icsess47205.2019.9040718, 10.1109/wcsp.2019.8927923, 10.1109/ICSESS47205.2019.9040718]
  • [9] Evolving deep learning architectures for network intrusion detection using a double PSO metaheuristic
    Elmasry, Wisam
    Akbulut, Akhan
    Zaim, Abdul Halim
    [J]. COMPUTER NETWORKS, 2020, 168
  • [10] Convolutional Gated Recurrent Unit-Recurrent Neural Network for State-of-Charge Estimation of Lithium-Ion Batteries
    Huang, Zhelin
    Yang, Fangfang
    Xu, Fan
    Song, Xiangbao
    Tsui, Kwok-Leung
    [J]. IEEE ACCESS, 2019, 7 : 93139 - 93149