Machine Learning Techniques for Classifying Network Anomalies and Intrusions

被引:47
作者
Li, Zhida [1 ]
Rios, Ana Laura Gonzalez [1 ]
Xu, Guangyu [1 ]
Trajkovic, Ljiljana [1 ]
机构
[1] Simon Fraser Univ, Vancouver, BC, Canada
来源
2019 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS) | 2019年
基金
加拿大自然科学与工程研究理事会;
关键词
Machine learning; recurrent neural networks; deep neural networks; broad learning system; intrusion detection; NEURAL-NETWORK; SELECTION;
D O I
10.1109/iscas.2019.8702583
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Using machine learning techniques to detect network intrusions is an important topic in cybersecurity. A variety of machine learning models have been designed to help detect malicious intentions of network users. We employ two deep learning recurrent neural networks with a variable number of hidden layers: Long Short-Term Memory (LSTM) and Gated Recurrent Unit (GRU). We also evaluate the recently proposed Broad Learning System (BLS) and its extensions. The models are trained and tested using Border Gateway Protocol (BGP) datasets that contain routing records collected from Reseaux IP Europeens (RIPE) and BCNET as well as the NLS-KDD dataset containing network connection records. The algorithms are compared based on accuracy and F-Score.
引用
收藏
页数:5
相关论文
共 37 条
[1]  
Ahmed Tarem., 2007, SYSML'07: Proceedings of the 2nd USENIX workshop on Tackling computer systems problems with machine learning techniques, P1
[2]  
Al-Rousan N., 2012, 2012 International Conference on Machine Learning and Cybernetics (ICMLC 2012). Proceedings, P140, DOI 10.1109/ICMLC.2012.6358901
[3]  
Al-Rousan N. M., 2012, 2012 IEEE 13th International Conference on High Performance Switching and Routing (HPSR), P103, DOI 10.1109/HPSR.2012.6260835
[4]  
[Anonymous], 2012, ARXIV
[5]  
[Anonymous], 2005, P 3 ANN C PRIVACY SE
[6]  
[Anonymous], 2006, Pattern Recognition and Machine Learning
[7]   Network Anomaly Detection: Methods, Systems and Tools [J].
Bhuyan, Monowar H. ;
Bhattacharyya, D. K. ;
Kalita, J. K. .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2014, 16 (01) :303-336
[8]   A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection [J].
Buczak, Anna L. ;
Guven, Erhan .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2016, 18 (02) :1153-1176
[9]   Anomaly Detection: A Survey [J].
Chandola, Varun ;
Banerjee, Arindam ;
Kumar, Vipin .
ACM COMPUTING SURVEYS, 2009, 41 (03)
[10]  
Chen C. L. P., 2018, IEEE T NEUR NET LEAR, P1