A Scalable and Hybrid Intrusion Detection System Based on the Convolutional-LSTM Network

被引:94
作者
Khan, Muhammad Ashfaq [1 ]
Karim, Md. Rezaul [2 ,3 ]
Kim, Yangwoo [1 ]
机构
[1] Dongguk Univ, Dept Informat & Commun Engn, 30 Pildong Ro 1 Gil, Seoul 100715, South Korea
[2] Fraunhofer Inst Appl Informat Technol FIT, D-53754 St Augustin, Germany
[3] Rhein Westfal TH Aachen, Chair Comp Sci 5, D-52074 Aachen, Germany
来源
SYMMETRY-BASEL | 2019年 / 11卷 / 04期
关键词
intrusion detection system; deep learning; Spark ML; CNN; LSTM; Conv-LSTM; ANOMALY DETECTION; MODEL;
D O I
10.3390/sym11040583
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
With the rapid advancements of ubiquitous information and communication technologies, a large number of trustworthy online systems and services have been deployed. However, cybersecurity threats are still mounting. An intrusion detection (ID) system can play a significant role in detecting such security threats. Thus, developing an intelligent and accurate ID system is a non-trivial research problem. Existing ID systems that are typically used in traditional network intrusion detection system often fail and cannot detect many known and new security threats, largely because those approaches are based on classical machine learning methods that provide less focus on accurate feature selection and classification. Consequently, many known signatures from the attack traffic remain unidentifiable and become latent. Furthermore, since a massive network infrastructure can produce large-scale data, these approaches often fail to handle them flexibly, hence are not scalable. To address these issues and improve the accuracy and scalability, we propose a scalable and hybrid IDS, which is based on Spark ML and the convolutional-LSTM (Conv-LSTM) network. This IDS is a two-stage ID system: the first stage employs the anomaly detection module, which is based on Spark ML. The second stage acts as a misuse detection module, which is based on the Conv-LSTM network, such that both global and local latent threat signatures can be addressed. Evaluations of several baseline models in the ISCX-UNB dataset show that our hybrid IDS can identify network misuses accurately in 97.29% of cases and outperforms state-of-the-art approaches during 10-fold cross-validation tests.
引用
收藏
页数:14
相关论文
共 52 条
[1]  
Allen J., 2000, State of the practice of intrusion detection technologies
[2]  
[Anonymous], 2014, S AFR COMPUT J
[3]  
[Anonymous], 2000, INTRUSION DETECTION
[4]  
[Anonymous], P IEEE C COMP VIS PA
[5]  
[Anonymous], 2004, P IEEE INT C ADV INT
[6]  
[Anonymous], P IIEEE INT C PLATF
[7]  
Bijone M., 2016, AM J INFORM SYSTEMS, V4, P69, DOI DOI 10.12691/AJIS-4-3-2
[8]   A hybrid network intrusion detection system using simplified swarm optimization (SSO) [J].
Chung, Yuk Ying ;
Wahid, Noorhaniza .
APPLIED SOFT COMPUTING, 2012, 12 (09) :3014-3022
[9]   An intelligent intrusion detection system (IDS) for anomaly and misuse detection in computer networks [J].
Depren, O ;
Topallar, M ;
Anarim, E ;
Ciliz, MK .
EXPERT SYSTEMS WITH APPLICATIONS, 2005, 29 (04) :713-722
[10]   Video-Based Emotion Recognition using CNN-RNN and C3D Hybrid Networks [J].
Fan, Yin ;
Lu, Xiangju ;
Li, Dian ;
Liu, Yuanliu .
ICMI'16: PROCEEDINGS OF THE 18TH ACM INTERNATIONAL CONFERENCE ON MULTIMODAL INTERACTION, 2016, :445-450