Improving the Classification Effectiveness of Intrusion Detection by Using Improved Conditional Variational AutoEncoder and Deep Neural Network

被引:165
作者
Yang, Yanqing [1 ,2 ]
Zheng, Kangfeng [1 ]
Wu, Chunhua [1 ]
Yang, Yixian [1 ,3 ]
机构
[1] Beijing Univ Posts & Telecommun, Sch Cyberspace Secur, Beijing 100876, Peoples R China
[2] Xinjiang Univ, Coll Informat Sci & Engn, Urumqi 830046, Peoples R China
[3] Guizhou Univ, Guizhou Prov Key Lab Publ Big Data, Guiyang 550025, Guizhou, Peoples R China
基金
中国国家自然科学基金; 国家重点研发计划;
关键词
intrusion detection; variational inference; improved conditional variational autoencoder; generator network; deep neural network; RESTRICTED BOLTZMANN MACHINES; SUPPORT VECTOR MACHINE; DETECTION SYSTEM; LEARNING APPROACH; MODEL;
D O I
10.3390/s19112528
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
Intrusion detection systems play an important role in preventing security threats and protecting networks from attacks. However, with the emergence of unknown attacks and imbalanced samples, traditional machine learning methods suffer from lower detection rates and higher false positive rates. We propose a novel intrusion detection model that combines an improved conditional variational AutoEncoder (ICVAE) with a deep neural network (DNN), namely ICVAE-DNN. ICVAE is used to learn and explore potential sparse representations between network data features and classes. The trained ICVAE decoder generates new attack samples according to the specified intrusion categories to balance the training data and increase the diversity of training samples, thereby improving the detection rate of the imbalanced attacks. The trained ICVAE encoder is not only used to automatically reduce data dimension, but also to initialize the weight of DNN hidden layers, so that DNN can easily achieve global optimization through back propagation and fine tuning. The NSL-KDD and UNSW-NB15 datasets are used to evaluate the performance of the ICVAE-DNN. The ICVAE-DNN is superior to the three well-known oversampling methods in data augmentation. Moreover, the ICVAE-DNN outperforms six well-known models in detection performance, and is more effective in detecting minority attacks and unknown attacks. In addition, the ICVAE-DNN also shows better overall accuracy, detection rate and false positive rate than the nine state-of-the-art intrusion detection methods.
引用
收藏
页数:20
相关论文
共 55 条
[31]  
Lemaître G, 2017, J MACH LEARN RES, V18
[32]   Using a Recurrent Neural Network and Restricted Boltzmann Machines for Malicious Traffic Detection [J].
Li, Chaopeng ;
Wang, Jinlin ;
Ye, Xiaozhou .
NEUROQUANTOLOGY, 2018, 16 (05) :823-831
[33]   A Sanitization Approach to Secure Shared Data in an IoT Environment [J].
Lin, Jerry Chun-Wei ;
Wu, Jimmy Ming-Tai ;
Fournier-Viger, Philippe ;
Djenouri, Youcef ;
Chen, Chun-Hao ;
Zhang, Yuyu .
IEEE ACCESS, 2019, 7 :25359-25368
[34]   Conditional Variational Autoencoder for Prediction and Feature Recovery Applied to Intrusion Detection in IoT [J].
Lopez-Martin, Manuel ;
Carro, Belen ;
Sanchez-Esguevillas, Antonio ;
Lloret, Jaime .
SENSORS, 2017, 17 (09)
[35]   A Hybrid Spectral Clustering and Deep Neural Network Ensemble Algorithm for Intrusion Detection in Sensor Networks [J].
Ma, Tao ;
Wang, Fen ;
Cheng, Jianjun ;
Yu, Yang ;
Chen, Xiaoyun .
SENSORS, 2016, 16 (10)
[36]  
Malaiya RK, 2018, INT CONF COMPUT NETW, P893, DOI 10.1109/ICCNC.2018.8390278
[37]  
Moustafa N, 2015, 2015 MILITARY COMMUNICATIONS AND INFORMATION SYSTEMS CONFERENCE (MILCIS)
[38]   The evaluation of Network Anomaly Detection Systems: Statistical analysis of the UNSW-NB15 data set and the comparison with the KDD99 data set [J].
Moustafa, Nour ;
Slay, Jill .
INFORMATION SECURITY JOURNAL, 2016, 25 (1-3) :18-31
[39]   Network Intrusion Detection Based on Semi-supervised Variational Auto-Encoder [J].
Osada, Genki ;
Omote, Kazumasa ;
Nishide, Takashi .
COMPUTER SECURITY - ESORICS 2017, PT II, 2017, 10493 :344-361
[40]   Host-based misuse intrusion detection using PCA feature extraction and kNN classification algorithms [J].
Serpen, Gursel ;
Aghaei, Ehsan .
INTELLIGENT DATA ANALYSIS, 2018, 22 (05) :1101-1114