Data-Balancing Algorithm Based on Generative Adversarial Network for Robust Network Intrusion Detection

被引:0
作者
Liu, I-Hsien [1 ]
Hsieh, Cheng-En [1 ]
Lin, Wei -Min [1 ]
Li, Jung-Shian [1 ]
Li, Chu -Fen [2 ]
机构
[1] Natl Cheng Kung Univ, Inst Comp & Commun Engn, Dept Elect Engn, 1, Univ Rd, Tainan 701401, Taiwan
[2] Natl Formosa Univ, Dept Finance, 64, Wunhua Rd, Huwei Township 632301, Yunlin Cty, Taiwan
来源
JOURNAL OF ROBOTICS NETWORKING AND ARTIFICIAL LIFE | 2022年 / 9卷 / 03期
关键词
Anomaly traffic detection; Machine learning; IDS dataset; GAN; Performance analytics;
D O I
暂无
中图分类号
TP24 [机器人技术];
学科分类号
080202 ; 1405 ;
摘要
With the popularization and advancement of digital technology and network technology in recent years, cyber security has emerged as a critical concern. In order to defend against malicious attacks, intrusion detection systems (IDSs) increasingly employ machine learning models as a protection strategy. However, the effectiveness of such models is dependent on the algorithms and datasets used to train them. The present study uses five different supervised algorithms (Naive Bayes, CNN, LSTM, BAT, and SVM) to implement the IDS machine learning model. A data -balancing algorithm based on a generative adversarial network (GAN) is proposed to mitigate the data imbalance problem in the IDS dataset. The proposed method, designated as GAN-BAL, is applied to the CICIDS 2017 dataset and is shown to improve both the recall rate and the accuracy of the trained IDS models. (c) 2022 The Author. Published by Sugisaka Masanori at ALife Robotics Corporation Ltd This is an open access article distributed under the CC BY-NC 4.0 license (http://creativecommons.org/licenses/by-nc/4.0/)
引用
收藏
页码:303 / 308
页数:6
相关论文
共 12 条
  • [1] Brunswick University of New, 2017, Canadian Institute for Cybersecurity
  • [2] Gharib A, 2016, 2016 INT C INF SCI S, P1
  • [3] IGAN-IDS: An imbalanced generative adversarial network towards intrusion detection system in ad-hoc networks
    Huang, Shuokang
    Lei, Kai
    [J]. AD HOC NETWORKS, 2020, 105 (105)
  • [4] LINCOLN LABORATORY, 1998, 1998 DARPA INTRUSION DETECTION EVALUATION DATASET
  • [5] Moustafa N, 2015, 2015 MILITARY COMMUNICATIONS AND INFORMATION SYSTEMS CONFERENCE (MILCIS)
  • [6] NSA CISA FBI & NCSC, 2021, Russian GRU Conducting Global Brute Force Campaign to Compromise Enterprise and Cloud Environments
  • [7] A survey of network-based intrusion detection data sets
    Ring, Markus
    Wunderlich, Sarah
    Scheuring, Deniz
    Landes, Dieter
    Hotho, Andreas
    [J]. COMPUTERS & SECURITY, 2019, 86 : 147 - 167
  • [8] Toward Generating a New Intrusion Detection Dataset and Intrusion Traffic Characterization
    Sharafaldin, Iman
    Lashkari, Arash Habibi
    Ghorbani, Ali A.
    [J]. ICISSP: PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2018, : 108 - 116
  • [9] Tavallaee M., 2009, 2009 IEEE S COMP INT, P53
  • [10] TWISC@NCKU, 2006, Taiwan Information Security Center