A Semantic Parsing Based LSTM Model for Intrusion Detection

被引:7
作者
Li, Zhipeng [1 ]
Qin, Zheng [1 ]
机构
[1] Tsinghua Univ, Sch Software, Beijing 100084, Peoples R China
来源
NEURAL INFORMATION PROCESSING (ICONIP 2018), PT IV | 2018年 / 11304卷
关键词
Anomaly detection; Semantic parsing; LSTM; NSL_KDD;
D O I
10.1007/978-3-030-04212-7_53
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Nowadays, with the great success of deep learning technology, using deep learning method to solve information security issues has become a study hot spot. Although some literal works have tried to solve intrusion detection problem via recurrent neural network, these methods do not give a detailed framework and specific data processing progress. We propose a novel semantic parsing based Long Short-Term Memory (LSTM) network framework in this paper. The proposed method uses the semantic representations of network data. The novel conversion process of various forms of network data to semantic description is given in detail. Experiments on NSL_KDD data sets show our proposed model outperforms most of the standard classifier. Results show that the semantic description has reserved information of the data and our semantic parsing based LSTM model provides a novel way to solve anomaly detection.
引用
收藏
页码:600 / 609
页数:10
相关论文
共 19 条
  • [1] [Anonymous], 2015, Int. J. Adv. Res. Comput. Commun. Eng.
  • [2] A Hybrid Method for Intrusion Detection
    Canbay, Yavuz
    Sagiroglu, Seref
    [J]. 2015 IEEE 14TH INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND APPLICATIONS (ICMLA), 2015, : 156 - 161
  • [3] AN INTRUSION-DETECTION MODEL
    DENNING, DE
    [J]. IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 1987, 13 (02) : 222 - 232
  • [4] High-dimensional and large-scale anomaly detection using a linear one-class SVM with deep learning
    Erfani, Sarah M.
    Rajasegarar, Sutharshan
    Karunasekera, Shanika
    Leckie, Christopher
    [J]. PATTERN RECOGNITION, 2016, 58 : 121 - 134
  • [5] Network anomaly detection with the restricted Boltzmann machine
    Fiore, Ugo
    Palmieri, Francesco
    Castiglione, Aniello
    De Santis, Alfredo
    [J]. NEUROCOMPUTING, 2013, 122 : 13 - 23
  • [6] Gao HH, 2005, PROCEEDINGS OF 2005 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-9, P3871
  • [7] LSTM: A Search Space Odyssey
    Greff, Klaus
    Srivastava, Rupesh K.
    Koutnik, Jan
    Steunebrink, Bas R.
    Schmidhuber, Juergen
    [J]. IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS, 2017, 28 (10) : 2222 - 2232
  • [8] Haq NF, 2015, 2015 SAI INTELLIGENT SYSTEMS CONFERENCE (INTELLISYS), P989, DOI 10.1109/IntelliSys.2015.7361264
  • [9] Power Adaptive Data Encryption for Energy-Efficient and Secure Communication in Solar-Powered Wireless Sensor Networks
    Kim, Jong Min
    Lee, Hong Sub
    Yi, Junmin
    Park, Minho
    [J]. JOURNAL OF SENSORS, 2016, 2016
  • [10] Deep learning
    LeCun, Yann
    Bengio, Yoshua
    Hinton, Geoffrey
    [J]. NATURE, 2015, 521 (7553) : 436 - 444