A Convolutional Neural Network for Improved Anomaly-Based Network Intrusion Detection

被引:73
作者
Al-Turaiki, Isra [1 ]
Altwaijry, Najwa [2 ]
机构
[1] King Saud Univ, Coll Comp & Informat Sci, Dept Informat Technol, Riyadh 11451, Saudi Arabia
[2] King Saud Univ, Coll Comp & Informat Sci, Dept Comp Sci, Riyadh, Saudi Arabia
关键词
convolutional neural network; cybersecurity; machine learning; network intrusion detection system; NSL-KDD; UNSW-NB15; MATRIX FACTORIZATION; RECOMMENDER SYSTEMS; PRIVACY;
D O I
10.1089/big.2020.0263
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Cybersecurity protects and recovers computer systems and networks from cyber attacks. The importance of cybersecurity is growing commensurately with people's increasing reliance on technology. An anomaly detection-based network intrusion detection system is essential to any security framework within a computer network. In this article, we propose two models based on deep learning to address the binary and multiclass classification of network attacks. We use a convolutional neural network architecture for ourmodels. In addition, a hybrid two-step preprocessing approach is proposed to generate meaningful features. The proposed approach combines dimensionality reduction and feature engineering using deep feature synthesis. The performance of our models is evaluated using two benchmark data sets, namely the network security laboratory-knowledge discovery in databases data set and the University of New South Wales Network Based 2015 data set. The performance is compared with similar deep learning approaches in the literature, as well as state-of-the-art classification models. Experimental results show that our models achieve good performance in terms of accuracy and recall, outperforming similar models in the literature.
引用
收藏
页码:233 / 252
页数:20
相关论文
共 32 条
[1]   Deep Learning with Differential Privacy [J].
Abadi, Martin ;
Chu, Andy ;
Goodfellow, Ian ;
McMahan, H. Brendan ;
Mironov, Ilya ;
Talwar, Kunal ;
Zhang, Li .
CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, :308-318
[2]  
[Anonymous], 2006, LECT NOTES COMPUTER
[3]   Privacy Preserving User-based Recommender System [J].
Badsha, Shahriar ;
Yi, Xun ;
Khalil, Ibrahim ;
Bertino, Elisa .
2017 IEEE 37TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS (ICDCS 2017), 2017, :1074-1083
[4]  
Berlioz A., RECSYS 15 P 9 ACM C, P107
[5]   "You Might Also Like:" Privacy Risks of Collaborative Filtering [J].
Calandrino, Joseph A. ;
Kilzer, Ann ;
Narayanan, Arvind ;
Felten, Edward W. ;
Shmatikov, Vitaly .
2011 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2011), 2011, :231-246
[6]   Detection of Profile-injection attacks in Recommender Systems using Outlier Analysis [J].
Chakraborty, Parthasarathi ;
Karforma, Sunil .
FIRST INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE: MODELING TECHNIQUES AND APPLICATIONS (CIMTA) 2013, 2013, 10 :963-969
[7]  
Chaudhuri K, 2011, J MACH LEARN RES, V12, P1069
[8]   A Survey of Collaborative Filtering-Based Recommender Systems: From Traditional Methods to Hybrid Methods Based on Social Networks [J].
Chen, Rui ;
Hua, Qingyi ;
Chang, Yan-Shuo ;
Wang, Bo ;
Zhang, Lei ;
Kong, Xiangjie .
IEEE ACCESS, 2018, 6 :64301-64320
[9]   The Algorithmic Foundations of Differential Privacy [J].
Dwork, Cynthia ;
Roth, Aaron .
FOUNDATIONS AND TRENDS IN THEORETICAL COMPUTER SCIENCE, 2013, 9 (3-4) :211-406
[10]   Model Inversion Attacks that Exploit Confidence Information and Basic Countermeasures [J].
Fredrikson, Matt ;
Jha, Somesh ;
Ristenpart, Thomas .
CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2015, :1322-1333