DESNN Algorithm for Communication Network Intrusion Detection

被引:1
作者
Liu, Fulai [1 ,2 ]
Xu, Jialiang [2 ]
Zhang, Lijie [2 ]
Du, Ruiyan [1 ,2 ]
Su, Zhibo [2 ]
Zhang, Aiyi [2 ]
Hu, Zhongyi [2 ]
机构
[1] Northeastern Univ Qinhuangdao, Engineer Optimizat & Smart Antenna Inst, Qinhuangdao, Hebei, Peoples R China
[2] Northeastern Univ, Sch Comp Sci & Engn, Shenyang, Peoples R China
基金
中国国家自然科学基金;
关键词
Intrusion detection; Deep neural network; Dynamic pruning rule; Neural network compression; MODEL;
D O I
10.1007/s11277-022-09817-5
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Intrusion detection is a crucial technology in the communication network security field. In this paper, a dynamic evolutionary sparse neural network (DESNN) is proposed for intrusion detection, named as DESNN algorithm. Firstly, an ensemble neural network model is constructed, which is processed by a dynamic pruning rule and further divided into advantage subnetworks and disadvantage subnetworks. The dynamic pruning rule can effectively reduce the subnetworks weight parameters, thereby increasing the speed of the subnetworks intrusion detection. Then considering the subnetworks performance loss caused by the dynamic pruning rule, a novel evolutionary mechanism is proposed to optimize the training process of the disadvantage subnetworks. The weight of the disadvantage subnetworks approach the weight of the advantage subnetworks by the evolutionary mechanism, such that the performance of the ensemble neural network can be improved. Finally, an optimal subnetwork is selected from the ensemble neural network, which is used to detect multiple types of intrusion. Experiments show that the proposed DESNN algorithm improves intrusion detection speed without causing significant performance loss compare with other fully-connected neural network models.
引用
收藏
页码:1705 / 1720
页数:16
相关论文
共 18 条
[1]   Network intrusion detection system: A systematic study of machine learning and deep learning approaches [J].
Ahmad, Zeeshan ;
Shahid Khan, Adnan ;
Wai Shiang, Cheah ;
Abdullah, Johari ;
Ahmad, Farhan .
TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2021, 32 (01)
[2]   An intrusion detection system based on combining probability predictions of a tree of classifiers [J].
Ahmim, Ahmed ;
Derdour, Makhlouf ;
Ferrag, Mohamed Amine .
INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2018, 31 (09)
[3]   Deep learning approaches for anomaly-based intrusion detection systems: A survey, taxonomy, and open issues [J].
Aldweesh, Arwa ;
Derhab, Abdelouahid ;
Emam, Ahmed Z. .
KNOWLEDGE-BASED SYSTEMS, 2020, 189
[4]  
[Anonymous], 2016, INT C PLATF TECHN SE
[5]  
[Anonymous], 2017, INT J ADV RES COMPUT
[6]  
[Anonymous], 2016, Advances in Neural Information Processing Systems
[7]  
[Anonymous], 2015, P BRIT MACH VIS C 20, DOI DOI 10.5244/C.29.31
[8]  
Denil M., 2013, Adv. Neural Inf. Process. Syst.
[9]   Anomaly detection in ad-hoc networks based on deep learning model: A plug and play device [J].
Feng, Fang ;
Liu, Xin ;
Yong, Binbin ;
Zhou, Rui ;
Zhou, Qingguo .
AD HOC NETWORKS, 2019, 84 :82-89
[10]   Intrusion Detection System Using Deep Neural Network for In-Vehicle Network Security [J].
Kang, Min-Joo ;
Kang, Je-Won .
PLOS ONE, 2016, 11 (06)