On the combination of data augmentation method and gated convolution model for building effective and robust intrusion detection

被引:2
作者
Wang, Yixiang [1 ]
Lv, Shaohua [1 ]
Liu, Jiqiang [1 ]
Chang, Xiaolin [1 ]
Wang, Jinqiang [2 ]
机构
[1] Beijing Jiaotong Univ, Beijing Key Lab Secur & Privacy Intelligent Trans, 3 Shangyuancun, Beijing 100044, Peoples R China
[2] Beijing Jiaotong Univ, Beijing Key Lab Traff Data Anal & Min, 3 Shangyuancun, Beijing 100044, Peoples R China
关键词
Data augmentation; Intrusion detection system; Machine learning algorithms; System call; NETWORK;
D O I
10.1186/s42400-020-00063-5
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Deep learning (DL) has exhibited its exceptional performance in fields like intrusion detection. Various augmentation methods have been proposed to improve data quality and eventually to enhance the performance of DL models. However, the classic augmentation methods cannot be applied to those DL models which exploit the system-call sequences to detect intrusion. Previously, the seq2seq model has been explored to augment system-call sequences. Following this work, we propose a gated convolutional neural network (GCNN) model to thoroughly extract the potential information of augmented sequences. Also, in order to enhance the model's robustness, we adopt adversarial training to reduce the impact of adversarial examples on the model. Adversarial examples used in adversarial training are generated by the proposed adversarial sequence generation algorithm. The experimental results on different verified models show that GCNN model can better obtain the potential information of the augmented data and achieve the best performance. Furthermore, GCNN with adversarial training can enhance robustness significantly.
引用
收藏
页数:12
相关论文
共 40 条
  • [1] Threat of Adversarial Attacks on Deep Learning in Computer Vision: A Survey
    Akhtar, Naveed
    Mian, Ajmal
    [J]. IEEE ACCESS, 2018, 6 : 14410 - 14430
  • [2] Deep Learning Approach Combining Sparse Autoencoder With SVM for Network Intrusion Detection
    Al-Qatf, Majjed
    Yu Lasheng
    Al-Habib, Mohammed
    Al-Sabahi, Kamal
    [J]. IEEE ACCESS, 2018, 6 : 52843 - 52856
  • [3] Bahdanau D., 2014, EMNLP, DOI 10.3115/v1/d14
  • [4] SUPPORT-VECTOR NETWORKS
    CORTES, C
    VAPNIK, V
    [J]. MACHINE LEARNING, 1995, 20 (03) : 273 - 297
  • [5] Creech G, 2013, 2013 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC), P4487
  • [6] Devlin J, 2019, 2019 CONFERENCE OF THE NORTH AMERICAN CHAPTER OF THE ASSOCIATION FOR COMPUTATIONAL LINGUISTICS: HUMAN LANGUAGE TECHNOLOGIES (NAACL HLT 2019), VOL. 1, P4171
  • [7] Dzmitry Bahdanau Kyunghyun, 2015, 3 INT C LEARN REP IC
  • [8] FINDING STRUCTURE IN TIME
    ELMAN, JL
    [J]. COGNITIVE SCIENCE, 1990, 14 (02) : 179 - 211
  • [9] An introduction to ROC analysis
    Fawcett, Tom
    [J]. PATTERN RECOGNITION LETTERS, 2006, 27 (08) : 861 - 874
  • [10] The Evolution of System-call Monitoring
    Forrest, Stephanie
    Hofmeyr, Steven
    Somayaji, Anil
    [J]. 24TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2008, : 418 - +