Network intrusion detection using feature fusion with deep learning

被引:0
作者
Abiodun Ayantayo
Amrit Kaur
Anit Kour
Xavier Schmoor
Fayyaz Shah
Ian Vickers
Paul Kearney
Mohammed M. Abdelsamea
机构
[1] Birmingham City University,School of Computing and Digital Technology
[2] METCLOUD LTD,Faculty of Computers and Information
[3] Assiut University,Department of Computer Science
[4] University of Exeter,undefined
来源
Journal of Big Data | / 10卷
关键词
Feature fusion; Deep learning; Fully-connected networks; Network intrusion detection;
D O I
暂无
中图分类号
学科分类号
摘要
Network intrusion detection systems (NIDSs) are one of the main tools used to defend against cyber-attacks. Deep learning has shown remarkable success in network intrusion detection. However, the effect of feature fusion has yet to be explored in how to boost the performance of the deep learning model and improve its generalisation capability in NIDS. In this paper, we propose novel deep learning architectures with different feature fusion mechanisms aimed at improving the performance of the multi-classification components of NIDS. We propose three different deep learning models, which we call early-fusion, late-fusion, and late-ensemble learning models using feature fusion with fully connected deep networks. Our feature fusion mechanisms were designed to encourage deep learning models to learn relationships between different input features more efficiently and mitigate any potential bias that may occur with a particular feature type. To assess the efficacy of our deep learning solutions and make comparisons with state-of-the-art models, we employ the widely accessible UNSW-NB15 and NSL-KDD datasets specifically designed to enhance the development and evaluation of improved NIDSs. Through quantitative analysis, we demonstrate the resilience of our proposed models in effectively addressing the challenges posed by multi-classification tasks, especially in the presence of class imbalance issues. Moreover, our late-fusion and late-ensemble models showed the best generalisation behaviour (against overfitting) with similar performance on the training and validation sets.
引用
收藏
相关论文
共 94 条
[1]  
LeCun Y(2015)Deep learning Nature 521 436-44
[2]  
Bengio Y(2017)Deep multimodal learning: a survey on recent advances and trends IEEE Signal Process Mag 34 96-108
[3]  
Hinton G(2016)The evaluation of network anomaly detection systems: statistical analysis of the unsw-nb15 data set and the comparison with the kdd99 data set Inform Sec J Glob Perspect 25 18-31
[4]  
Ramachandram D(2016)Performance evaluation of supervised machine learning algorithms for intrusion detection Proc Comp Sci 89 117-123
[5]  
Taylor GW(2020)Cybersecurity data science: an overview from machine learning perspective J Big Data 7 1-29
[6]  
Moustafa N(2010)Random effects logistic regression model for anomaly detection Exp Syst Appl 37 7162-7166
[7]  
Slay J(2019)Using machine learning techniques to identify rare cyber-attacks on the UNSW-NB15 dataset Sec Priv 2 91-448
[8]  
Belavagi MC(2002)Use of k-nearest neighbor classifier for intrusion detection Comp Sec 21 439-303
[9]  
Muniyal B(2017)Multi-level hybrid support vector machine and extreme learning machine based on modified k-means for intrusion detection system Exp Syst Appl 67 296-313
[10]  
Sarker IH(2011)A novel intrusion detection system based on hierarchical clustering and support vector machines Exp Syst Appl 38 306-20