[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to main content

Deep Learning Network Intrusion Detection Based on Network Traffic

  • Conference paper
  • First Online:
Artificial Intelligence and Security (ICAIS 2022)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 13340))

Included in the following conference series:

Abstract

Network intrusion detection is an important protection tool after firewall, and intrusion detection algorithm is the core of intrusion detection system. The purpose of studying intrusion detection algorithm is to improve the detection rate of abnormal attacks and reduce the false positive rate. Deep learning is the first mock exam to deal with network data traffic. It does not make full use of the unique characteristics of network data when solving classification problems, and often shows the drawback of not fully summarizing the characteristics and limited generalization ability of specific data sets. The fusion of convolutional neural network and long-term and short-term memory network can fully extract the effective features of intrusion samples by mining the spatio-temporal features of all aspects of network data flow, especially the sequence of feature sequences retained by LSTM, which makes intrusion detection more accurate in classifying normal data and four kinds of abnormal data, Experiments show that CNN-LSTM model is more accurate and has excellent performance on UNSW-NB15 data set and NLS-KDD 99 data set.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
£29.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
GBP 19.95
Price includes VAT (United Kingdom)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
GBP 79.50
Price includes VAT (United Kingdom)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
GBP 99.99
Price includes VAT (United Kingdom)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Internet security threat report. National Internet Emergency Response Center, China (2021). https://www.cert.org.cn/publish/main/upload/File/CNCERTreport202103(3).pdf

  2. Pervez, M.S., Farid, D.M.: Feature selection and intrusion classification in NSL-KDD cup 99 dataset employing SVMs. In: International Conference on Software, Knowledge, Information Management and Applications. IEEE (2015)

    Google Scholar 

  3. Shapoorifard, H., Shamsinejad, P.: Intrusion detection using a novel hybrid method incorporating an improved KNN. Int. J. Comput. Appl. 173, 1 (2017)

    Google Scholar 

  4. Ingre, B., Yadav, A., Soni, A.K.: Decision tree based intrusion detection system for NSL-KDD dataset. In: Satapathy, S., Joshi, A. (eds.) Information and Communication Technology for Intelligent Systems (ICTIS 2017) - Volume 2. ICTIS 2017. Smart Innovation, Systems and Technologies, vol. 84. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-63645-0_23

  5. Li, G., et al.: Deep learning algorithms for cyber security applications: a survey. J. Comput. Secur. 29(5), 447–471 (2021)

    Article  Google Scholar 

  6. Gan, L.J., Kong, L., Ma, Y.J.: College Computer Basic Tutorial, vol. 08, p. 152. Chongqing University Press (2017)

    Google Scholar 

  7. Xu, W.: Research on the application of machine learning in intrusion detection technology. Donghua University (2021)

    Google Scholar 

  8. Zhang, Q.: Research on network intrusion detection based on deep learning model. Tianjin University of Technology (2021)

    Google Scholar 

  9. Dou, L.: Rumination on the application of machine learning in network security. Netw. Secur. Technol. Appl. 2021(06), 40–42 (2021)

    Google Scholar 

  10. Yu, N.: A novel selection method of network intrusion optimal route detection based on Naive Bayesian. Int. J. Appl. Decis. Sci. 11(1), 1–1 (2018)

    Google Scholar 

  11. Ho, S., Al Jufout, S., Dajani, K.: A novel intrusion detection model for detecting known and innovative cyberattacks using convolutional neural network. IEEE Open J. Comput. Soc. 2, 14–25 (2021)

    Article  Google Scholar 

  12. Zeng, X.: Anomalous traffic detection method based on improved RNN and density clustering. Beijing University of Posts and Telecommunications (2019)

    Google Scholar 

  13. Liang, Y., Zu, X.: Research on intrusion detection model based on LSTM network. Digit. User 24(35), 12 (2018)

    Google Scholar 

  14. Feng, J.: Research on network intrusion detection algorithm based on convolutional neural network. Shanxi University (2020)

    Google Scholar 

  15. Naseer, S., Saleem, Y., Khalid, S.: Enhanced network anomaly detection based on deep neural networks. IEEE Access 6, 48231–48246 (2018)

    Article  Google Scholar 

  16. Farahnakian, F., Heikkonen, J.: A deep auto-encoder based approach for intrusion detection system. In: 2018 20th International Conference on Advanced Communication Technology (ICACT) (2018)

    Google Scholar 

  17. Al-Qatf, M., Lasheng, Y., Al-Habib, M., et al.: Deep learning approach combining sparse autoencoder with SVM for network intrusion detection. IEEE Access 6, 52843–52856 (2018)

    Article  Google Scholar 

  18. Almomani, O.: A hybrid model using bio-inspired metaheuristic algorithms for network intrusion detection system. Comput. Mater. Contin. 68(1), 409–429 (2021)

    MathSciNet  Google Scholar 

  19. Aljehane, N.O.: A secure intrusion detection system in cyberphysical systems using a parameter-tuned deep-stacked autoencoder. Comput. Mater. Contin. 68(3), 3915–3929 (2021)

    Google Scholar 

  20. Wang, Q., Zhao, W., Ren, J.: Intrusion detection algorithm based on image enhanced convolutional neural network. J. Intell. Fuzzy Syst. 41(1), 2183–2194 (2021)

    Article  Google Scholar 

  21. Yan, R., Zhang, L.: Intrusion detection based on Focal Loss and convolutional neural network. Comput. Mod. 01, 65–69 (2021)

    Google Scholar 

  22. Tan, M.S., Peng, M., Ding, L., Wu, G.: Application of genetic-based CNN optimization method in intrusion detection. Comput. Simul. 38(02), 416–421 (2021)

    Google Scholar 

  23. Chen, M., Wang, X., He, M., Jin, L., Javeed, K., Wang, X.: A network traffic classification model based on metric learning. Comput. Mater. Contin. 64(2), 941–959 (2020)

    Google Scholar 

  24. Wang, Y., Mo, S., Wu, W., Fan, S., Xiao, D.: Network intrusion detection based on internal and external convolutional networks. J. Beijing Univ. Posts Telecommun. 44(05), 94–100 (2021). https://doi.org/10.13190/j.jbupt.2021-007

  25. Almaslukh, B.: Deep learning and entity embedding-based intrusion detection model for wireless sensor networks. Comput. Mater. Contin. 69(1), 1343–1360 (2021)

    Google Scholar 

  26. Wang, W.: Design and implementation of network intrusion detection algorithm based on convolutional neural network. Harbin Institute of Technology (2021)

    Google Scholar 

  27. Zhang, X.: Research on network intrusion detection based on CNN-GRU and ResNet. Tianjin University of Technology (2021)

    Google Scholar 

  28. Hao, X.D., Zhou, J.M., Shen, X.Q., Yang, Y.: A novel intrusion detection algorithm based on long short term memory network. J. Quantum Comput. 2(2), 97–104 (2020)

    Article  Google Scholar 

  29. Lin, W.H.: Behaviour classification of cyber attacks using convolutional neural networks. J. Comput. Sci. 32(1), 65–82 (2021)

    Article  Google Scholar 

  30. Arora, I.S., Bhatia, G.K.: Comparative analysis of classification algorithms on KDD’99 data set. Int. J. Comput. Netw. Inf. Secur. (IJCNIS) 8(9), 34–40 (2016)

    Google Scholar 

  31. Moustafa, N., Slay, J.: UNSW-NB15: a comprehensive dataset for network intrusion detection systems (UNSW-NB15 network dataset). In: 2015 Military Communications and Information Systems Conference (MilCIS), pp. 1–6 (2015)

    Google Scholar 

  32. Hongmin, C., Qingxiang, W.: Research on intrusion detection technology based on deep learning. Netw. Secur. Technol. Appl. 11, 62–64 (2017)

    Google Scholar 

  33. Yang, Y.R., Song, R.J., Hu, G.Q.: CNN-ELM-based intrusion detection. Comput. Eng. Des. 40(12), 3382–3387 (2019)

    Google Scholar 

Download references

Funding

This work was supported by Hainan Provincial Natural Science Foundation of China (620RC559), Education Teaching Reform of Hainan University (hdjy2117) and Research Project on Education Teaching Reform in Hainan Higher Education Institutions (Hnjg2021-25).

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Fa Fu or Houqun Yang .

Editor information

Editors and Affiliations

Ethics declarations

The authors declare that they have no conflicts of interest to report regarding the present study.

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Wang, H. et al. (2022). Deep Learning Network Intrusion Detection Based on Network Traffic. In: Sun, X., Zhang, X., Xia, Z., Bertino, E. (eds) Artificial Intelligence and Security. ICAIS 2022. Lecture Notes in Computer Science, vol 13340. Springer, Cham. https://doi.org/10.1007/978-3-031-06791-4_16

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-06791-4_16

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-06790-7

  • Online ISBN: 978-3-031-06791-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics