[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
research-article

Multi-objective evolving long–short term memory networks with attention for network intrusion detection

Published: 01 May 2023 Publication History

Abstract

Cyber security has received increasing attention, as people use more Internet applications in their lives and worry about the security of their personal data on the Internet. Intrusion Detection Systems (IDSs) are critical security tools that can detect and respond to intrusions. In recent years, Deep Learning (DL) techniques have gained popularity in IDS design due to their promising performance in terms of detection accuracy. However, the design of DL architectures usually requires professional knowledge and significantly impacts the performance of the DL model. Furthermore, the existence of a small ratio of abnormal traffic in vast network traffic leads to a serious imbalanced data problem, which negatively affects the performance of the DL model in detecting minority attack classes. To alleviate these problems, this paper proposes a multi-objective evolutionary DL model (called EvoBMF) to detect network intrusion behaviors. The model incorporates bidirectional Long–short Term Memory (BiLSTM) for preliminary feature extraction, Multi-Head Attention (MHA) for further capturing features and global information of the network traffic, and Full-Connected Layer (FCL) module to perform final classification. To deal with the challenge of manually tuning the parameters of the DL model when tackling different tasks, the parameters of the EvoBMF model are first encoded as the chromosome of the Multi-objective Evolutionary Algorithm (MOEA), which aims to optimize the two conflicting objectives (complexity and classification ability) of the model. A state-of-the-art MOEA (MOEA/D-DRA) is then used to optimize the above two objectives, aiming to obtain the optimal architecture for EvoBMF, which can be easily deployed in cloud computing scenarios to detect and respond to network intrusions. Additionally, to alleviate the severe imbalance in routine network traffic, the synthetic minority over-sampling technique is introduced to generate representative samples of minority classes to improve the overall performance of the model. At last, the experimental results conducted on two popular datasets (UNSW-NB15 and CIC-IDS 2018) have demonstrated that the proposed EvoBMF model can provide superior performance for intrusion detection when compared to some state-of-the-art IDSs.

Highlights

EvoBMF: a multi-objective evolutionary DL model for IDS.
EvoBMF uses BiLSTM, MHA, and FCL for feature extraction and classification.
NAS technique automates parameter adjustment of EvoBMF.
SMOTE technique improves recognition rate of minority attack classes.

References

[1]
Chaabouni N., Mosbah M., Zemmari A., Sauvignac C., Faruki P., Network intrusion detection for IoT security based on learning techniques, IEEE Commun. Surv. Tutor. 21 (3) (2019) 2671–2701.
[2]
Ponmalar A., Dhanakoti V., An intrusion detection approach using ensemble support vector machine based chaos game optimization algorithm in big data platform, Appl. Soft Comput. 116 (2021).
[3]
Lv Z., Qiao L., Li J., Song H., Deep-learning-enabled security issues in the Internet of Things, IEEE Internet Things J. 8 (12) (2020) 9531–9538.
[4]
McHugh J., Testing intrusion detection systems, ACM Trans. Inf. Syst. Secur. 3 (4) (2000) 262–294.
[5]
Abdel-Basset M., Hawash H., Chakrabortty R.K., Ryan M.J., Semi-supervised spatio-temporal deep learning for intrusions detection in IoT networks, IEEE Internet Things J. 8 (15) (2021) 12251–12265.
[6]
Aljawarneh S., Aldwairi M., Yassein M.B., Anomaly-based intrusion detection system through feature selection analysis and building hybrid efficient model, J. Comput. Sci. 25 (2018) 152–160.
[7]
Wu S.X., Banzhaf W., The use of computational intelligence in intrusion detection systems: A review, Appl. Soft Comput. 10 (1) (2010) 1–35.
[8]
Diro A.A., Chilamkurti N., Deep learning: The frontier for distributed attack detection in Fog-to-Things computing, Ieee Commun. Mag. 56 (2) (2018) 169–175.
[9]
Nassif A.B., Elnagar A., Shahin I., Henno S., Deep learning for arabic subjective sentiment analysis: Challenges and research opportunities, Appl. Soft Comput. 98 (2021).
[10]
Kumar M., Mukherjee P., Verma K., Verma S., Rawat D.B., Improved deep convolutional neural network based malicious node detection and energy-efficient data transmission in wireless sensor networks, IEEE Trans. Netw. Sci. Eng. 9 (5) (2022) 3272–3281.
[11]
Vinayakumar R., Soman K., Poornachandran P., A comparative analysis of deep learning approaches for network intrusion detection systems (N-IDSs): deep learning for N-IDSs, Int. J. Digit. Crime Forens. (IJDCF) 11 (3) (2019) 65–89.
[12]
Imrana Y., Xiang Y., Ali L., Abdul-Rauf Z., A bidirectional LSTM deep learning approach for intrusion detection, Expert Syst. Appl. 185 (2021).
[13]
Assis M.V., Carvalho L.F., Lloret J., Proença M.L. Jr., A GRU deep learning system against attacks in software defined networks, J. Netw. Comput. Appl. 177 (2021).
[14]
Liang J., Meyerson E., Hodjat B., Fink D., Mutch K., Miikkulainen R., Evolutionary neural automl for deep learning, in: Proceedings of the Genetic and Evolutionary Computation Conference, 2019, pp. 401–409.
[15]
Liu Y., Sun Y., Xue B., Zhang M., Yen G.G., Tan K.C., A survey on evolutionary neural architecture search, IEEE Trans. Neural Netw. Learn. Syst. 34 (2) (2023) 550–570.
[16]
Elsken T., Metzen J.H., Hutter F., Neural architecture search: A survey, J. Mach. Learn. Res. 20 (1) (2019) 1997–2017.
[17]
Wang E.K., Xu S.P., Chen C.-M., Kumar N., Neural-architecture-search-based multiobjective cognitive automation system, IEEE Syst. J. 15 (2) (2021) 2918–2925.
[18]
Metaxiotis K., Liagkouras K., Multiobjective evolutionary algorithms for portfolio management: A comprehensive literature review, Expert Syst. Appl. 39 (14) (2012) 11685–11698.
[19]
Zhang Q., Liu W., Li H., The performance of a new version of MOEA/D on CEC09 unconstrained MOP test instances, in: 2009 IEEE Congress on Evolutionary Computation, 2009, pp. 203–208.
[20]
Chawla N.V., Bowyer K.W., Hall L.O., Kegelmeyer W.P., SMOTE: synthetic minority over-sampling technique, J. Artificial Intelligence Res. 16 (2002) 321–357.
[21]
Moustafa N., Slay J., UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set), in: 2015 Military Communications and Information Systems Conference (MilCIS), 2015, pp. 1–6.
[22]
Sharafaldin I., Lashkari A.H., Ghorbani A.A., Toward generating a new intrusion detection dataset and intrusion traffic characterization, in: ICISSp, 1, 2018, pp. 108–116.
[23]
Gümüşbaş D., Yıldırım T., Genovese A., Scotti F., A comprehensive survey of databases and deep learning methods for cybersecurity and intrusion detection systems, IEEE Syst. J. 15 (2) (2021) 1717–1731.
[24]
Kuang F., Xu W., Zhang S., A novel hybrid KPCA and SVM with GA model for intrusion detection, Appl. Soft Comput. 18 (2014) 178–184.
[25]
Tao Z., Huiling L., Wenwen W., Xia Y., GA-SVM based feature selection and parameter optimization in hospitalization expense modeling, Appl. Soft Comput. 75 (2019) 323–332.
[26]
Eesa A.S., Orman Z., Brifcani A.M.A., A novel feature-selection approach based on the cuttlefish optimization algorithm for intrusion detection systems, Expert Syst. Appl. 42 (5) (2015) 2670–2679.
[27]
Wei W., Chen S., Lin Q., Ji J., Chen J., A multi-objective immune algorithm for intrusion feature selection, Appl. Soft Comput. 95 (2020).
[28]
Injadat M., Moubayed A., Nassif A.B., Shami A., Multi-stage optimized machine learning framework for network intrusion detection, IEEE Trans. Netw. Serv. Manag. 18 (2) (2020) 1803–1816.
[29]
Muhammad G., Hossain M.S., Garg S., Stacked autoencoder-based intrusion detection system to combat financial fraudulent, IEEE Internet Things J 10 (3) (2023) 2071–2078.
[30]
Yang H., Zeng R., Xu G., Zhang L., A network security situation assessment method based on adversarial deep learning, Appl. Soft Comput. 102 (2021).
[31]
Tavallaee M., Bagheri E., Lu W., Ghorbani A.A., A detailed analysis of the KDD cup 99 data set, in: 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications, 2009, pp. 1–6.
[32]
Sharafaldin I., Lashkari A.H., Hakak S., Ghorbani A.A., Developing realistic distributed denial of service (ddos) attack dataset and taxonomy, in: 2019 International Carnahan Conference on Security Technology, ICCST, 2019, pp. 1–8.
[33]
de Araujo-Filho P.F., Kaddoum G., Campelo D.R., Santos A.G., Macêdo D., Zanchettin C., Intrusion detection for cyber–physical systems using generative adversarial networks in fog environment, IEEE Internet Things J. 8 (8) (2020) 6247–6256.
[34]
Jabbar M.A., Aluvalu R., Reddy S S.S., RFAODE: A novel ensemble intrusion detection system, Procedia Comput. Sci. 115 (2017) 226–234.
[35]
Andresini G., Appice A., Malerba D., Nearest cluster-based intrusion detection through convolutional neural networks, Knowl.-Based Syst. 216 (2021).
[36]
Sharafaldin I., Lashkari A.H., Ghorbani A.A., Toward generating a new intrusion detection dataset and intrusion traffic characterization, ICISSp (2018) 108–116.
[37]
Qin G., Chen Y., Lin Y.-X., Anomaly detection using LSTM in IP networks, in: 2018 Sixth International Conference on Advanced Cloud and Big Data, 2018, pp. 334–337.
[38]
He X., Zhao K., Chu X., AutoML: A survey of the state-of-the-art, Knowl.-Based Syst. 212 (2021).
[39]
Wistuba M., Rawat A., Pedapati T., A survey on neural architecture search, 2019, arXiv preprint arXiv:1905.01392.
[40]
Baker B., Gupta O., Naik N., Raskar R., Designing neural network architectures using reinforcement learning, 2016, arXiv preprint arXiv:1611.02167.
[41]
He K., Zhang X., Ren S., Sun J., Deep residual learning for image recognition, in: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2016, pp. 770–778.
[42]
Zoph B., Le Q.V., Neural architecture search with reinforcement learning, 2016, arXiv preprint arXiv:1611.01578.
[43]
Xie S., Zheng H., Liu C., Lin L., SNAS: stochastic neural architecture search, 2018, arXiv preprint arXiv:1812.09926.
[44]
Schorn C., Elsken T., Vogel S., Runge A., Guntoro A., Ascheid G., Automated design of error-resilient and hardware-efficient deep neural networks, Neural Comput. Appl. 32 (24) (2020) 18327–18345.
[45]
Deb K., Pratap A., Agarwal S., Meyarivan T., A fast and elitist multiobjective genetic algorithm: NSGA-II, IEEE Trans. Evol. Comput. 6 (2) (2002) 182–197.
[46]
Liu C., Zoph B., Neumann M., Shlens J., Hua W., Li L.-J., Fei-Fei L., Yuille A., Huang J., Murphy K., Progressive neural architecture search, in: Proceedings of the European Conference on Computer Vision, ECCV, 2018, pp. 19–34.
[47]
Khan I.A., Moustafa N., Pi D., Haider W., Li B., Jolfaei A., An enhanced multi-stage deep learning framework for detecting malicious activities from autonomous vehicles, IEEE Trans. Intell. Transp. Syst. (2021) 1–10.
[48]
Alkadi O., Moustafa N., Turnbull B., Choo K.-K.R., A deep blockchain framework-enabled collaborative intrusion detection for protecting IoT and cloud networks, IEEE Internet Things J. 8 (12) (2020) 9463–9472.
[49]
Vaswani A., Shazeer N., Parmar N., Uszkoreit J., Jones L., Gomez A.N., Kaiser Ł., Polosukhin I., Attention is all you need, Adv. Neural Inf. Process. Syst. (2017) 5998–6008.
[50]
Joseph F.J.J., Nonsiri S., Monsakul A., Keras and TensorFlow: A hands-on experience, in: Advanced Deep Learning for Engineers and Scientists, 2021, pp. 85–111.
[51]
Kene S.G., Theng D.P., A review on intrusion detection techniques for cloud computing and security challenges, in: 2015 2nd International Conference on Electronics and Communication Systems, ICECS, 2015, pp. 227–232.
[52]
Joshua., Langmore I., Tran D., Brevdo E., Vasudevan S., Moore D., Patton B., Alemi A., Hoffman M., Rif., TensorFlow distributions, 2017, arXiv pre-print server, 2017-11-28.
[53]
Auger A., Bader J., Brockhoff D., Zitzler E., Theory of the hypervolume indicator, in: Proceedings of the Tenth ACM SIGEVO Workshop on Foundations of Genetic Algorithms, 2009, pp. 87–102.
[54]
Mani I., Zhang I., kNN approach to unbalanced data distributions: a case study involving information extraction, Proceedings of Workshop on Learning from Imbalanced Datasets. 126 (2003) 1–7.
[55]
Tomek I., An experiment with the edited nearest-nieghbor rule, 1976.
[56]
He H., Bai Y., Garcia E.A., Li S., ADASYN: Adaptive synthetic sampling approach for imbalanced learning, in: 2008 IEEE International Joint Conference on Neural Networks (IEEE World Congress on Computational Intelligence), 2008, pp. 1322–1328.
[57]
Wright R.E., Logistic regression, 1995.
[58]
Murphy K.P., Naive Bayes Classifiers, Vol. 18, University of British Columbia, 2006, pp. 1–8. (60).
[59]
Hastie T., Rosset S., Zhu J., Zou H., Multi-class adaboost, Statistics and Its Issnterface 2 (3) (2009) 349–360.
[60]
Franc V., Hlavác V., Multi-class support vector machine, in: 2002 International Conference on Pattern Recognition, Vol. 2, 2002, pp. 236–239.
[61]
Pal M., Random forest classifier for remote sensing classification, Int. J. Remote Sens. 26 (1) (2005) 217–222.
[62]
Gamage S., Samarabandu J., Deep learning methods in network intrusion detection: A survey and an objective comparison, J. Netw. Comput. Appl. 169 (2020).

Cited By

View all
  • (2024)A Novel Hybrid Feature Selection with Cascaded LSTMWireless Communications & Mobile Computing10.1155/2024/55224312024Online publication date: 1-Jan-2024
  • (2024)Suppressing Uncertainties in Degradation Estimation for Blind Super-ResolutionProceedings of the 32nd ACM International Conference on Multimedia10.1145/3664647.3681439(6374-6383)Online publication date: 28-Oct-2024

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Applied Soft Computing
Applied Soft Computing  Volume 139, Issue C
May 2023
422 pages

Publisher

Elsevier Science Publishers B. V.

Netherlands

Publication History

Published: 01 May 2023

Author Tags

  1. Intrusion detection system
  2. Neural architecture search
  3. Multi-objective evolutionary algorithm

Qualifiers

  • Research-article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 20 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2024)A Novel Hybrid Feature Selection with Cascaded LSTMWireless Communications & Mobile Computing10.1155/2024/55224312024Online publication date: 1-Jan-2024
  • (2024)Suppressing Uncertainties in Degradation Estimation for Blind Super-ResolutionProceedings of the 32nd ACM International Conference on Multimedia10.1145/3664647.3681439(6374-6383)Online publication date: 28-Oct-2024

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media