[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1109/SMC.2018.00719guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
research-article

Comparison of Machine Learning Algorithms for Detection of Network Intrusions

Published: 07 October 2018 Publication History

Abstract

Detecting, analyzing, and defending against network intrusions is an important topic in cyber security. Various detection systems have been designed using machine learning techniques that help detect malicious intentions of network users. We apply Recurrent Neural Networks (RNNs) and Broad Learning System (BLS) machine learning algorithms to classify known network intrusions. The developed models are trained and tested using the NSL-KDD dataset containing information about both intrusion and regular network connections. The algorithms are used to classify various types of intrusion classes and regular data and are compared based on accuracy and F-Score. Comparison results indicate that the BLS algorithm shows comparable performance with shorter training time.

References

[1]
KDD Cup 1999 Data [Online]. Available: http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html. Accessed: July 18, 2018.
[2]
NSL-KDD Data Set [Online]. Available: https://web.archive.org/web/20150205070216/http://nsl.cs.unb.calNSL-KDD/. Accessed: July 18, 2018.
[3]
R. P. Lippmann, D. J. Fried, I. Graf, J. W. Haines, K. R. Kendall, D. Mc-Clung, D. Weber, S. E. Webster, D. Wyschogrod, R. K. Cunningham, and M. A. Zissman, “Evaluating intrusion detection systems: The 1998 DARPA off-line intrusion detection evaluation,” in Proc. DARPA Inform. Survivability Conf. and Expo. (DISCEX‘ 00), Hilton Head, SC, USA, Jan. 2000, pp. 12–26.
[4]
S. J. Stolfo, W. Fan, W. Lee, A. Prodromidis, and P. K. Chan, “Cost-based modeling for fraud and intrusion detection: Results from the JAM project,” in Proc. DARPA Inform. Survivability Conf. and Expo. (DISCEX‘ 00), Hilton Head, SC, USA, Jan. 2000, pp. 130–144.
[5]
J. McHugh, “Testing intrusion detection systems: a critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln Laboratory,” ACM Trans. Inform. Syst. Security, vol. 3, no. 4, pp. 262–294, Nov. 2000.
[6]
H. G. Kayack, A. N. Zincir-Heywood, and M. I. Heywood, “Selecting features for intrusion detection: a feature relevance analysis on KDD 99 intrusion detection datasets,” in Proc. 3rd Annu. Conf. Privacy Security and Trust (PST), St. Andrews, NB, Canada, Oct. 2005, pp. 1–6.
[7]
M. Tavallaee, E. Bagheri, W. Lu, and A. A. Ghorbani, “A detailed analysis of the KDD CUP 99 data set,” in IEEE Symp. Comput. Intell. Security and Defense Appl. (CISDA), Ottawa, ON, Canada, July 2009, pp. 1–6.
[8]
A. A. Olusola, A. S. Oladele, and D. O. Abosede, “Analysis of KDD ‘99 intrusion detection dataset for selection of relevance features,” in Proc. World Congress Eng. Comput. Sci. San Francisco, CA, USA, Oct. 2010, pp. 162–168.
[9]
J. Zhang and M. Zulkernine, “A hybrid network intrusion detection technique using random forests,” in Proc. First Int. Conf. Availability, Rel. Security, Vienna, Austria, Apr. 2006, pp. 262–269.
[10]
T. A. Tang, L. Mhamdi, D. McLernon, S. A. R. Zaidi, and M. Ghogho, “Deep learning approach for network intrusion detection in software defined networking,” in Proc. Wireless Netw. Mobile Commun. (WINCOM), Fez, Morocco, Oct. 2016, pp. 258–263.
[11]
C.-L. Yin, Y.-F. Zhu, J.-L. Fei, and X.-Z. He, “A deep learning approach for intrusion detection using recurrent neural networks,” IEEE Access, vol. 5, pp. 21954–21961, Nov. 2017.
[12]
N. Shone, T. N. Ngoc, V. D. Phai, and Q. Shi, “A deep learning approach to network intrusion detection,” IEEE Trans. Emerging Topics Comput. Intell., vol. 2, no. 1, pp. 41–50, Feb. 2018.
[13]
L. Li, Y. Yu, S. Bai, Y. Hou, and X. Chen, “An effective two-step intrusion detection approach based on binary classification and k NN,” IEEE Access, vol. 6, pp. 12060–12073, Mar. 2018.
[14]
J. R. Quinlan, C4.5: Programs for Machine Learning. San Francisco, CA, USA: Morgan Kaufmann Publishers, 1993.
[15]
C. L. P. Chen and Z. Liu, “Broad learning system: an effective and efficient incremental learning system without the need for deep architecture,” IEEE Trans. Neural Netw. Learn. Syst., vol. 29, no. 1, pp. 10–24, Jan. 2018.
[16]
The MNIST Database of Handwritten Digits [Online]. Available: http://yann.lecun.com/exdb/mnist/. Accessed: July 18, 2018.
[17]
The NORB dataset, v1.0 [Online]. Available: https://cs.nyu.cdu/~ylclabdatalnorb-v1.0/. Accessed: July 18, 2018.
[18]
S. Hochreiter and J. Schmidhuber, “Long short-term memory,” Neural Comput., vol. 9, no. 8, pp. 1735–1780, Oct. 1997.
[19]
R. J. Williams, “Simple statistical gradient-following algorithms for connectionist reinforcement learning,” Mach. Learn., vol. 8, no. 3, pp. 229–256, May 1992.
[20]
A. Graves and J. Schmidhuber, “Framewise phoneme classification with bidirectional LSTM and other neural network architectures,” Neural Netw., vol. 18, no. 5–6, pp. 602–610, July/Aug. 2005.
[21]
A. Graves, N. Jaitly, and A. Mohamed, “Hybrid speech recognition with deep bidirectional LSTM,” in Proc. IEEE Workshop Autom. Speech Recognition Understanding, Olomouc, Czech Republic, Dec. 2013, pp. 273–278.
[22]
K. Greff, R. K. Srivastava, J. Koutnik, B. R. Steunebrink, and J. Schmid-huber, “LSTM: a search space odyssey,” IEEE Trans. Neural Netw. Learn. Syst., vol. 28, no. 10, pp. 2222–2232, Oct. 2017.
[23]
H. Sak, A. W. Senior, and F. Beaufays, “Long short-term memory recurrent neural network architectures for large scale acoustic modeling,” in Proc. Annual Conf. Int. Speech Commun. Assoc. (INTERSPEECH), Singapore, Sept. 2014, pp. 338–342.
[24]
PyTorch [Online]. Available: https://pytorch.org/docs/stable/nn.html/. Accessed: July 18, 2018.
[25]
K. Cho, B. Merrienboer, C. Gulcehre, D. Bahdanau, F. Bougares, H. Schwenk, and Y. Bengio, “Learning phrase representations using RNN encoder-decoder for statistical machine translations,” in Proc. 2014 Conf. Empirical Methods Natural Language Process. (EMNLP), Doha, Qatar, Oct. 2014, pp. 1724–1734.
[26]
K. Cho, B. Merrienboer, D. Bahdanau, and Y. Bengio, “On the properties of neural machine translation: encoder-decoder approaches,” in Proc. 8th Workshop Syntax, Semantics Structure in Statistical Transl. (SSST-8), Doha, Qatar, Oct. 2014, pp. 103–111.
[27]
M. Schuster and K. K. Paliwal, “Bidirectional recurrent neural networks,” IEEE Trans. Signal Process., vol. 45, no. 11, pp. 2673–2681, Nov. 1997.
[28]
Pandas [Online]. Available: https://pandas.pydata.org/. Accessed: July 18, 2018.
[29]
C. M. Bishop, Pattern Recognition and Machine Learning. Secaucus, NJ, USA: Springer-Verlag, 2006, p. 115.
[30]
D. P. Kingma and J. Ba, “Adam: a method for stochastic optimization,” in Proc. 3rd Int. Conf. Learn. Representations, San Diego, CA, USA, May 2015, pp. 1–15.
[31]
Broadlearning [Online]. Available: http://www.broadlearning.ai/. Accessed: July 18, 2018.

Cited By

View all
  • (2024)Intrusion Detection Using Convolutional Neural Network: A Color Mapping Approach on NSL-KDD DatasetProceedings of the 11th International Conference on Networking, Systems, and Security10.1145/3704522.3704541(154-162)Online publication date: 19-Dec-2024
  • (2024)A voting gray wolf optimizer-based ensemble learning models for intrusion detection in the Internet of ThingsInternational Journal of Information Security10.1007/s10207-023-00803-x23:3(1557-1581)Online publication date: 1-Jun-2024
  • (2022)Anomaly Detection based on Broad Leaning System for Rolling Element Bearing Fault DiagnosisAdjunct Proceedings of the 2022 ACM International Joint Conference on Pervasive and Ubiquitous Computing and the 2022 ACM International Symposium on Wearable Computers10.1145/3544793.3560408(462-467)Online publication date: 11-Sep-2022
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Guide Proceedings
2018 IEEE International Conference on Systems, Man, and Cybernetics (SMC)
Oct 2018
4300 pages

Publisher

IEEE Press

Publication History

Published: 07 October 2018

Qualifiers

  • Research-article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 13 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2024)Intrusion Detection Using Convolutional Neural Network: A Color Mapping Approach on NSL-KDD DatasetProceedings of the 11th International Conference on Networking, Systems, and Security10.1145/3704522.3704541(154-162)Online publication date: 19-Dec-2024
  • (2024)A voting gray wolf optimizer-based ensemble learning models for intrusion detection in the Internet of ThingsInternational Journal of Information Security10.1007/s10207-023-00803-x23:3(1557-1581)Online publication date: 1-Jun-2024
  • (2022)Anomaly Detection based on Broad Leaning System for Rolling Element Bearing Fault DiagnosisAdjunct Proceedings of the 2022 ACM International Joint Conference on Pervasive and Ubiquitous Computing and the 2022 ACM International Symposium on Wearable Computers10.1145/3544793.3560408(462-467)Online publication date: 11-Sep-2022
  • (2022)A new machine learning model based on the broad learning system and waveletsEngineering Applications of Artificial Intelligence10.1016/j.engappai.2022.104886112:COnline publication date: 1-Jun-2022

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media