CSK-CNN: Network Intrusion Detection Model Based on Two-Layer Convolution Neural Network for Handling Imbalanced Dataset

被引:7
|
作者
Song, Jiaming [1 ]
Wang, Xiaojuan [2 ]
He, Mingshu [2 ]
Jin, Lei [3 ]
机构
[1] China Acad Informat & Commun Technol, Inst Cloud Comp & Big Data, Beijing 100191, Peoples R China
[2] Beijing Univ Posts & Telecommun, Sch Elect Engn, Beijing 100876, Peoples R China
[3] Beijing Univ Posts & Telecommun, Sch Comp Sci, Beijing 100876, Peoples R China
基金
中国国家自然科学基金;
关键词
network intrusion detection; class imbalance; convolutional neural network; Cluster-SMOTE;
D O I
10.3390/info14020130
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In computer networks, Network Intrusion Detection System (NIDS) plays a very important role in identifying intrusion behaviors. NIDS can identify abnormal behaviors by analyzing network traffic. However, the performance of classifier is not very good in identifying abnormal traffic for minority classes. In order to improve the detection rate on class imbalanced dataset, we propose a network intrusion detection model based on two-layer CNN and Cluster-SMOTE + K-means algorithm (CSK-CNN) to process imbalanced dataset. CSK combines the cluster based Synthetic Minority Over Sampling Technique (Cluster-SMOTE) and K-means based under sampling algorithm. Through the two-layer network, abnormal traffic can not only be identified, but also be classified into specific attack types. This paper has been verified on UNSW-NB15 dataset and CICIDS2017 dataset, and the performance of the proposed model has been evaluated using such indicators as accuracy, recall, precision, F1-score, ROC curve, AUC value, training time and testing time. The experiment shows that the proposed CSK-CNN in this paper is obviously superior to other comparison algorithms in terms of network intrusion detection performance, and is suitable for deployment in the real network environment.
引用
收藏
页数:17
相关论文
共 50 条
  • [41] CNN-LSTM: Hybrid Deep Neural Network for Network Intrusion Detection System
    Halbouni, Asmaa
    Gunawan, Teddy Surya
    Habaebi, Mohamed Hadi
    Halbouni, Murad
    Kartiwi, Mira
    Ahmad, Robiah
    IEEE ACCESS, 2022, 10 : 99837 - 99849
  • [42] A multiscale intrusion detection system based on pyramid depthwise separable convolution neural network
    He, Jiaxing
    Wang, Xiaodan
    Song, Yafei
    Xiang, Qian
    NEUROCOMPUTING, 2023, 530 : 48 - 59
  • [43] Wavelet neural network model for network intrusion detection system
    Hamid Y.
    Shah F.A.
    Sugumaran M.
    International Journal of Information Technology, 2019, 11 (2) : 251 - 263
  • [44] A TWO-LAYER RECURRENT NEURAL NETWORK BASED APPROACH FOR OVERLAY MULTICAST
    Liu Shidong Zhang Shunyi Zhou Jinquan Qiu Gong’an (Nanjing University of Posts and Telecommunications
    Journal of Electronics(China), 2008, (02) : 209 - 217
  • [45] Improved convolution neural network integrating attention based deep sparse auto encoder for network intrusion detection
    Geng, Zhiqiang
    Li, Xueming
    Ma, Bo
    Han, Yongming
    Applied Intelligence, 2025, 55 (02)
  • [46] Network Intrusion Detection Method Based on CNN-BiLSTM-Attention Model
    Dai, Wei
    Li, Xinhui
    Ji, Wenxin
    He, Sicheng
    IEEE ACCESS, 2024, 12 : 53099 - 53111
  • [47] Immunization dynamics on a two-layer network model
    Jo, HH
    Baek, SK
    Moon, HT
    PHYSICA A-STATISTICAL MECHANICS AND ITS APPLICATIONS, 2006, 361 (02) : 534 - 542
  • [48] RESEARCH ON NETWORK INTRUSION DETECTION MODEL BASED ON GA-RBF NEURAL NETWORK
    Liu Zhi-Guo
    Zhang Hai-Chun
    Duan Xian-Hui
    PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER THEORY AND ENGINEERING (ICACTE 2009), VOLS 1 AND 2, 2009, : 1015 - 1019
  • [49] Generalization in a two-layer neural network with multiple outputs
    Kang, KJ
    Oh, JH
    Kwon, C
    Park, Y
    PHYSICAL REVIEW E, 1996, 54 (02): : 1811 - 1815
  • [50] Propagating interfaces in a two-layer bistable neural network
    Kazantsev, V. B.
    Nekorkin, V. I.
    Morfu, S.
    Bilbault, J. M.
    Marquié, P.
    INTERNATIONAL JOURNAL OF BIFURCATION AND CHAOS, 2006, 16 (03): : 589 - 600