Hierarchical LSTM-Based Network Intrusion Detection System Using Hybrid Classification

被引:7
|
作者
Han, Jonghoo [1 ]
Pak, Wooguil [1 ]
机构
[1] Yeungnam Univ, Dept Informat & Commun Engn, Gyongsan 38541, South Korea
来源
APPLIED SCIENCES-BASEL | 2023年 / 13卷 / 05期
基金
新加坡国家研究基金会;
关键词
hybrid classifier; network intrusion detection; hierarchical LSTM; dual LSTM; IDS;
D O I
10.3390/app13053089
中图分类号
O6 [化学];
学科分类号
0703 ;
摘要
Most existing network intrusion detection systems (NIDSs) perform intrusion detection using only a partial packet data of fixed size, but they suffer to increase the detection rate. In this study, in order to find the cause of a limited detection rate, accurate intrusion detection performance was analyzed by adjusting the amount of information used as features according to the size of the packet and length of the session. The results indicate that the total packet data and all packets in the session should be used for the maximum detection rate. However, existing NIDS cannot be extended to use all packet data of each session because the model could be too large owing to the excessive number of features, hampering realistic training and classification speeds. Therefore, in this paper, we present a novel approach for the classifier of NIDSs. The proposed NIDS can effectively handle the entire packet information using the hierarchical long short-term memory and achieves higher detection accuracy than existing methods. Performance evaluation confirms that detection performance can be greatly improved compared to existing NIDSs that use only partial packet information. The proposed NIDS achieves a detection rate of 95.16% and 99.70% when the existing NIDS show the highest detection rate of 93.49% and 98.31% based on the F1-score using two datasets. The proposed method can improve the limitations of existing NIDS and safeguard the network from malicious users by utilizing information on the entire packet.
引用
收藏
页数:22
相关论文
共 50 条
  • [41] Ensuring Secure Transmission in VANET: Optimal Clustering and Improved LSTM-Based Intrusion Detection
    Dalal, Kusum
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2025, 38 (04)
  • [42] Network Intrusion Detection Combined Hybrid Sampling With Deep Hierarchical Network
    Jiang, Kaiyuan
    Wang, Wenya
    Wang, Aili
    Wu, Haibin
    IEEE ACCESS, 2020, 8 : 32464 - 32476
  • [43] A two-stage hybrid classification technique for network intrusion detection system
    Jamal Hussain
    Samuel Lalmuanawma
    Lalrinfela Chhakchhuak
    International Journal of Computational Intelligence Systems, 2016, 9 : 863 - 875
  • [44] A two-stage hybrid classification technique for network intrusion detection system
    Hussain, Jamal
    Lalmuanawma, Samuel
    Chhakchhuak, Lalrinfela
    INTERNATIONAL JOURNAL OF COMPUTATIONAL INTELLIGENCE SYSTEMS, 2016, 9 (05) : 863 - 875
  • [45] A Hypertuned Lightweight and Scalable LSTM Model for Hybrid Network Intrusion Detection
    Bibi, Aysha
    Sampedro, Gabriel Avelino
    Almadhor, Ahmad
    Javed, Abdul Rehman
    Kim, Tai-hoon
    TECHNOLOGIES, 2023, 11 (05)
  • [46] High Performance Network Intrusion Detection System Using Two-Stage LSTM and Incremental Created Hybrid Features
    Han, Jonghoo
    Pak, Wooguil
    ELECTRONICS, 2023, 12 (04)
  • [47] A Hybrid Classification Approach for Intrusion Detection in IoT Network
    Choudhary, Sarika
    Kesswani, Nishtha
    JOURNAL OF SCIENTIFIC & INDUSTRIAL RESEARCH, 2021, 80 (09): : 809 - 816
  • [48] A hybrid CNN+LSTM-based intrusion detection system for industrial IoT networks
    Altunay, Hakan Can
    Albayrak, Zafer
    ENGINEERING SCIENCE AND TECHNOLOGY-AN INTERNATIONAL JOURNAL-JESTECH, 2023, 38
  • [49] Multi-class Intrusion Detection System in SDN Based on Hybrid LSTM Model
    Chen, Jue
    Cui, Meng
    FRONTIERS OF NETWORKING TECHNOLOGIES, CCF CHINANET 2023, 2024, 1988 : 99 - 111
  • [50] Hunting for Insider Threats Using LSTM-Based Anomaly Detection
    Villarreal-Vasquez, Miguel
    Modelo-Howard, Gaspar
    Dube, Simant
    Bhargava, Bharat
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2023, 20 (01) : 451 - 462