Applying Convolutional Neural Network for Network Intrusion Detection

被引:0
|
作者
Vinayakumar, R. [1 ]
Soman, K. P. [1 ]
Poornachandran, Prabaharan [2 ]
机构
[1] Amrita Sch Engn, Ctr Computat Engn & Networking CEN, Coimbatore, Tamil Nadu, India
[2] Amrita Univ, Amritapuri Amrita Vishwa Vidyapeetham, Ctr Cyber Secur Syst & Networks, Amrita Sch Engn, Coimbatore, Tamil Nadu, India
关键词
deep learning: convolutional neural network (CNN); recurrent neural network (RNN) long short-term memory (LSTM); gated recurrent unit (GRU); intrusion detection (ID) data sets: KDDCup 99; NSL-KDD;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recently, Convolutional neural network (CNN) architectures in deep learning have achieved significant results in the field of computer vision. To transform this performance toward the task of intrusion detection (ID) in cyber security, this paper models network traffic as time-series, particularly transmission control protocol / internet protocol (TCP/IP) packets in a predefined time range with supervised learning methods such as multi-layer perceptron (MLP), CNN, CNN-recurrent neural network (CNN-RNN), CNN-long short-term memory (CNN-LSTM) and CNN-gated recurrent unit (GRU), using millions of known good and bad network connections. To measure the efficacy of these approaches we evaluate on the most important synthetic ID data set such as KDDCup 99. To select the optimal network architecture, comprehensive analysis of various MLP, CNN, CNN-RNN, CNN-LSTM and CNN-GRU with its topologies, network parameters and network structures is used. The models in each experiment are run up to 1000 epochs with learning rate in the range [0.01-05]. CNN and its variant architectures have significantly performed well in comparison to the classical machine learning classifiers. This is mainly due to the reason that CNN have capability to extract high level feature representations that represents the abstract form of low level feature sets of network traffic connections.
引用
收藏
页码:1222 / 1228
页数:7
相关论文
共 50 条
  • [1] Applying neural network to intrusion detection
    Zhou, Rigui
    [J]. 2007 INTERNATIONAL SYMPOSIUM ON COMPUTER SCIENCE & TECHNOLOGY, PROCEEDINGS, 2007, : 273 - 276
  • [2] APPLYING A NEURAL NETWORK ENSEMBLE TO INTRUSION DETECTION
    Ludwig, Simone A.
    [J]. JOURNAL OF ARTIFICIAL INTELLIGENCE AND SOFT COMPUTING RESEARCH, 2019, 9 (03) : 177 - 188
  • [3] A Network Intrusion Detection Model Based on Convolutional Neural Network
    Tao, Wenwei
    Zhang, Wenzhe
    Hu, Chao
    Hu, Chaohui
    [J]. SECURITY WITH INTELLIGENT COMPUTING AND BIG-DATA SERVICES, 2020, 895 : 771 - 783
  • [4] A network intrusion detection system based on convolutional neural network
    Wang, Hui
    Cao, Zijian
    Hong, Bo
    [J]. JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2020, 38 (06) : 7623 - 7637
  • [5] Applying Convolutional Neural Network for Malware Detection
    Chen, Chia-Mei
    Wang, Shi-Hao
    Wen, Dan-Wei
    Lai, Gu-Hsin
    Sun, Ming-Kung
    [J]. 2019 IEEE 10TH INTERNATIONAL CONFERENCE ON AWARENESS SCIENCE AND TECHNOLOGY (ICAST 2019), 2019, : 490 - 494
  • [6] Network Intrusion Detection Technology Based on Convolutional Neural Network and BiGRU
    Cao, Bo
    Li, Chenghai
    Song, Yafei
    Fan, Xiaoshi
    [J]. COMPUTATIONAL INTELLIGENCE AND NEUROSCIENCE, 2022, 2022
  • [7] CNID: Research of Network Intrusion Detection Based on Convolutional Neural Network
    Liu, Guojie
    Zhang, Jianbiao
    [J]. DISCRETE DYNAMICS IN NATURE AND SOCIETY, 2020, 2020
  • [8] Wireless Network Intrusion Detection Based on Improved Convolutional Neural Network
    Yang, Hongyu
    Wang, Fengyan
    [J]. IEEE ACCESS, 2019, 7 : 64366 - 64374
  • [9] Genetic convolutional neural network for intrusion detection systems
    Nguyen, Minh Tuan
    Kim, Kiseon
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2020, 113 : 418 - 427
  • [10] An Intrusion Detection System Based on Convolutional Neural Network
    Liu, Pengju
    [J]. PROCEEDINGS OF 2019 11TH INTERNATIONAL CONFERENCE ON COMPUTER AND AUTOMATION ENGINEERING (ICCAE 2019), 2019, : 62 - 67