Deep Stacking Network for Intrusion Detection

被引:25
|
作者
Tang, Yifan [1 ]
Gu, Lize [1 ]
Wang, Leiting [1 ]
机构
[1] Beijing Univ Posts & Telecommun, Sch Cyberspace Secur, Beijing 100876, Peoples R China
关键词
intrusion detection; ensemble learning; decision tree; deep neural network; deep stacking network; nsl-kdd; FEATURE-SELECTION; MACHINE; MODEL;
D O I
10.3390/s22010025
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
Preventing network intrusion is the essential requirement of network security. In recent years, people have conducted a lot of research on network intrusion detection systems. However, with the increasing number of advanced threat attacks, traditional intrusion detection mechanisms have defects and it is still indispensable to design a powerful intrusion detection system. This paper researches the NSL-KDD data set and analyzes the latest developments and existing problems in the field of intrusion detection technology. For unbalanced distribution and feature redundancy of the data set used for training, some training samples are under-sampling and feature selection processing. To improve the detection effect, a Deep Stacking Network model is proposed, which combines the classification results of multiple basic classifiers to improve the classification accuracy. In the experiment, we screened and compared the performance of various mainstream classifiers and found that the four models of the decision tree, k-nearest neighbors, deep neural network and random forests have outstanding detection performance and meet the needs of different classification effects. Among them, the classification accuracy of the decision tree reaches 86.1%. The classification effect of the Deeping Stacking Network, a fusion model composed of four classifiers, has been further improved and the accuracy reaches 86.8%. Compared with the intrusion detection system of other research papers, the proposed model effectively improves the detection performance and has made significant improvements in network intrusion detection.
引用
收藏
页数:17
相关论文
共 50 条
  • [31] A Deep Random Forest Model on Spark for Network Intrusion Detection
    Liu, Zhenpeng
    Su, Nan
    Qin, Yiwen
    Lu, Jiahuan
    Li, Xiaofei
    MOBILE INFORMATION SYSTEMS, 2020, 2020
  • [32] Intrusion detection method based on a deep convolutional neural network
    Zhang S.
    Xie X.
    Xu Y.
    Qinghua Daxue Xuebao/Journal of Tsinghua University, 2019, 59 (01): : 44 - 52
  • [33] Network Intrusion Detection Method Based on Relevance Deep Learning
    Jing, Li
    Bin, Wang
    2016 INTERNATIONAL CONFERENCE ON INTELLIGENT TRANSPORTATION, BIG DATA & SMART CITY (ICITBS), 2017, : 237 - 240
  • [34] An efficient network intrusion detection approach based on deep learning
    Wang, Zhihao
    Jiang, Dingde
    Huo, Liuwei
    Yang, Wei
    WIRELESS NETWORKS, 2021,
  • [35] A Deep Learning Model for Network Intrusion Detection with Imbalanced Data
    Fu, Yanfang
    Du, Yishuai
    Cao, Zijian
    Li, Qiang
    Xiang, Wei
    ELECTRONICS, 2022, 11 (06)
  • [36] Network Anomaly Intrusion Detection Based on Deep Learning Approach
    Wang, Yung-Chung
    Houng, Yi-Chun
    Chen, Han-Xuan
    Tseng, Shu-Ming
    SENSORS, 2023, 23 (04)
  • [37] Deep Learning Model Transposition for Network Intrusion Detection Systems
    Figueiredo, Joao
    Serrao, Carlos
    de Almeida, Ana Maria
    ELECTRONICS, 2023, 12 (02)
  • [38] An Effective Deep Learning Based Scheme for Network Intrusion Detection
    Zhang, Hongpo
    Wu, Chase Q.
    Gao, Shan
    Wang, Zongmin
    Xu, Yuxiao
    Liu, Yongpeng
    2018 24TH INTERNATIONAL CONFERENCE ON PATTERN RECOGNITION (ICPR), 2018, : 682 - 687
  • [39] Intrusion Detection System for Dual Route Deep Capsule Network
    Yin S.
    Zhang X.
    Zuo L.
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2022, 59 (02): : 418 - 429
  • [40] Network intrusion detection: systematic evaluation using deep learning
    Kakade, Kiran Shrimant
    Nagalakshmi, T. J.
    Pradeep, S.
    Bapu, B. R. Tapas
    INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2024, 16 (02) : 190 - 201