Design and Implementation of Intrusion Detection System using Convolutional Neural Network for DoS Detection

被引:25
作者
Nguyen, Sinh-Ngoc [1 ]
Nguyen, Van-Quyet [1 ]
Choi, Jintae [1 ]
Kim, Kyungbaek [1 ]
机构
[1] Chonnam Natl Univ, Dept Comp Engn, Gwangju, South Korea
来源
2ND INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND SOFT COMPUTING (ICMLSC 2018) | 2015年
基金
新加坡国家研究基金会;
关键词
Convolutional Neural Network; Machine Learning; Dos Detection; Network Traffic Formalization;
D O I
10.1145/3184066.3184089
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Nowadays, network is one of the essential parts of life, and lots of primary activities are performed by using the network. Also, network security plays an important role in the administrator and monitors the operation of the system. The intrusion detection system (IDS) is a crucial module to detect and defend against the malicious traffics before the system is affected. This system can extract the information from the network system and quickly indicate the reaction which provides real-time protection for the protected system. However, detecting malicious traffics is very complicating because of their large quantity and variants. Also, the accuracy of detection and execution time are the challenges of some detection methods. In this paper, we propose an IDS platform based on convolutional neural network (CNN) called IDS-CNN to detect DoS attack. Experimental results show that our CNN based DoS detection obtains high accuracy at most 99.87%. Moreover, comparisons with other machine learning techniques including KNN, SVM, and Naive Bayes demonstrate that our proposed method outperforms traditional ones.
引用
收藏
页码:34 / 38
页数:5
相关论文
共 10 条
[1]   Security and Privacy in Social Networks [J].
Ahn, Gail-Joon ;
Shehab, Mohamed ;
Squicciarini, Anna .
IEEE INTERNET COMPUTING, 2011, 15 (03) :10-12
[2]  
Benferhat S. T. K. a. A. M., 2008, COMP SOFTW APPL 32 A
[3]  
Deng C. a. H. Q., 2016, COMM EL SYST ICCES I
[4]  
Desai A. S. a. D. P. G, 2016, ADV EL COMM COMP TEC
[5]   Anomaly-based network intrusion detection: Techniques, systems and challenges [J].
Garcia-Teodoro, P. ;
Diaz-Verdejo, J. ;
Macia-Fernandez, G. ;
Vazquez, E. .
COMPUTERS & SECURITY, 2009, 28 (1-2) :18-28
[6]   DDoS in the IoT: Mirai and Other Botnets [J].
Kolias, Constantinos ;
Kambourakis, Georgios ;
Stavrou, Angelos ;
Voas, Jeffrey .
COMPUTER, 2017, 50 (07) :80-84
[7]  
Kulkarni G. e. a., 2012, TEL SYST SERV APPL T, V2012
[8]  
Lei J. Z. a. A. G., 2004, COMM NETW SERV RES 2
[9]  
Mukkamala S., 2005, Enhancing Computer Security with Smart Technology, P125, DOI DOI 10.1201/9780849330452.CH6
[10]   A Survey of Techniques for Internet Traffic Classification using Machine Learning [J].
Nguyen, Thuy T. T. ;
Armitage, Grenville .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2008, 10 (04) :56-76