A Deep Learning Approach to Network Intrusion Detection

被引:839
作者
Shone, Nathan [1 ]
Tran Nguyen Ngoc [2 ]
Vu Dinh Phai [2 ]
Shi, Qi [1 ]
机构
[1] Liverpool John Moores Univ, Dept Comp Sci, Liverpool L3 5UA, Merseyside, England
[2] Le Quy Don Tech Univ, Dept Informat Secur, Hanoi 100000, Vietnam
来源
IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTATIONAL INTELLIGENCE | 2018年 / 2卷 / 01期
关键词
Deep learning; anomaly detection; auto encoders; KDD; network security;
D O I
10.1109/TETCI.2017.2772792
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Network intrusion detection systems (NIDSs) play a crucial role in defending computer networks. However, there are concerns regarding the feasibility and sustainability of current approaches when faced with the demands of modern networks. More specifically, these concerns relate to the increasing levels of required human interaction and the decreasing levels of detection accuracy. This paper presents a novel deep learning technique for intrusion detection, which addresses these concerns. We detail our proposed nonsymmetric deep autoencoder (NDAE) for unsupervised feature learning. Furthermore, we also propose our novel deep learning classification model constructed using stacked NDAEs. Our proposed classifier has been implemented in graphics processing unit (GPU)-enabled TensorFlow and evaluated using the benchmark KDD Cup '99 and NSL-KDD datasets. Promising results have been obtained from our model thus far, demonstrating improvements over existing approaches and the strong potential for use in modern NIDSs.
引用
收藏
页码:41 / 50
页数:10
相关论文
共 38 条
  • [1] Alrawashdeh K, 2016, 2016 15TH IEEE INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND APPLICATIONS (ICMLA 2016), P195, DOI [10.1109/ICMLA.2016.167, 10.1109/ICMLA.2016.0040]
  • [2] Anbar Mohammed, 2016, 2016 14th Annual Conference on Privacy, Security and Trust (PST), P282, DOI 10.1109/PST.2016.7906975
  • [3] [Anonymous], 2000, P DARPA INFORM SURVI, DOI [DOI 10.1109/DISCEX.2000.821515, 10.1109/DISCEX.2000.821515]
  • [4] [Anonymous], 2016, PROC 9 EAI INT C BIO, DOI DOI 10.4108/EAI.3-12-2015.2262516
  • [5] Aung YY, 2017, 2017 18TH IEEE/ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING AND PARALLEL/DISTRIBUTED COMPUTING (SNDP 2017), P127, DOI 10.1109/SNPD.2017.8022711
  • [6] Bellekens X. J. A., 2017, ACM SURVEY UNPUB ACM SURVEY UNPUB
  • [7] Random forests
    Breiman, L
    [J]. MACHINE LEARNING, 2001, 45 (01) : 5 - 32
  • [8] Network intrusion detection based on random forest and support vector machine
    Chang, Yaping
    Li, Wei
    Yang, Zhongming
    [J]. 2017 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING (CSE) AND IEEE/IFIP INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING (EUC), VOL 1, 2017, : 635 - 638
  • [9] Choudhury S, 2015, 2015 INTERNATIONAL CONFERENCE ON SMART TECHNOLOGIES AND MANAGEMENT FOR COMPUTING, COMMUNICATION, CONTROLS, ENERGY AND MATERIALS (ICSTM), P89, DOI 10.1109/ICSTM.2015.7225395
  • [10] Cordero Carlos Garcia, 2016, 2016 14th Annual Conference on Privacy, Security and Trust (PST), P317, DOI 10.1109/PST.2016.7906980