Skip to main content
Erschienen in: Soft Computing 2/2021

06.08.2020 | Methodologies and Application

Adoption and realization of deep learning in network traffic anomaly detection device design

verfasst von: Guanglu Wei, Zhonghua Wang

Erschienen in: Soft Computing | Ausgabe 2/2021

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In order to study the application of deep learning in the design of network traffic anomaly detection device, aiming at two common problems in the field of network anomaly detection: characteristic dependence and high false positive rate, the convolutional neural network (CNN) is combined with recurrent neural network (RNN) to propose the network anomaly detection method based on hierarchical spatiotemporal feature learning (HAST-NAD) based on deep learning. It automatically learns the traffic characteristics and improves the network traffic anomaly detection efficiency. First, the CNN is used to learn the spatial feature algorithm of data, and long-short term memory of RNN is used to learn the temporal feature algorithm of data. Then the two original data sets DARPA1998 and ISCX2012 are preprocessed. The accuracy, detection rate, and false positive rate of normal traffic and Dos, Probe, U2R, and R2L attack traffic are compared in DARPA1998 data set. The accuracy, detection rate, and false positive rate of normal traffic and Brute force SSH, DDoS, HttpDoS, and buffering attack traffic are compared in ISCX2012 data set. Finally, it is compared with other network traffic anomaly detection methods. The results show that when the network flow length is 800, the model shows good performance on the DARPA1998 data set (accuracy, detection rate and false positive rate are 98.68%, 97.78%, and 0.07%, respectively). When the network flow length is 600, the model performs better on the ISCX2012 dataset (accuracy, detection rate and false positive rate are 99.69%, 96.91%, and 0.22%, respectively). At the same time, when the packet length is 100 and the number of packets is 6, the model shows high precision, high detection rate, and low false positive rate on ISCX2012 data set. In the same data set, the temporal feature algorithm has better performance and lower false positive rate than the spatial feature algorithm. Compared with other network traffic anomaly detection methods, HAST-NAD has better comprehensive test results. In conclusion, the combination of CNN and RNN can better realize abnormal detection of network traffic, which has practical application and theoretical value.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literatur
Zurück zum Zitat Abadía-Barrero CE (2018) Kangaroo mother care in Colombia: a subaltern health innovation against for-profit biomedicine. Med Anthropol Q 32(3):384–403CrossRef Abadía-Barrero CE (2018) Kangaroo mother care in Colombia: a subaltern health innovation against for-profit biomedicine. Med Anthropol Q 32(3):384–403CrossRef
Zurück zum Zitat Ait-Kaddour A, Loudiyi M, Ferlay A, Gruffat D (2018) Performance of fluorescence spectroscopy for beef meat authentication: effect of excitation mode and discriminant algorithms. Meat Sci 137:58–66CrossRef Ait-Kaddour A, Loudiyi M, Ferlay A, Gruffat D (2018) Performance of fluorescence spectroscopy for beef meat authentication: effect of excitation mode and discriminant algorithms. Meat Sci 137:58–66CrossRef
Zurück zum Zitat Al Tobi AM, Duncan I (2018) KDD 1999 generation faults: a review and analysis. J Cyber Secur Technol 2(3–4):164–200CrossRef Al Tobi AM, Duncan I (2018) KDD 1999 generation faults: a review and analysis. J Cyber Secur Technol 2(3–4):164–200CrossRef
Zurück zum Zitat Banerjee I, Ling Y, Chen MC et al (2019) Comparative effectiveness of convolutional neural network (CNN) and recurrent neural network (RNN) architectures for radiology text report classification. Artif Intell Med 97:79–88CrossRef Banerjee I, Ling Y, Chen MC et al (2019) Comparative effectiveness of convolutional neural network (CNN) and recurrent neural network (RNN) architectures for radiology text report classification. Artif Intell Med 97:79–88CrossRef
Zurück zum Zitat Bang JH, Cho YJ, Kang K (2017) Anomaly detection of network-initiated LTE signaling traffic in wireless sensor and actuator networks based on a hidden semi-Markov model. Comput Secur 65:108–120CrossRef Bang JH, Cho YJ, Kang K (2017) Anomaly detection of network-initiated LTE signaling traffic in wireless sensor and actuator networks based on a hidden semi-Markov model. Comput Secur 65:108–120CrossRef
Zurück zum Zitat Caliskan A, Yuksel ME, Badem H, Basturk A (2018) Performance improvement of deep neural network classifiers by a simple training strategy. Eng Appl Artif Intell 67:14–23CrossRef Caliskan A, Yuksel ME, Badem H, Basturk A (2018) Performance improvement of deep neural network classifiers by a simple training strategy. Eng Appl Artif Intell 67:14–23CrossRef
Zurück zum Zitat Choi E, Kim J (2020) Deep learning based defect inspection using the intersection over minimum between search and abnormal regions. Int J Precis Eng Manuf 21:747–758CrossRef Choi E, Kim J (2020) Deep learning based defect inspection using the intersection over minimum between search and abnormal regions. Int J Precis Eng Manuf 21:747–758CrossRef
Zurück zum Zitat Chouhan N, Khan A (2019) Network anomaly detection using channel boosted and residual learning based deep convolutional neural network. Appl Soft Comput 83:105612CrossRef Chouhan N, Khan A (2019) Network anomaly detection using channel boosted and residual learning based deep convolutional neural network. Appl Soft Comput 83:105612CrossRef
Zurück zum Zitat Cong L, Longhua M, Feng L (2017) Multi-timescale gated neural network for video recognition. Rec Pat Comput Sci 10(1):96–103 Cong L, Longhua M, Feng L (2017) Multi-timescale gated neural network for video recognition. Rec Pat Comput Sci 10(1):96–103
Zurück zum Zitat Dwivedi S, Vardhan M, Tripathi S, Shukla AK (2020) Implementation of adaptive scheme in evolutionary technique for anomaly-based intrusion detection. Evol Intell 13(1):103–117CrossRef Dwivedi S, Vardhan M, Tripathi S, Shukla AK (2020) Implementation of adaptive scheme in evolutionary technique for anomaly-based intrusion detection. Evol Intell 13(1):103–117CrossRef
Zurück zum Zitat Faris H, Hassonah MA, Ala’M AZ, Mirjalili S, Aljarah I (2018) A multi-verse optimizer approach for feature selection and optimizing SVM parameters based on a robust system architecture. Neural Comput Appl 30(8):2355–2369CrossRef Faris H, Hassonah MA, Ala’M AZ, Mirjalili S, Aljarah I (2018) A multi-verse optimizer approach for feature selection and optimizing SVM parameters based on a robust system architecture. Neural Comput Appl 30(8):2355–2369CrossRef
Zurück zum Zitat Fengming Z, Shufang L, Zhimin G, Bo W, Shiming T, Mingming P (2017) Anomaly detection in smart grid based on encoder–decoder framework with recurrent neural network. J China Univ Posts Telecommun 24(6):67–73CrossRef Fengming Z, Shufang L, Zhimin G, Bo W, Shiming T, Mingming P (2017) Anomaly detection in smart grid based on encoder–decoder framework with recurrent neural network. J China Univ Posts Telecommun 24(6):67–73CrossRef
Zurück zum Zitat Guo C, Lu J, Tian Z, Guo W, Darvishan A (2019) Optimization of critical parameters of PEM fuel cell using TLBO-DE based on Elman neural network. Energy Convers Manag 183:149–158CrossRef Guo C, Lu J, Tian Z, Guo W, Darvishan A (2019) Optimization of critical parameters of PEM fuel cell using TLBO-DE based on Elman neural network. Energy Convers Manag 183:149–158CrossRef
Zurück zum Zitat Hawas AR, El-Khobby HA, Abd-Elnaby M, Abd El-Samie FE (2019) Gait identification by convolutional neural networks and optical flow. Multimed Tools Appl 78(18):25873–25888CrossRef Hawas AR, El-Khobby HA, Abd-Elnaby M, Abd El-Samie FE (2019) Gait identification by convolutional neural networks and optical flow. Multimed Tools Appl 78(18):25873–25888CrossRef
Zurück zum Zitat Iakovidis DK, Georgakopoulos SV, Vasilakakis M et al (2018) Detecting and locating gastrointestinal anomalies using deep learning and iterative cluster unification. IEEE Trans Med Imaging 37(10):2196–2210CrossRef Iakovidis DK, Georgakopoulos SV, Vasilakakis M et al (2018) Detecting and locating gastrointestinal anomalies using deep learning and iterative cluster unification. IEEE Trans Med Imaging 37(10):2196–2210CrossRef
Zurück zum Zitat Kanarachos S, Christopoulos SRG, Chroneos A, Fitzpatrick ME (2017) Detecting anomalies in time series data via a deep learning algorithm combining wavelets, neural networks and Hilbert transform. Expert Syst Appl 85:292–304CrossRef Kanarachos S, Christopoulos SRG, Chroneos A, Fitzpatrick ME (2017) Detecting anomalies in time series data via a deep learning algorithm combining wavelets, neural networks and Hilbert transform. Expert Syst Appl 85:292–304CrossRef
Zurück zum Zitat Kasai H, Kellerer W, Kleinsteuber M (2016) Network volume anomaly detection and identification in large-scale networks based on online time-structured traffic tensor tracking. IEEE Trans Netw Serv Manag 13(3):636–650CrossRef Kasai H, Kellerer W, Kleinsteuber M (2016) Network volume anomaly detection and identification in large-scale networks based on online time-structured traffic tensor tracking. IEEE Trans Netw Serv Manag 13(3):636–650CrossRef
Zurück zum Zitat Kim J, Sim A, Tierney B et al (2019) Multivariate network traffic analysis using clustered patterns. Computing 101(4):339–361MathSciNetCrossRef Kim J, Sim A, Tierney B et al (2019) Multivariate network traffic analysis using clustered patterns. Computing 101(4):339–361MathSciNetCrossRef
Zurück zum Zitat Kiran BR, Thomas DM, Parakkal R (2018) An overview of deep learning based methods for unsupervised and semi-supervised anomaly detection in videos. J Imaging 4(2):36CrossRef Kiran BR, Thomas DM, Parakkal R (2018) An overview of deep learning based methods for unsupervised and semi-supervised anomaly detection in videos. J Imaging 4(2):36CrossRef
Zurück zum Zitat Kwon S, Yoo H, Shon T (2020) IEEE 1815.1-based power system security with bidirectional RNN-based network anomalous attack detection for cyber-physical system. IEEE Access 8:77572–77586CrossRef Kwon S, Yoo H, Shon T (2020) IEEE 1815.1-based power system security with bidirectional RNN-based network anomalous attack detection for cyber-physical system. IEEE Access 8:77572–77586CrossRef
Zurück zum Zitat Li YF, Cao H (2018) Prediction for tourism flow based on lstm neural network. Procedia Comput Sci 129:277–283CrossRef Li YF, Cao H (2018) Prediction for tourism flow based on lstm neural network. Procedia Comput Sci 129:277–283CrossRef
Zurück zum Zitat Li N, Wang L, Li X et al (2020a) An effective deep learning neural network model for short-term load forecasting. Concurr Comput Pract Exp 32(7):e5595 Li N, Wang L, Li X et al (2020a) An effective deep learning neural network model for short-term load forecasting. Concurr Comput Pract Exp 32(7):e5595
Zurück zum Zitat Li N, He F, Ma W et al (2020b) Wind power prediction of kernel extreme learning machine based on differential evolution algorithm and cross validation algorithm. IEEE Access 8:68874–68882CrossRef Li N, He F, Ma W et al (2020b) Wind power prediction of kernel extreme learning machine based on differential evolution algorithm and cross validation algorithm. IEEE Access 8:68874–68882CrossRef
Zurück zum Zitat Li J, Wu W, Xue D (2020c) An intrusion detection method based on active transfer learning. Intell Data Anal 24(2):363–383CrossRef Li J, Wu W, Xue D (2020c) An intrusion detection method based on active transfer learning. Intell Data Anal 24(2):363–383CrossRef
Zurück zum Zitat Lv Z, Li X, Lv H, Xiu W (2019) BIM data storage in WebVRGIS. IEEE Trans Ind Inform 16(4):2566–2573CrossRef Lv Z, Li X, Lv H, Xiu W (2019) BIM data storage in WebVRGIS. IEEE Trans Ind Inform 16(4):2566–2573CrossRef
Zurück zum Zitat Maimó LF, Gómez ÁLP, Clemente FJG et al (2018) A self-adaptive deep learning-based system for anomaly detection in 5G networks. IEEE Access 6:7700–7712CrossRef Maimó LF, Gómez ÁLP, Clemente FJG et al (2018) A self-adaptive deep learning-based system for anomaly detection in 5G networks. IEEE Access 6:7700–7712CrossRef
Zurück zum Zitat Mary Gladence L, Vasantha Kumar R, Thanveer Hussain N (2016) Location based queries using privacy-preserving and content-protecting. Int J Pharm Technol 8(2):12690–12696 Mary Gladence L, Vasantha Kumar R, Thanveer Hussain N (2016) Location based queries using privacy-preserving and content-protecting. Int J Pharm Technol 8(2):12690–12696
Zurück zum Zitat Mary Gladence L, Vakula CK, Selvan MP, Samhita TYS (2019) A research on application of human–robot interaction using artifical intelligence. Int J Innov Technol Explor Eng 8(9S2):2278–3075 Mary Gladence L, Vakula CK, Selvan MP, Samhita TYS (2019) A research on application of human–robot interaction using artifical intelligence. Int J Innov Technol Explor Eng 8(9S2):2278–3075
Zurück zum Zitat Price-Williams M, Heard N, Rubin-Delanchy P (2019) Detecting weak dependence in computer network traffic patterns by using higher criticism. J R Stat Soc Ser C (Appl Stat) 68(3):641–655MathSciNetCrossRef Price-Williams M, Heard N, Rubin-Delanchy P (2019) Detecting weak dependence in computer network traffic patterns by using higher criticism. J R Stat Soc Ser C (Appl Stat) 68(3):641–655MathSciNetCrossRef
Zurück zum Zitat Rodríguez P, Bautista MA, Gonzalez J, Escalera S (2018) Beyond one-hot encoding: lower dimensional target embedding. Image Vis Comput 75:21–31CrossRef Rodríguez P, Bautista MA, Gonzalez J, Escalera S (2018) Beyond one-hot encoding: lower dimensional target embedding. Image Vis Comput 75:21–31CrossRef
Zurück zum Zitat Salman AD, Khalaf OI, Abdulsahib GM (2019) An adaptive intelligent alarm system for wireless sensor network. Indones J Electr Eng Comput Sci 15(1):142–147CrossRef Salman AD, Khalaf OI, Abdulsahib GM (2019) An adaptive intelligent alarm system for wireless sensor network. Indones J Electr Eng Comput Sci 15(1):142–147CrossRef
Zurück zum Zitat Silva BN, Khan M, Han K (2018) Towards sustainable smart cities: a review of trends, architectures, components, and open challenges in smart cities. Sustain Cities Soc 38:697–713CrossRef Silva BN, Khan M, Han K (2018) Towards sustainable smart cities: a review of trends, architectures, components, and open challenges in smart cities. Sustain Cities Soc 38:697–713CrossRef
Zurück zum Zitat Tang F, Mao B, Fadlullah ZM et al (2017) On removing routing protocol from future wireless networks: a real-time deep learning approach for intelligent traffic control. IEEE Wirel Commun 25(1):154–160CrossRef Tang F, Mao B, Fadlullah ZM et al (2017) On removing routing protocol from future wireless networks: a real-time deep learning approach for intelligent traffic control. IEEE Wirel Commun 25(1):154–160CrossRef
Zurück zum Zitat Tian Y, Zhang K, Li J, Lin X, Yang B (2018) LSTM-based traffic flow prediction with missing data. Neurocomputing 318(NOV. 27):297–305CrossRef Tian Y, Zhang K, Li J, Lin X, Yang B (2018) LSTM-based traffic flow prediction with missing data. Neurocomputing 318(NOV. 27):297–305CrossRef
Zurück zum Zitat Wehrmann J, Simões GS, Barros RC, Cavalcante VF (2018) Adult content detection in videos with convolutional and recurrent neural networks. Neurocomputing 272:432–438CrossRef Wehrmann J, Simões GS, Barros RC, Cavalcante VF (2018) Adult content detection in videos with convolutional and recurrent neural networks. Neurocomputing 272:432–438CrossRef
Zurück zum Zitat Yang HQ, Zhang L, Li DQ (2018) Efficient method for probabilistic estimation of spatially varied hydraulic properties in a soil slope based on field responses: a Bayesian approach. Comput Geotech 102:262–272CrossRef Yang HQ, Zhang L, Li DQ (2018) Efficient method for probabilistic estimation of spatially varied hydraulic properties in a soil slope based on field responses: a Bayesian approach. Comput Geotech 102:262–272CrossRef
Zurück zum Zitat Yang HQ, Zhang L, Xue J, Zhang J, Li X (2019) Unsaturated soil slope characterization with Karhunen–Loève and polynomial chaos via Bayesian approach. Eng Comput 35(1):337–350CrossRef Yang HQ, Zhang L, Xue J, Zhang J, Li X (2019) Unsaturated soil slope characterization with Karhunen–Loève and polynomial chaos via Bayesian approach. Eng Comput 35(1):337–350CrossRef
Zurück zum Zitat Yao H, Li C, Sun P (2020) Using parametric t-distributed stochastic neighbor embedding combined with hierarchical neural network for network intrusion detectione. Int J Netw Secur 22(2):265–274 Yao H, Li C, Sun P (2020) Using parametric t-distributed stochastic neighbor embedding combined with hierarchical neural network for network intrusion detectione. Int J Netw Secur 22(2):265–274
Zurück zum Zitat Yin X, Chen X, Chen L et al (2018) Research of security as a service for VMs in IaaS platform. IEEE Access 6:29158–29172CrossRef Yin X, Chen X, Chen L et al (2018) Research of security as a service for VMs in IaaS platform. IEEE Access 6:29158–29172CrossRef
Zurück zum Zitat Zeng Y, Gu H, Wei W, Guo Y (2019) Deep-Full-Range: a deep learning based network encrypted traffic classification and intrusion detection framework. IEEE Access 7:45182–45190CrossRef Zeng Y, Gu H, Wei W, Guo Y (2019) Deep-Full-Range: a deep learning based network encrypted traffic classification and intrusion detection framework. IEEE Access 7:45182–45190CrossRef
Metadaten
Titel
Adoption and realization of deep learning in network traffic anomaly detection device design
verfasst von
Guanglu Wei
Zhonghua Wang
Publikationsdatum
06.08.2020
Verlag
Springer Berlin Heidelberg
Erschienen in
Soft Computing / Ausgabe 2/2021
Print ISSN: 1432-7643
Elektronische ISSN: 1433-7479
DOI
https://doi.org/10.1007/s00500-020-05210-1

Weitere Artikel der Ausgabe 2/2021

Soft Computing 2/2021 Zur Ausgabe

Premium Partner