Skip to main content

2022 | OriginalPaper | Buchkapitel

Classification of Network Intrusion Detection System Using Deep Learning

verfasst von : Neha Sharma, Narendra Singh Yadav

Erschienen in: Cyber Security, Privacy and Networking

Verlag: Springer Nature Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Over the past  one decade, there has been a continuous rise in the usage of Internet services all over the world. However, numerous challenges emerge since malicious attacks are constantly changing and are happening in exceptionally huge volumes requiring an adaptable solution. This has led to a desperate need not only of detection and classification of attacks at host as well as network side but also the detection being automatic and in a certain time frame, as a result of which the world has seen many developments in this field with machine learning and deep learning playing a huge role in it. Because of the dynamic effect of malware with constantly changing attack techniques, the malware datasets accessible openly are to be updated efficiently and benchmarked. In order to develop an effective intrusion detection system, machine learning or deep learning techniques are also becoming more advanced day by day, and it is important to utilize their benefits in this field. This paper focuses on the development of network intrusion detection systems (NIDS) using deep learning. This paper uses UNSW-NB15 dataset as it is one of the most recent and improved IDS datasets. It has been improved on many factors from its predecessor KDD CUP99. Convolutional neural network and recurrent neural network have been implemented to compare the results. The classifications implemented in this paper are both in binary and multiclass with the major focus regarding maximum macro precision, recall, and f-score for the multiclass approach.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Mukherjee B, Heberlein LT, Levitt KN (1994) Network intrusion detection. IEEE Netw 8(3):26–41CrossRef Mukherjee B, Heberlein LT, Levitt KN (1994) Network intrusion detection. IEEE Netw 8(3):26–41CrossRef
2.
Zurück zum Zitat Mishra P, Varadharajan V, Tupakula U, Pilli ES (2018) A detailed investigation and analysis of using machine learning techniques for intrusion detection. IEEE Commun Surv Tutor Mishra P, Varadharajan V, Tupakula U, Pilli ES (2018) A detailed investigation and analysis of using machine learning techniques for intrusion detection. IEEE Commun Surv Tutor
3.
Zurück zum Zitat Staudemeyer RC (2015) Applying long short-term memory recurrent neural networks to intrusion detection. S Afr Comput J 56(1):136–154 Staudemeyer RC (2015) Applying long short-term memory recurrent neural networks to intrusion detection. S Afr Comput J 56(1):136–154
4.
Zurück zum Zitat Moustafa N, Slay J (2015) The significant features of the UNSW-NB15 and the KDD99 data sets for network intrusion detection systems. In: 2015 4th international workshop on building analysis datasets and gathering experience returns for security, Nov 2015 Moustafa N, Slay J (2015) The significant features of the UNSW-NB15 and the KDD99 data sets for network intrusion detection systems. In: 2015 4th international workshop on building analysis datasets and gathering experience returns for security, Nov 2015
5.
Zurück zum Zitat Sharma P, Sengupta J, Suri PK (2019) Survey of intrusion detection techniques and architectures in cloud computing. Int J High Perform Comput Netw 13(2):184–198CrossRef Sharma P, Sengupta J, Suri PK (2019) Survey of intrusion detection techniques and architectures in cloud computing. Int J High Perform Comput Netw 13(2):184–198CrossRef
6.
Zurück zum Zitat Kamarudin MH, Maple C, Watson T (2019) Hybrid feature selection technique for intrusion detection system. Int J High Perform Comput Netw 13(2):232–240CrossRef Kamarudin MH, Maple C, Watson T (2019) Hybrid feature selection technique for intrusion detection system. Int J High Perform Comput Netw 13(2):232–240CrossRef
7.
Zurück zum Zitat Kumar P, Kumar R, Gupta GP, Tripathi R (2021) A distributed framework for detecting DDoS attacks in smart contract-based blockchain-IoT systems by leveraging fog computing. Trans Emerg Telecommun Technol 32(6):e4112 Kumar P, Kumar R, Gupta GP, Tripathi R (2021) A distributed framework for detecting DDoS attacks in smart contract-based blockchain-IoT systems by leveraging fog computing. Trans Emerg Telecommun Technol 32(6):e4112
8.
Zurück zum Zitat Sarker IH, Abushark YB, Alsolami F, Khan AI (2020) IntruDTree: a machine learning based cyber security intrusion detection model. Symmetry 2020 Sarker IH, Abushark YB, Alsolami F, Khan AI (2020) IntruDTree: a machine learning based cyber security intrusion detection model. Symmetry 2020
9.
Zurück zum Zitat Kanimozhi V, Jacob P (2019) UNSW-NB15 dataset feature selection and network intrusion detection using deep learning. Int J Recent Technol Eng (IJRTE) Kanimozhi V, Jacob P (2019) UNSW-NB15 dataset feature selection and network intrusion detection using deep learning. Int J Recent Technol Eng (IJRTE)
10.
Zurück zum Zitat Kocher G, Kumar G (2021) Analysis of machine learning algorithms with feature selection for intrusion detection using UNSW-NB15 dataset. Int J Netw Secur Appl (IJNSA) Kocher G, Kumar G (2021) Analysis of machine learning algorithms with feature selection for intrusion detection using UNSW-NB15 dataset. Int J Netw Secur Appl (IJNSA)
11.
Zurück zum Zitat Liu H, Lang B (2019) Machine learning and deep learning methods for intrusion detection systems: a survey. State Key Laboratory of Software Development Environment, Beihang University, Beijing, 11–17 Oct 2019 Liu H, Lang B (2019) Machine learning and deep learning methods for intrusion detection systems: a survey. State Key Laboratory of Software Development Environment, Beihang University, Beijing, 11–17 Oct 2019
12.
Zurück zum Zitat Srinivasan S, Anivilla S, Ravi V, Kp S (2020) DCNN-IDS: deep convolutional neural network based intrusion detection system. In: TechRxiv, 18–21 Oct 2020. IEEE Srinivasan S, Anivilla S, Ravi V, Kp S (2020) DCNN-IDS: deep convolutional neural network based intrusion detection system. In: TechRxiv, 18–21 Oct 2020. IEEE
14.
Zurück zum Zitat Moustafa N, Slay J (2015) UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set). In: Military communications and information systems conference (MilCIS), Canberra Moustafa N, Slay J (2015) UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set). In: Military communications and information systems conference (MilCIS), Canberra
15.
Zurück zum Zitat Ren J, Guo J, Qian W, Yuan H, Hao X, Jingjing H (2019) Building an effective intrusion detection system by using hybrid data optimization based on machine learning algorithms. Secur Commun Netw Ren J, Guo J, Qian W, Yuan H, Hao X, Jingjing H (2019) Building an effective intrusion detection system by using hybrid data optimization based on machine learning algorithms. Secur Commun Netw
16.
Zurück zum Zitat Letteri I, Penna GD, Gasperis GD (2019) Security in the internet of things: botnet detection in software-defined networks by deep learning techniques. Int J High Perform Comput Netw 15(3–4):170–182CrossRef Letteri I, Penna GD, Gasperis GD (2019) Security in the internet of things: botnet detection in software-defined networks by deep learning techniques. Int J High Perform Comput Netw 15(3–4):170–182CrossRef
17.
Zurück zum Zitat Zheng H, He J, Zhang Y, Wu J, Ji Z (2019) A mathematical model for intimacy-based security protection in social network without violation of privacy. Int J High Perform Comput Netw 15(3–4):121–132CrossRef Zheng H, He J, Zhang Y, Wu J, Ji Z (2019) A mathematical model for intimacy-based security protection in social network without violation of privacy. Int J High Perform Comput Netw 15(3–4):121–132CrossRef
18.
Zurück zum Zitat Kumar P, Gupta GP, Tripathi R (2021) Toward design of an intelligent cyber attack detection system using hybrid feature reduced approach for IoT networks. Arab J Sci Eng 46(4):3749–3778CrossRef Kumar P, Gupta GP, Tripathi R (2021) Toward design of an intelligent cyber attack detection system using hybrid feature reduced approach for IoT networks. Arab J Sci Eng 46(4):3749–3778CrossRef
19.
Zurück zum Zitat Kumar R, Kumar P, Tripathi R, Gupta GP, Gadekallu TR, Srivastava G (2021) Sp2f: a secured privacy-preserving framework for smart agricultural unmanned aerial vehicles. Comput Netw 187:107819 Kumar R, Kumar P, Tripathi R, Gupta GP, Gadekallu TR, Srivastava G (2021) Sp2f: a secured privacy-preserving framework for smart agricultural unmanned aerial vehicles. Comput Netw 187:107819
20.
Zurück zum Zitat Nagisetty A, Gupta GP (2019) Framework for detection of malicious activities in IoT networks using keras deep learning library. In: 2019 3rd international conference on computing methodologies and communication (ICCMC), Mar 2019. IEEE, pp 633–637 Nagisetty A, Gupta GP (2019) Framework for detection of malicious activities in IoT networks using keras deep learning library. In: 2019 3rd international conference on computing methodologies and communication (ICCMC), Mar 2019. IEEE, pp 633–637
21.
Zurück zum Zitat Kumar P, Gupta GP, Tripathi R (2021) An ensemble learning and fog-cloud architecture-driven cyber-attack detection framework for IoMT networks. Comput Commun 166:110–124CrossRef Kumar P, Gupta GP, Tripathi R (2021) An ensemble learning and fog-cloud architecture-driven cyber-attack detection framework for IoMT networks. Comput Commun 166:110–124CrossRef
Metadaten
Titel
Classification of Network Intrusion Detection System Using Deep Learning
verfasst von
Neha Sharma
Narendra Singh Yadav
Copyright-Jahr
2022
Verlag
Springer Nature Singapore
DOI
https://doi.org/10.1007/978-981-16-8664-1_19

Neuer Inhalt