Skip to main content

2018 | OriginalPaper | Buchkapitel

Comparative Study of CNN and RNN for Deep Learning Based Intrusion Detection System

verfasst von : Jianjing Cui, Jun Long, Erxue Min, Qiang Liu, Qian Li

Erschienen in: Cloud Computing and Security

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Intrusion detection system plays an important role in ensuring information security, and the key technology is to accurately identify various attacks in the network. Due to huge increase in network traffic and different types of attacks, accurately classifying the malicious and legitimate network traffic is time consuming and computational intensive. Recently, more and more researchers applied deep neural networks (DNNs) to solve intrusion detection problems. Convolutional Neural Network (CNN) and Recurrent Neural Network (RNN), the two main types of DNN architectures, are widely explored to enhance the performance of intrusion detection system. In this paper, we made a systematic comparison of CNN and RNN on the deep learning based intrusion detection systems, aiming to give basic guidance for DNN selection.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Liu, X., Yin, J., Wang, L.: An adaptive approach to learning optimal neighborhood kernels. IEEE Trans. Syst. Man Cybern. Part B Cybern. A Publ. IEEE Syst. Man Cybern. Soc. 43(1), 371–384 (2012) Liu, X., Yin, J., Wang, L.: An adaptive approach to learning optimal neighborhood kernels. IEEE Trans. Syst. Man Cybern. Part B Cybern. A Publ. IEEE Syst. Man Cybern. Soc. 43(1), 371–384 (2012)
2.
Zurück zum Zitat Ming, Y., Zhao, Y., Wu, C., et al.: Distributed and asynchronous stochastic gradient descent with variance reduction. Neurocomputing 281, 27–36 (2017)CrossRef Ming, Y., Zhao, Y., Wu, C., et al.: Distributed and asynchronous stochastic gradient descent with variance reduction. Neurocomputing 281, 27–36 (2017)CrossRef
3.
Zurück zum Zitat Lecun, Y., Bottou, L., Bengio, Y.: Gradient-based learning applied to document recognition. Proc. IEEE 86(11), 2278–2324 (1998)CrossRef Lecun, Y., Bottou, L., Bengio, Y.: Gradient-based learning applied to document recognition. Proc. IEEE 86(11), 2278–2324 (1998)CrossRef
4.
Zurück zum Zitat Elman, J.L.: Finding structure in time. Cogn. Sci. 14(2), 179–211 (1990)CrossRef Elman, J.L.: Finding structure in time. Cogn. Sci. 14(2), 179–211 (1990)CrossRef
5.
Zurück zum Zitat Yin, W., Kann, K., Yu, M., et al.: Comparative Study of CNN and RNN for Natural Language Processing (2017) Yin, W., Kann, K., Yu, M., et al.: Comparative Study of CNN and RNN for Natural Language Processing (2017)
6.
Zurück zum Zitat Singh, J., Nene, M.J.: A survey on machine learning techniques for intrusion detection systems. Int. J. Adv. Res. Comput. Commun. Eng. 2(11), 4349–4355 (2013) Singh, J., Nene, M.J.: A survey on machine learning techniques for intrusion detection systems. Int. J. Adv. Res. Comput. Commun. Eng. 2(11), 4349–4355 (2013)
7.
Zurück zum Zitat Kishorwagh, S., Pachghare, V.K., Kolhe, S.R.: Survey on intrusion detection system using machine learning techniques. Int. J. Comput. Appl. 78(16), 30–37 (2013) Kishorwagh, S., Pachghare, V.K., Kolhe, S.R.: Survey on intrusion detection system using machine learning techniques. Int. J. Comput. Appl. 78(16), 30–37 (2013)
8.
Zurück zum Zitat Qiu, C., Shan, J.: Research on intrusion detection algorithm based on BP neural network. Int. J. Secur. Appl. 9(4), 247–258 (2015) Qiu, C., Shan, J.: Research on intrusion detection algorithm based on BP neural network. Int. J. Secur. Appl. 9(4), 247–258 (2015)
9.
Zurück zum Zitat Planquart, J.P.: Application of neural networks to intrusion detection. Sans Institute (2001) Planquart, J.P.: Application of neural networks to intrusion detection. Sans Institute (2001)
10.
Zurück zum Zitat Krizhevsky, A., Sutskever, I., Hinton, G.E.: ImageNet classification with deep convolutional neural networks. In: International Conference on Neural Information Processing Systems, pp. 1097–1105. Curran Associates Inc. (2012) Krizhevsky, A., Sutskever, I., Hinton, G.E.: ImageNet classification with deep convolutional neural networks. In: International Conference on Neural Information Processing Systems, pp. 1097–1105. Curran Associates Inc. (2012)
11.
Zurück zum Zitat Mikolov, T., Yih, W.T., Zweig, G.: Linguistic regularities in continuous space word representations. In: HLT-NAACL (2013) Mikolov, T., Yih, W.T., Zweig, G.: Linguistic regularities in continuous space word representations. In: HLT-NAACL (2013)
12.
Zurück zum Zitat Dainotti, A., Pescape, A., Claffy, K.C.: Issues and future directions in traffic classification. IEEE Netw. 26(1), 35–40 (2012)CrossRef Dainotti, A., Pescape, A., Claffy, K.C.: Issues and future directions in traffic classification. IEEE Netw. 26(1), 35–40 (2012)CrossRef
13.
Zurück zum Zitat Wang, W., Zhu, M., Zeng, X., et al.: Malware traffic classification using convolutional neural network for representation learning. In: International Conference on Information Networking, pp. 712–717. IEEE (2017) Wang, W., Zhu, M., Zeng, X., et al.: Malware traffic classification using convolutional neural network for representation learning. In: International Conference on Information Networking, pp. 712–717. IEEE (2017)
14.
Zurück zum Zitat Jia, F., Kong, L.Z.: Intrusion detection algorithm based on convolutional neural network. Beijing Ligong Daxue Xuebao/Trans. Beijing Inst. Technol. 37(12), 1271–1275 (2017)MATH Jia, F., Kong, L.Z.: Intrusion detection algorithm based on convolutional neural network. Beijing Ligong Daxue Xuebao/Trans. Beijing Inst. Technol. 37(12), 1271–1275 (2017)MATH
15.
Zurück zum Zitat Qian, T., Wang, Y., Zhang, M., et al.: Intrusion detection method based on deep neural network. Huazhong Keji Daxue Xuebao 46(1), 6–10 (2018) Qian, T., Wang, Y., Zhang, M., et al.: Intrusion detection method based on deep neural network. Huazhong Keji Daxue Xuebao 46(1), 6–10 (2018)
16.
Zurück zum Zitat Torres, P., Catania, C., Garcia, S., et al.: An analysis of Recurrent Neural Networks for Botnet detection behavior. In: Biennial Congress of Argentina (ARGENCON), pp. 1–6. IEEE (2016) Torres, P., Catania, C., Garcia, S., et al.: An analysis of Recurrent Neural Networks for Botnet detection behavior. In: Biennial Congress of Argentina (ARGENCON), pp. 1–6. IEEE (2016)
17.
Zurück zum Zitat Yuan, X., Li, C., Li, X.: DeepDefense: identifying DDoS attack via deep learning. In: 2017 IEEE International Conference on Smart Computing (SMARTCOMP), pp. 1–8. IEEE (2017) Yuan, X., Li, C., Li, X.: DeepDefense: identifying DDoS attack via deep learning. In: 2017 IEEE International Conference on Smart Computing (SMARTCOMP), pp. 1–8. IEEE (2017)
18.
Zurück zum Zitat Sheikhan, M., Jadidi, Z., Farrokhi, A.: Intrusion detection using reduced-size RNN based on feature grouping. Neural Comput. Appl. 21(6), 1185–1190 (2012)CrossRef Sheikhan, M., Jadidi, Z., Farrokhi, A.: Intrusion detection using reduced-size RNN based on feature grouping. Neural Comput. Appl. 21(6), 1185–1190 (2012)CrossRef
19.
Zurück zum Zitat Yin, C., Zhu, Y., Fei, J.: A deep learning approach for intrusion detection using recurrent neural networksl. IEEE Access 5, 21954–21961 (2017)CrossRef Yin, C., Zhu, Y., Fei, J.: A deep learning approach for intrusion detection using recurrent neural networksl. IEEE Access 5, 21954–21961 (2017)CrossRef
20.
Zurück zum Zitat Szegedy, C., Liu, W., Jia, Y., et al.: Going deeper with convolutions. In: IEEE Conference on Computer Vision and Pattern Recognition, pp. 1–9. IEEE Computer Society (2015) Szegedy, C., Liu, W., Jia, Y., et al.: Going deeper with convolutions. In: IEEE Conference on Computer Vision and Pattern Recognition, pp. 1–9. IEEE Computer Society (2015)
21.
Zurück zum Zitat Hochreiter, S., Schmidhuber, J.: Long short-term memory. Neural Comput. 9(8), 1735–1780 (1997)CrossRef Hochreiter, S., Schmidhuber, J.: Long short-term memory. Neural Comput. 9(8), 1735–1780 (1997)CrossRef
22.
Zurück zum Zitat Cho, K., Van Merrienboer, B., Bahdanau, D., et al.: On the properties of neural machine translation: encoder-decoder approaches. Computer Science (2014) Cho, K., Van Merrienboer, B., Bahdanau, D., et al.: On the properties of neural machine translation: encoder-decoder approaches. Computer Science (2014)
23.
Zurück zum Zitat Shiravi, A., Shiravi, H., Tavallaee, M.: Toward developing a systematic approach to generate benchmark datasets for intrusion detection. Comput. Secur. 31(3), 357–374 (2012)CrossRef Shiravi, A., Shiravi, H., Tavallaee, M.: Toward developing a systematic approach to generate benchmark datasets for intrusion detection. Comput. Secur. 31(3), 357–374 (2012)CrossRef
Metadaten
Titel
Comparative Study of CNN and RNN for Deep Learning Based Intrusion Detection System
verfasst von
Jianjing Cui
Jun Long
Erxue Min
Qiang Liu
Qian Li
Copyright-Jahr
2018
DOI
https://doi.org/10.1007/978-3-030-00018-9_15