Skip to main content
Top
Published in: The Journal of Supercomputing 9/2020

11-12-2019

Enhancing network intrusion detection classifiers using supervised adversarial training

Authors: Chuanlong Yin, Yuefei Zhu, Shengli Liu, Jinlong Fei, Hetong Zhang

Published in: The Journal of Supercomputing | Issue 9/2020

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

The performance of classifiers has a direct impact on the effectiveness of intrusion detection system. Thus, most researchers aim to improve the detection performance of classifiers. However, classifiers can only get limited useful information from the limited number of labeled training samples, which usually affects the generalization of classifiers. In order to enhance the network intrusion detection classifiers, we resort to adversarial training, and a novel supervised learning framework using generative adversarial network for improving the performance of the classifier is proposed in this paper. The generative model in our framework is utilized to continuously generate other complementary labeled samples for adversarial training and assist the classifier for classification, while the classifier in our framework is used to identify different categories. Meanwhile, the loss function is deduced again, and several empirical training strategies are proposed to improve the stabilization of the supervised learning framework. Experimental results prove that the classifier via adversarial training improves the performance indicators of intrusion detection. The proposed framework provides a feasible method to enhance the performance and generalization of the classifier.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Appendix
Available only for authorised users
Literature
2.
go back to reference Tsai C-F, Hsu Y-F, Lin C-Y, Lin W-Y (2009) Intrusion detection by machine learning: a review. Expert Syst Appl 36(10):11994–12000CrossRef Tsai C-F, Hsu Y-F, Lin C-Y, Lin W-Y (2009) Intrusion detection by machine learning: a review. Expert Syst Appl 36(10):11994–12000CrossRef
11.
go back to reference Khan JA, Jain N (2016) A survey on intrusion detection systems and classification techniques. Int J Sci Res Sci Eng Technol 2(5):202–208 Khan JA, Jain N (2016) A survey on intrusion detection systems and classification techniques. Int J Sci Res Sci Eng Technol 2(5):202–208
12.
go back to reference Hodo E, Bellekens X, Hamilton A, Tachtatzis C, Atkinson R (2017) Shallow and deep networks intrusion detection system: a taxonomy and survey. arXiv preprint arXiv:170102145 Hodo E, Bellekens X, Hamilton A, Tachtatzis C, Atkinson R (2017) Shallow and deep networks intrusion detection system: a taxonomy and survey. arXiv preprint arXiv:​170102145
13.
go back to reference Bengio Y, Delalleau O (2011) On the expressive power of deep architectures. Paper presented at the Proceedings of the 22nd International Conference on Algorithmic Learning Theory, Espoo, Finland Bengio Y, Delalleau O (2011) On the expressive power of deep architectures. Paper presented at the Proceedings of the 22nd International Conference on Algorithmic Learning Theory, Espoo, Finland
14.
go back to reference Goodfellow I, Bengio Y, Courville A (2016) Deep learning. The MIT Press, CambridgeMATH Goodfellow I, Bengio Y, Courville A (2016) Deep learning. The MIT Press, CambridgeMATH
15.
go back to reference Salimans T, Goodfellow I, Zaremba W, Cheung V, Radford A, Chen X (2016) Improved techniques for training gans. In: Advances in Neural Information Processing Systems, pp 2234–2242 Salimans T, Goodfellow I, Zaremba W, Cheung V, Radford A, Chen X (2016) Improved techniques for training gans. In: Advances in Neural Information Processing Systems, pp 2234–2242
17.
go back to reference Schlegl T, Seeböck P, Waldstein SM, Schmidt-Erfurth U, Langs G (2017) Unsupervised anomaly detection with generative adversarial networks to guide marker discovery. In: Niethammer M, Styner M, Aylward S et al (eds) Information processing in medical imaging. Springer International Publishing, Cham, pp 146–157CrossRef Schlegl T, Seeböck P, Waldstein SM, Schmidt-Erfurth U, Langs G (2017) Unsupervised anomaly detection with generative adversarial networks to guide marker discovery. In: Niethammer M, Styner M, Aylward S et al (eds) Information processing in medical imaging. Springer International Publishing, Cham, pp 146–157CrossRef
19.
go back to reference Usama M, Asim M, Latif S, Qadir J, Ala Al F (2019) Generative adversarial networks for launching and thwarting adversarial attacks on network intrusion detection systems. In: 2019 15th International Wireless Communications & Mobile Computing Conference (IWCMC), 24–28 June 2019, pp 78–83. https://doi.org/10.1109/iwcmc.2019.8766353 Usama M, Asim M, Latif S, Qadir J, Ala Al F (2019) Generative adversarial networks for launching and thwarting adversarial attacks on network intrusion detection systems. In: 2019 15th International Wireless Communications & Mobile Computing Conference (IWCMC), 24–28 June 2019, pp 78–83. https://​doi.​org/​10.​1109/​iwcmc.​2019.​8766353
20.
go back to reference Lin Z, Shi Y, Xue Z (2018) IDSGAN generative adversarial networks for attack generation against intrusion detection. arXiv:180902077 Lin Z, Shi Y, Xue Z (2018) IDSGAN generative adversarial networks for attack generation against intrusion detection. arXiv:​180902077
22.
go back to reference Merino T, Stillwell M, Steele M, Coplan M, Patton J, Stoyanov A, Deng L (2020) Expansion of cyber attack data from unbalanced datasets using generative adversarial networks. In: Lee R (ed) Software Engineering Research, Management and Applications. Springer International Publishing, Cham, pp 131–145. https://doi.org/10.1007/978-3-030-24344-9_8 Merino T, Stillwell M, Steele M, Coplan M, Patton J, Stoyanov A, Deng L (2020) Expansion of cyber attack data from unbalanced datasets using generative adversarial networks. In: Lee R (ed) Software Engineering Research, Management and Applications. Springer International Publishing, Cham, pp 131–145. https://​doi.​org/​10.​1007/​978-3-030-24344-9_​8
25.
go back to reference Kanakarajan NK, Muniasamy K (2016) Improving the accuracy of intrusion detection using GAR-Forest with feature selection. In: Proceedings of the 4th International Conference on Frontiers in Intelligent Computing: Theory and Applications (FICTA) 2015. Springer, pp 539–547. https://doi.org/10.1007/978-81-322-2695-6_45 Kanakarajan NK, Muniasamy K (2016) Improving the accuracy of intrusion detection using GAR-Forest with feature selection. In: Proceedings of the 4th International Conference on Frontiers in Intelligent Computing: Theory and Applications (FICTA) 2015. Springer, pp 539–547. https://​doi.​org/​10.​1007/​978-81-322-2695-6_​45
34.
35.
go back to reference Javaid A, Niyaz Q, Sun W, Alam M A deep learning approach for network intrusion detection system. In: Proceedings of the 9th EAI International Conference on Bio-inspired Information and Communications Technologies (formerly BIONETICS), 2016. ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering), pp 21–26. https://doi.org/10.4108/eai.3-12-2015.2262516 Javaid A, Niyaz Q, Sun W, Alam M A deep learning approach for network intrusion detection system. In: Proceedings of the 9th EAI International Conference on Bio-inspired Information and Communications Technologies (formerly BIONETICS), 2016. ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering), pp 21–26. https://​doi.​org/​10.​4108/​eai.​3-12-2015.​2262516
36.
go back to reference Mao X, Li Q, Xie H, Lau RY, Wang Z (2016) Multi-class generative adversarial networks with the L2 loss function. CoRR, abs/161104076 2 Mao X, Li Q, Xie H, Lau RY, Wang Z (2016) Multi-class generative adversarial networks with the L2 loss function. CoRR, abs/161104076 2
38.
go back to reference Springenberg JT (2015) Unsupervised and semi-supervised learning with categorical generative adversarial networks. arXiv preprint arXiv:151106390 Springenberg JT (2015) Unsupervised and semi-supervised learning with categorical generative adversarial networks. arXiv preprint arXiv:​151106390
39.
go back to reference Zhang D, Niu Q, Qiu X (2019) Detecting anomalies in communication packet streams based on generative adversarial networks. In: Biagioni ES, Zheng Y, Cheng S (eds) Wireless Algorithms, Systems, and Applications, Cham, 2019. Springer International Publishing, pp 470–481. https://doi.org/10.1007/978-3-030-23597-0_38 Zhang D, Niu Q, Qiu X (2019) Detecting anomalies in communication packet streams based on generative adversarial networks. In: Biagioni ES, Zheng Y, Cheng S (eds) Wireless Algorithms, Systems, and Applications, Cham, 2019. Springer International Publishing, pp 470–481. https://​doi.​org/​10.​1007/​978-3-030-23597-0_​38
40.
go back to reference Goodfellow I, Pouget-Abadie J, Mirza M, Xu B, Warde-Farley D, Ozair S, Courville A, Bengio Y (2014) Generative adversarial nets. In: Advances in Neural Information Processing Systems, pp 2672–2680 Goodfellow I, Pouget-Abadie J, Mirza M, Xu B, Warde-Farley D, Ozair S, Courville A, Bengio Y (2014) Generative adversarial nets. In: Advances in Neural Information Processing Systems, pp 2672–2680
41.
go back to reference Adetunmbi AO, Falaki SO, Adewale OS, Alese BK (2008) Network intrusion detection based on rough set and k-nearest neighbour. Int J Comput ICT Res 2(1):60–66 Adetunmbi AO, Falaki SO, Adewale OS, Alese BK (2008) Network intrusion detection based on rough set and k-nearest neighbour. Int J Comput ICT Res 2(1):60–66
Metadata
Title
Enhancing network intrusion detection classifiers using supervised adversarial training
Authors
Chuanlong Yin
Yuefei Zhu
Shengli Liu
Jinlong Fei
Hetong Zhang
Publication date
11-12-2019
Publisher
Springer US
Published in
The Journal of Supercomputing / Issue 9/2020
Print ISSN: 0920-8542
Electronic ISSN: 1573-0484
DOI
https://doi.org/10.1007/s11227-019-03092-1

Other articles of this Issue 9/2020

The Journal of Supercomputing 9/2020 Go to the issue

Premium Partner