Skip to main content
Top

2019 | OriginalPaper | Chapter

Long Short-Term Memory-Based Recurrent Neural Network Approach for Intrusion Detection

Authors : Nishanth Rajkumar, Austen D’Souza, Sagaya Alex, G. Jaspher W. Kathrine

Published in: Proceedings of the International Conference on ISMAC in Computational Vision and Bio-Engineering 2018 (ISMAC-CVB)

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Intrusion detection is very essential in the field of information security. The cornerstone of an Intrusion Detection System (IDS) is to accurately identify different attacks in a network. In this paper, a deep learning system to detect intrusions is proposed. The existing recurrent neural network (RNN-IDS) based IDS is expanded to include Long Short term memory (LSTM) and the results are compared. The binary classification performance of the RNN-IDS is tested with various learning rates and using different number of hidden nodes. The results show that by integrating LSTM with RNN-IDS, the accuracy of intrusion prediction has improved against the benchmark dataset.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Nadiammai GV, Hemalatha M (2014) Effective approach toward intrusion detection system using data mining techniques. Egypt Inf J 15(1):37–50 Nadiammai GV, Hemalatha M (2014) Effective approach toward intrusion detection system using data mining techniques. Egypt Inf J 15(1):37–50
2.
go back to reference Sabri FNM, Norita NM, Seman K (2011) Identifying false alarm rates for intrusion detection system with data mining. Int J Comput Sci Netw Secur 11:4 Sabri FNM, Norita NM, Seman K (2011) Identifying false alarm rates for intrusion detection system with data mining. Int J Comput Sci Netw Secur 11:4
3.
go back to reference Dewa Z, Maglaras LA (2016) Data mining and intrusion detection systems data mining and intrusion detection systems. (IJACSA) Int J Adv Comput Sci Appl 7(1) Dewa Z, Maglaras LA (2016) Data mining and intrusion detection systems data mining and intrusion detection systems. (IJACSA) Int J Adv Comput Sci Appl 7(1)
4.
go back to reference Patel J, Panchal K (2015) Effective intrusion detection system using data mining technique. IJSRD—Int J Sci Res Dev 3(02) Patel J, Panchal K (2015) Effective intrusion detection system using data mining technique. IJSRD—Int J Sci Res Dev 3(02)
5.
go back to reference Miller Z, Deitrick W, Wei H (2011) Anomalous network packet detection using data stream mining. J Inf Secur 2:158–168 Miller Z, Deitrick W, Wei H (2011) Anomalous network packet detection using data stream mining. J Inf Secur 2:158–168
6.
go back to reference Javaid A, Niyaz Q, Sun W, Alam M (2016) A deep learning approach for network intrusion detection system. In: Proceedings of the 9th EAI international conference on bio-inspired information and communications technologies (formerly BIONETICS), pp 21–26 Javaid A, Niyaz Q, Sun W, Alam M (2016) A deep learning approach for network intrusion detection system. In: Proceedings of the 9th EAI international conference on bio-inspired information and communications technologies (formerly BIONETICS), pp 21–26
8.
go back to reference Shone N, Ngoc TN, Phai VD, Shi Q (2017) A deep learning approach to network intrusion detection. IEEE Trans Emerg Top Comput Intell 2(1):41–50 Shone N, Ngoc TN, Phai VD, Shi Q (2017) A deep learning approach to network intrusion detection. IEEE Trans Emerg Top Comput Intell 2(1):41–50
9.
go back to reference Jabez J, Muthukumar B (2015) Intrusion detection system (IDS): anomaly detection using outlier detection approach. In: International conference on intelligent computing, communication & convergence (ICCC-2015), Procedia Computer Science, vol 48, pp 338–346 Jabez J, Muthukumar B (2015) Intrusion detection system (IDS): anomaly detection using outlier detection approach. In: International conference on intelligent computing, communication & convergence (ICCC-2015), Procedia Computer Science, vol 48, pp 338–346
10.
go back to reference Viegas EK, Santin AO, Oliveira LS (2017) Toward a reliable anomaly-based intrusion detection in real-world environments. Comput Netw 127:200–216CrossRef Viegas EK, Santin AO, Oliveira LS (2017) Toward a reliable anomaly-based intrusion detection in real-world environments. Comput Netw 127:200–216CrossRef
11.
go back to reference Umer MF, Sher M, Bi Y (2017) Flow-based intrusion detection: techniques and challenges. Comput Secur 70:238–254CrossRef Umer MF, Sher M, Bi Y (2017) Flow-based intrusion detection: techniques and challenges. Comput Secur 70:238–254CrossRef
12.
go back to reference Akashdeep IM, Kumar N (2017) A feature reduced intrusion detection system using ANN classifier. Expert Syst Appl 88:249–257CrossRef Akashdeep IM, Kumar N (2017) A feature reduced intrusion detection system using ANN classifier. Expert Syst Appl 88:249–257CrossRef
13.
go back to reference Dias LP, Cerqueira JJF, Assis KDR, Almeida RC (2017) Using artificial neural network in intrusion detection systems to computer networks. In: Proceedings of computer science and electronic engineering (CEEC) Dias LP, Cerqueira JJF, Assis KDR, Almeida RC (2017) Using artificial neural network in intrusion detection systems to computer networks. In: Proceedings of computer science and electronic engineering (CEEC)
14.
go back to reference Wang H, Jie G, Wang S (2017) An effective intrusion detection framework based on SVM with feature augmentation. Knowl-Based Syst 136:130–139CrossRef Wang H, Jie G, Wang S (2017) An effective intrusion detection framework based on SVM with feature augmentation. Knowl-Based Syst 136:130–139CrossRef
15.
go back to reference Jha J, Ragha L (2013) Intrusion detection system using support vector machine. Int J Appl Inf Syst (IJAIS) 3:25–30 Jha J, Ragha L (2013) Intrusion detection system using support vector machine. Int J Appl Inf Syst (IJAIS) 3:25–30
16.
go back to reference Abd-Eldayem MM (2014) A proposed HTTP service based IDS. Egypt Inf J 15(1):13–24 Abd-Eldayem MM (2014) A proposed HTTP service based IDS. Egypt Inf J 15(1):13–24
Metadata
Title
Long Short-Term Memory-Based Recurrent Neural Network Approach for Intrusion Detection
Authors
Nishanth Rajkumar
Austen D’Souza
Sagaya Alex
G. Jaspher W. Kathrine
Copyright Year
2019
DOI
https://doi.org/10.1007/978-3-030-00665-5_81