Skip to main content
Top

2020 | OriginalPaper | Chapter

MLP4NIDS: An Efficient MLP-Based Network Intrusion Detection for CICIDS2017 Dataset

Authors : Arnaud Rosay, Florent Carlier, Pascal Leroux

Published in: Machine Learning for Networking

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

More and more embedded devices are connected to the internet and therefore are potential victims of intrusion. While machine learning algorithms have proven to be robust techniques, it is mainly achieved with traditional processing, neural network giving worse results. In this paper, we propose usage of a multi-layer perceptron neural network for intrusion detection and provide a detailed description of our methodology. We detail all steps to achieve better performances than traditional machine learning techniques with a detection of intrusion accuracy above 99% and a low false positive rate kept below 0.7%. Results of previous works are analyzed and compared with the performances of the proposed solution.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
2.
go back to reference Chawla, N.V., Bowyer, K.W., Hall, L.O., Kegelmeyer, W.P.: SMOTE: synthetic minority over-sampling technique. J. Artif. Intell. Res. 16, 321–357 (2002)CrossRef Chawla, N.V., Bowyer, K.W., Hall, L.O., Kegelmeyer, W.P.: SMOTE: synthetic minority over-sampling technique. J. Artif. Intell. Res. 16, 321–357 (2002)CrossRef
3.
go back to reference Dhanabal, L., Shantharajah, D.S.P.: A study on NSL-KDD dataset for intrusion detection system based on classification algorithms. Int. J. Adv. Res. Comput. Commun. Eng. 4, 446–452 (2015) Dhanabal, L., Shantharajah, D.S.P.: A study on NSL-KDD dataset for intrusion detection system based on classification algorithms. Int. J. Adv. Res. Comput. Commun. Eng. 4, 446–452 (2015)
6.
go back to reference Jiang, J., et al.: ALDD: a hybrid traffic-user behavior detection method for application layer DDoS. In: 2018 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications/12th IEEE International Conference on Big Data Science and Engineering (TrustCom/BigDataSE), pp. 1565–1569, August 2018. https://doi.org/10.1109/TrustCom/BigDataSE.2018.00225 Jiang, J., et al.: ALDD: a hybrid traffic-user behavior detection method for application layer DDoS. In: 2018 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications/12th IEEE International Conference on Big Data Science and Engineering (TrustCom/BigDataSE), pp. 1565–1569, August 2018. https://​doi.​org/​10.​1109/​TrustCom/​BigDataSE.​2018.​00225
7.
go back to reference Kingma, D.P., Ba, J.: Adam: a method for stochastic optimization. In: 2015 3rd International Conference for Learning Representations (2014) Kingma, D.P., Ba, J.: Adam: a method for stochastic optimization. In: 2015 3rd International Conference for Learning Representations (2014)
8.
go back to reference Klambauer, G., Unterthiner, T., Mayr, A., Hochreiter, S.: Self-normalizing neural networks. In: 2017 Advances in Neural Information Processing Systems, pp. 971–980 (2017) Klambauer, G., Unterthiner, T., Mayr, A., Hochreiter, S.: Self-normalizing neural networks. In: 2017 Advances in Neural Information Processing Systems, pp. 971–980 (2017)
9.
go back to reference Lee, W., Stolfo, S.J., Mok, K.W.: Mining in a data-flow environment: experience in network intrusion detection. In: Proceedings of the Fifth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD 1999, pp. 114–124. ACM, New York (1999). https://doi.org/10.1145/312129.312212 Lee, W., Stolfo, S.J., Mok, K.W.: Mining in a data-flow environment: experience in network intrusion detection. In: Proceedings of the Fifth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD 1999, pp. 114–124. ACM, New York (1999). https://​doi.​org/​10.​1145/​312129.​312212
12.
go back to reference European Parliament: Regulation (EU) 2015/758 of the European Parliament and of the Council of 29 April 2015 concerning type-approval requirements for the deployment of the eCall in-vehicle system based on the 112 service and amending Directive 2007/46/EC. Official Journal of the European Union, May 2015 European Parliament: Regulation (EU) 2015/758 of the European Parliament and of the Council of 29 April 2015 concerning type-approval requirements for the deployment of the eCall in-vehicle system based on the 112 service and amending Directive 2007/46/EC. Official Journal of the European Union, May 2015
13.
go back to reference Riyaz, B., Ganapathy, S.: An intelligent fuzzy rule based feature selection for effective intrusion detection. In: 2018 International Conference on Recent Trends in Advance Computing (ICRTAC), pp. 206–211, September 2018 Riyaz, B., Ganapathy, S.: An intelligent fuzzy rule based feature selection for effective intrusion detection. In: 2018 International Conference on Recent Trends in Advance Computing (ICRTAC), pp. 206–211, September 2018
14.
go back to reference Sharafaldin, I., Lashkari, A.H., Ghorbani, A.A.: Toward generating a new intrusion detection dataset and intrusion traffic characterization. In: Proceedings of the 4th International Conference on Information Systems Security and Privacy - Volume 1: ICISSP, pp. 108–116. SciTePress, January 2018. https://doi.org/10.5220/0006639801080116 Sharafaldin, I., Lashkari, A.H., Ghorbani, A.A.: Toward generating a new intrusion detection dataset and intrusion traffic characterization. In: Proceedings of the 4th International Conference on Information Systems Security and Privacy - Volume 1: ICISSP, pp. 108–116. SciTePress, January 2018. https://​doi.​org/​10.​5220/​0006639801080116​
16.
go back to reference Tang, T.A., Mhamdi, L., McLernon, D., Zaidi, S.A.R., Ghogho, M.: Deep learning approach for Network Intrusion Detection in Software Defined Networking. In: 2016 International Conference on Wireless Networks and Mobile Communications (WINCOM), pp. 258–263, October 2016. https://doi.org/10.1109/WINCOM.2016.7777224 Tang, T.A., Mhamdi, L., McLernon, D., Zaidi, S.A.R., Ghogho, M.: Deep learning approach for Network Intrusion Detection in Software Defined Networking. In: 2016 International Conference on Wireless Networks and Mobile Communications (WINCOM), pp. 258–263, October 2016. https://​doi.​org/​10.​1109/​WINCOM.​2016.​7777224
19.
go back to reference Ustebay, S., Turgut, Z., Aydin, M.A.: Intrusion detection system with recursive feature elimination by using random forest and deep learning classifier. In: 2018 International Congress on Big Data, Deep Learning and Fighting Cyber Terrorism (IBIGDELFT), pp. 71–76, December 2018. https://doi.org/10.1109/IBIGDELFT.2018.8625318 Ustebay, S., Turgut, Z., Aydin, M.A.: Intrusion detection system with recursive feature elimination by using random forest and deep learning classifier. In: 2018 International Congress on Big Data, Deep Learning and Fighting Cyber Terrorism (IBIGDELFT), pp. 71–76, December 2018. https://​doi.​org/​10.​1109/​IBIGDELFT.​2018.​8625318
Metadata
Title
MLP4NIDS: An Efficient MLP-Based Network Intrusion Detection for CICIDS2017 Dataset
Authors
Arnaud Rosay
Florent Carlier
Pascal Leroux
Copyright Year
2020
DOI
https://doi.org/10.1007/978-3-030-45778-5_16

Premium Partner