Skip to main content
Top
Published in: Mobile Networks and Applications 3/2021

21-07-2020

Robust Network Intrusion Detection Scheme Using Long-Short Term Memory Based Convolutional Neural Networks

Authors: Chia-Ming Hsu, Muhammad Zulfan Azhari, He-Yen Hsieh, Setya Widyawan Prakosa, Jenq-Shiou Leu

Published in: Mobile Networks and Applications | Issue 3/2021

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

The intrusion detection system (IDS) is a crucial part in the network administration system to detect some types of cyber attack. IDS is categorized as a classifying machine thus it is likely to engage with the machine learning schemes. Many studies have demonstrated how to apply machine learning schemes to IDS even though they cannot provide optimum results. To tackle this issue, deep learning schemes can be considered as the solution due to its achievement in several fields. Therefore, in this study, we propose a deep learning model which is constructed based on convolutional neural network (CNN) layers and using Long-Short Term Memory (LSTM) layers called CNN-LSTM to classify every single traffic network. We use NSL-KDD dataset as the benchmark thus we can compare the performance of our proposed method with other existing works. This dataset includes two testing sets which are the first one is KDDTest+ while the second one is KDDTest− 21 which is more difficult to be classified. The results show that our proposed method outperforms other existing works.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Show more products
Literature
1.
go back to reference Sharma S, Gupta RK (2015) Intrusion detection system: a reivew. Int. J. Secur. App. 9 (5):69–76 Sharma S, Gupta RK (2015) Intrusion detection system: a reivew. Int. J. Secur. App. 9 (5):69–76
2.
go back to reference Revathi S, Malathi A (2013) A detailed analysis on NSL- KDD dataset using various machine learning techniques for intrusion detection. Int. J. Eng. Res. Technol 2:1848–1853 Revathi S, Malathi A (2013) A detailed analysis on NSL- KDD dataset using various machine learning techniques for intrusion detection. Int. J. Eng. Res. Technol 2:1848–1853
3.
go back to reference Dhanabal L, Shantharajah SP (2015) A study on NSL-KDD dataset for intrusion detection system based on classification algorithms. International Journal of Advanced Research in Computer and Communication Engineering 4:446–452 Dhanabal L, Shantharajah SP (2015) A study on NSL-KDD dataset for intrusion detection system based on classification algorithms. International Journal of Advanced Research in Computer and Communication Engineering 4:446–452
4.
go back to reference Kuang F, Xu W, Zhang S (2014) A novel hybrid KPCA and SVM with GA model for intrusion detection. Appl Soft Comput 18:178–184CrossRef Kuang F, Xu W, Zhang S (2014) A novel hybrid KPCA and SVM with GA model for intrusion detection. Appl Soft Comput 18:178–184CrossRef
6.
go back to reference Reddy RR, Ramadevi Y, Sunitha KVN (2016) “Effective discriminant function for intrusion detection using SVM”. In: International Conference on Advances in Computing Communications and Informatics (ICACCI), pp 1148–1153 Reddy RR, Ramadevi Y, Sunitha KVN (2016) “Effective discriminant function for intrusion detection using SVM”. In: International Conference on Advances in Computing Communications and Informatics (ICACCI), pp 1148–1153
7.
go back to reference Ibrahim LM, Basheer DT, Mahmod MS (2013) “A comparison study for intrusion database (KDD 99, NSL-KDD) based on self organization map (SOM) artificial neural network”. J Eng. Sci. Technol. 8:107–119 Ibrahim LM, Basheer DT, Mahmod MS (2013) “A comparison study for intrusion database (KDD 99, NSL-KDD) based on self organization map (SOM) artificial neural network”. J Eng. Sci. Technol. 8:107–119
8.
go back to reference Ingre B, Yadav A (2015) Performance analysis of NSL-KDD dataset using ANN Ingre B, Yadav A (2015) Performance analysis of NSL-KDD dataset using ANN
9.
go back to reference Farnaaz N, Jabbar MA (2016) Random forest modeling for network intrusion detection system. Procedia Computer Science 89:213–217CrossRef Farnaaz N, Jabbar MA (2016) Random forest modeling for network intrusion detection system. Procedia Computer Science 89:213–217CrossRef
10.
go back to reference Zhang J, Zulkernine M, Haque A (2008) Random-Forests-Based Network intrusion detection systems. IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews) 38:649–659CrossRef Zhang J, Zulkernine M, Haque A (2008) Random-Forests-Based Network intrusion detection systems. IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews) 38:649–659CrossRef
11.
go back to reference Niyaz Q, Sun W, Javaid AY, Alam M (2015) A deep learning approach for network intrusion detection system. EAI Endorsed Transactions on Security and Safety 16:21–26 Niyaz Q, Sun W, Javaid AY, Alam M (2015) A deep learning approach for network intrusion detection system. EAI Endorsed Transactions on Security and Safety 16:21–26
12.
go back to reference Xu Y, Shi L, Ni Y (2017) Deep-learning-based Scenario Generation Strategy Considering Correlation Between Multiple Wind Farms. The Journal of Engineering 2017:2207–2210CrossRef Xu Y, Shi L, Ni Y (2017) Deep-learning-based Scenario Generation Strategy Considering Correlation Between Multiple Wind Farms. The Journal of Engineering 2017:2207–2210CrossRef
13.
go back to reference Wu B-F, Lin C-H (2018) Adaptive feature mapping for customizing deep learning based facial expression recognition model. IEEE Access 6:12451–12461CrossRef Wu B-F, Lin C-H (2018) Adaptive feature mapping for customizing deep learning based facial expression recognition model. IEEE Access 6:12451–12461CrossRef
14.
go back to reference Wang T, Wen C-K., Wang H, Gao F, Jiang T, Jin S (2017) Deep learning for wireless physical layer: opportunities and challenges. China Communications 14:92–11CrossRef Wang T, Wen C-K., Wang H, Gao F, Jiang T, Jin S (2017) Deep learning for wireless physical layer: opportunities and challenges. China Communications 14:92–11CrossRef
15.
go back to reference Yin C, Zhu Y, Fei J, He X (2017) A deep learning approach for intrusion detection using recurrent neural networks. IEEE Access 5:21954–21961CrossRef Yin C, Zhu Y, Fei J, He X (2017) A deep learning approach for intrusion detection using recurrent neural networks. IEEE Access 5:21954–21961CrossRef
16.
go back to reference Kaushik SS, Deshmukh PR (2011) Detection of attacks in an intrusion detection system. International Journal of Computer Science and Information Technologies 2(3):982–986 Kaushik SS, Deshmukh PR (2011) Detection of attacks in an intrusion detection system. International Journal of Computer Science and Information Technologies 2(3):982–986
17.
go back to reference Hochreiter S, Schmidhuber J (1997) Long-Short Term memory. Neural Comput 9:1735–1780CrossRef Hochreiter S, Schmidhuber J (1997) Long-Short Term memory. Neural Comput 9:1735–1780CrossRef
18.
go back to reference LeCun Y, Haffner P, Bottou L, Bengio Y (1999) Object recognition with Gradient-Based learning LeCun Y, Haffner P, Bottou L, Bengio Y (1999) Object recognition with Gradient-Based learning
19.
go back to reference Shen Y, Zheng K, Wu C, Zhang M, Niu X, Yang Y (2018) An Ensemble Method Based on Selection ba Algorithm for Intrusion Detection. The Computer Journal 61:526–538CrossRef Shen Y, Zheng K, Wu C, Zhang M, Niu X, Yang Y (2018) An Ensemble Method Based on Selection ba Algorithm for Intrusion Detection. The Computer Journal 61:526–538CrossRef
20.
go back to reference Xu C, Shen J, Du X, Zhang F (2018) An intrusion detection system using a deep neural network with gated recurrent units. IEEE Access 6:48697–48707CrossRef Xu C, Shen J, Du X, Zhang F (2018) An intrusion detection system using a deep neural network with gated recurrent units. IEEE Access 6:48697–48707CrossRef
Metadata
Title
Robust Network Intrusion Detection Scheme Using Long-Short Term Memory Based Convolutional Neural Networks
Authors
Chia-Ming Hsu
Muhammad Zulfan Azhari
He-Yen Hsieh
Setya Widyawan Prakosa
Jenq-Shiou Leu
Publication date
21-07-2020
Publisher
Springer US
Published in
Mobile Networks and Applications / Issue 3/2021
Print ISSN: 1383-469X
Electronic ISSN: 1572-8153
DOI
https://doi.org/10.1007/s11036-020-01623-2

Other articles of this Issue 3/2021

Mobile Networks and Applications 3/2021 Go to the issue