Skip to main content
Erschienen in: Neural Computing and Applications 20/2021

13.04.2021 | Original Article

A novel context-aware feature extraction method for convolutional neural network-based intrusion detection systems

verfasst von: Erfan A. Shams, Ahmet Rizaner, Ali Hakan Ulusoy

Erschienen in: Neural Computing and Applications | Ausgabe 20/2021

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

To create a safe and secure cyberspace, many researchers have created and proposed Intrusion Detection Systems (IDSs). Different types of IDSs are either designed to address only a single kind of intrusion or multiple variants. In this paper, we proposed a new context-aware feature extraction method as a pre-processing step for Convolutional Neural Network (CNN)-based multiclass intrusion detection. Feature selection is also used to reduce the feature space and classification time. For attack-type classification, we used CNN which is generally well-known for its better classification ability on image recognition tasks. We have exploited this ability to develop an IDS that can identify different types of intrusions ranging from 4 to 12 types. In our study, we evaluated our proposed Context-aware Feature Extraction-based CNN IDS on different datasets with multiple classes where it was able to successfully improve classification accuracy compared to the models with no preprocessing steps and other existing methods. We carried out the performance evaluation and comparison using four different datasets, NSL-KDD, CICIDS2017, ADFA-LD, and ADFA-WD. These datasets have either host-based or network-based features, which is another area that we investigated in this paper.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Literatur
2.
Zurück zum Zitat Tavallaee M, Bagheri E, Lu W, Ghorbani AA (2009) A detailed analysis of the KDD CUP 99 data set. In: IEEE Symposium on computational intelligence for security and defense applications, CISDA 2009. IEEE, pp 1–6 Tavallaee M, Bagheri E, Lu W, Ghorbani AA (2009) A detailed analysis of the KDD CUP 99 data set. In: IEEE Symposium on computational intelligence for security and defense applications, CISDA 2009. IEEE, pp 1–6
4.
6.
Zurück zum Zitat Sharafaldin I, Habibi Lashkari A, Ghorbani AA (2018) Toward generating a new intrusion detection dataset and intrusion traffic characterization. In: Proceedings of the 4th international conference on information systems security and privacy. SCITEPRESS - science and technology publications, pp 108–116 Sharafaldin I, Habibi Lashkari A, Ghorbani AA (2018) Toward generating a new intrusion detection dataset and intrusion traffic characterization. In: Proceedings of the 4th international conference on information systems security and privacy. SCITEPRESS - science and technology publications, pp 108–116
8.
Zurück zum Zitat Creech G (2014) Developing a high-accuracy cross platform host-based intrusion detection system capable of reliably detecting zero-day attacks. University of New South Wales Creech G (2014) Developing a high-accuracy cross platform host-based intrusion detection system capable of reliably detecting zero-day attacks. University of New South Wales
20.
Zurück zum Zitat Blanco R, Malagon P, Cilla JJ, Moya JM (2018) Multiclass network attack classifier using cnn tuned with genetic algorithms. In: 2018 28th international symposium on power and timing modeling, optimization and simulation (PATMOS). IEEE, pp 177–182 Blanco R, Malagon P, Cilla JJ, Moya JM (2018) Multiclass network attack classifier using cnn tuned with genetic algorithms. In: 2018 28th international symposium on power and timing modeling, optimization and simulation (PATMOS). IEEE, pp 177–182
33.
Zurück zum Zitat Tran NN, Sarker R, Hu J (2018) An approach for host-based intrusion detection system design using convolutional neural network. In: Lecture notes of the institute for computer sciences, social-informatics and telecommunications engineering, LNICST. pp 116–126 Tran NN, Sarker R, Hu J (2018) An approach for host-based intrusion detection system design using convolutional neural network. In: Lecture notes of the institute for computer sciences, social-informatics and telecommunications engineering, LNICST. pp 116–126
38.
Zurück zum Zitat Panigrahi R, Borah S (2018) A detailed analysis of CICIDS2017 dataset for designing intrusion detection systems. Int J Eng Technol (UAE) 7:479–482 Panigrahi R, Borah S (2018) A detailed analysis of CICIDS2017 dataset for designing intrusion detection systems. Int J Eng Technol (UAE) 7:479–482
39.
Zurück zum Zitat Jolliffe IT (2002) Principal component analysis, 2nd edn. Springer, New YorkMATH Jolliffe IT (2002) Principal component analysis, 2nd edn. Springer, New YorkMATH
44.
Zurück zum Zitat Pedregosa F, Varoquaux G, Gramfort A et al (2011) Scikit-learn: machine learning in python. J Mach Learn Res 12:2825–2830MathSciNetMATH Pedregosa F, Varoquaux G, Gramfort A et al (2011) Scikit-learn: machine learning in python. J Mach Learn Res 12:2825–2830MathSciNetMATH
45.
Zurück zum Zitat Li Z, Qin Z, Huang K et al (2017) Intrusion detection using convolutional neural networks for representation learning. In: Liu D, Xie S, Li Y et al (eds) Lecture notes in computer science (including subseries lecture notes in artificial intelligence and lecture notes in bioinformatics). Springer International Publishing, Cham, pp 858–866 Li Z, Qin Z, Huang K et al (2017) Intrusion detection using convolutional neural networks for representation learning. In: Liu D, Xie S, Li Y et al (eds) Lecture notes in computer science (including subseries lecture notes in artificial intelligence and lecture notes in bioinformatics). Springer International Publishing, Cham, pp 858–866
46.
Zurück zum Zitat Kim T, Suh SC, Kim H, et al (2018) An Encoding Technique for CNN-based network anomaly detection. In: 2018 IEEE international conference on big data (Big Data). IEEE, pp 2960–2965 Kim T, Suh SC, Kim H, et al (2018) An Encoding Technique for CNN-based network anomaly detection. In: 2018 IEEE international conference on big data (Big Data). IEEE, pp 2960–2965
47.
Zurück zum Zitat Chollet F (2019) keras. GitHub repository Chollet F (2019) keras. GitHub repository
49.
Zurück zum Zitat Abadi M, Agarwal A, Barham P, et al (2016) TensorFlow: large-scale machine learning on heterogeneous distributed systems Abadi M, Agarwal A, Barham P, et al (2016) TensorFlow: large-scale machine learning on heterogeneous distributed systems
52.
Zurück zum Zitat Hinton GE, Krizhevsky A, Sutskever I (2016) System and method for addressing overfitting in a Neural Network. 1:4–6 Hinton GE, Krizhevsky A, Sutskever I (2016) System and method for addressing overfitting in a Neural Network. 1:4–6
53.
Zurück zum Zitat Akila Agnes S, Anitha J (2019) Analyzing the effect of optimization strategies in deep convolutional neural network. In: Hemanth J, Balas VE (eds) Nature inspired optimization techniques for image processing applications. Springer International Publishing, Cham, pp 235–253CrossRef Akila Agnes S, Anitha J (2019) Analyzing the effect of optimization strategies in deep convolutional neural network. In: Hemanth J, Balas VE (eds) Nature inspired optimization techniques for image processing applications. Springer International Publishing, Cham, pp 235–253CrossRef
Metadaten
Titel
A novel context-aware feature extraction method for convolutional neural network-based intrusion detection systems
verfasst von
Erfan A. Shams
Ahmet Rizaner
Ali Hakan Ulusoy
Publikationsdatum
13.04.2021
Verlag
Springer London
Erschienen in
Neural Computing and Applications / Ausgabe 20/2021
Print ISSN: 0941-0643
Elektronische ISSN: 1433-3058
DOI
https://doi.org/10.1007/s00521-021-05994-9

Weitere Artikel der Ausgabe 20/2021

Neural Computing and Applications 20/2021 Zur Ausgabe

Premium Partner