Skip to main content
Erschienen in: The Journal of Supercomputing 4/2021

25.08.2020

Network intrusion detection using multi-architectural modular deep neural network

verfasst von: Ramin Atefinia, Mahmood Ahmadi

Erschienen in: The Journal of Supercomputing | Ausgabe 4/2021

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The exponential growth of computer networks and the adoption of new network-based technologies have made computer security an important challenge. With the emergence of new internet-connected devices, the attack surface is increasing for cyber intruders. Many intrusion detection systems attempt to detect known attacks using signatures in network traffic. In recent years, researchers used several machine learning techniques to detect network attacks without relying on these signatures. These techniques generally suffer from a high false-positive rate which is not acceptable for an industry-ready intrusion detection product. In this paper, we propose a multi-architectural modular deep neural network model to decrease the false-positive rate of anomaly-based intrusion detection systems. Our model consists of a feed-forward module, a stack of restricted Boltzmann machine module, and two recurrent modules, the output weights of these modules are fed to an aggregator module to produce the answer of the model. The experiments are performed using CSE-CIC-IDS2018 dataset, and final models can be used in an IDS for generating alerts or preventing new attacks. The experimental results show improvement in the detection of some types of network attacks with accuracy as high as 100% for network-level attacks compared to related works.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Al-Yaseen WL, Othman ZA, Nazri MZA (2017) Multi-level hybrid support vector machine and extreme learning machine based on modified k-means for intrusion detection system. Expert Syst Appl 67:296–303CrossRef Al-Yaseen WL, Othman ZA, Nazri MZA (2017) Multi-level hybrid support vector machine and extreme learning machine based on modified k-means for intrusion detection system. Expert Syst Appl 67:296–303CrossRef
2.
Zurück zum Zitat Amer M, Maul T (2019) A review of modularization techniques in artificial neural networks. Artif Intell Rev 52(1):527–561CrossRef Amer M, Maul T (2019) A review of modularization techniques in artificial neural networks. Artif Intell Rev 52(1):527–561CrossRef
3.
Zurück zum Zitat Basnet RB, Shash R, Johnson C, Walgren L, Doleck T (2019) Towards detecting and classifying network intrusion traffic using deep learning frameworks. J Internet Serv Inf Secur 9(4):1–17 Basnet RB, Shash R, Johnson C, Walgren L, Doleck T (2019) Towards detecting and classifying network intrusion traffic using deep learning frameworks. J Internet Serv Inf Secur 9(4):1–17
4.
Zurück zum Zitat Chen CM, Chen YL, Lin HC (2010) An efficient network intrusion detection. Comput Commun 33(4):477–484CrossRef Chen CM, Chen YL, Lin HC (2010) An efficient network intrusion detection. Comput Commun 33(4):477–484CrossRef
5.
Zurück zum Zitat Chung J, Gulcehre C, Cho K, Bengio Y (2014) Empirical evaluation of gated recurrent neural networks on sequence modeling. arXiv preprint arXiv:14123555 Chung J, Gulcehre C, Cho K, Bengio Y (2014) Empirical evaluation of gated recurrent neural networks on sequence modeling. arXiv preprint arXiv:​14123555
6.
Zurück zum Zitat De la Hoz E, Emiro DLH, Andres O, Julio O, Beatriz P (2015) PCA filtering and probabilistic SOM for network intrusion detection. Neurocomputing 164:71–81 De la Hoz E, Emiro DLH, Andres O, Julio O, Beatriz P (2015) PCA filtering and probabilistic SOM for network intrusion detection. Neurocomputing 164:71–81
7.
Zurück zum Zitat de Lima Filho FS, Silveira FA, de Medeiros Brito Junior A, Vargas-Solar G, Silveira LF (2019) Smart detection: an online approach for DoS/DDoS attack detection using machine learning. Security and Communication Networks 2019 de Lima Filho FS, Silveira FA, de Medeiros Brito Junior A, Vargas-Solar G, Silveira LF (2019) Smart detection: an online approach for DoS/DDoS attack detection using machine learning. Security and Communication Networks 2019
8.
Zurück zum Zitat Dong B, Wang X (2016) Comparison deep learning method to traditional methods using for network intrusion detection. In: 8th IEEE International Conference on Communication Software and Networks (ICCSN), pp 581–585 Dong B, Wang X (2016) Comparison deep learning method to traditional methods using for network intrusion detection. In: 8th IEEE International Conference on Communication Software and Networks (ICCSN), pp 581–585
9.
Zurück zum Zitat Govindarajan M, Chandrasekaran R (2011) Intrusion detection using neural based hybrid classification methods. Comput Netw 55(8):1662–1671CrossRef Govindarajan M, Chandrasekaran R (2011) Intrusion detection using neural based hybrid classification methods. Comput Netw 55(8):1662–1671CrossRef
10.
Zurück zum Zitat Happel BL, Murre JM (1994) Design and evolution of modular neural network architectures. Neural Netw 7(6–7):985–1004CrossRef Happel BL, Murre JM (1994) Design and evolution of modular neural network architectures. Neural Netw 7(6–7):985–1004CrossRef
11.
Zurück zum Zitat Heberlein LT (2007) Statistical problems with statistical based intrusion detection. Tech. rep., Version1, Net Squared, Inc Heberlein LT (2007) Statistical problems with statistical based intrusion detection. Tech. rep., Version1, Net Squared, Inc
12.
Zurück zum Zitat Hinton GE (2012) A practical guide to training restricted boltzmann machines. In: Neural networks: tricks of the trade, pp 599–619 Hinton GE (2012) A practical guide to training restricted boltzmann machines. In: Neural networks: tricks of the trade, pp 599–619
13.
Zurück zum Zitat Hinton GE, Osindero S, Teh YW (2006) A fast learning algorithm for deep belief networks. Neural Comput 18(7):1527–1554MathSciNetCrossRef Hinton GE, Osindero S, Teh YW (2006) A fast learning algorithm for deep belief networks. Neural Comput 18(7):1527–1554MathSciNetCrossRef
14.
Zurück zum Zitat Hochreiter S, Schmidhuber J (1997) Long short-term memory. Neural Comput 9(8):1735–1780CrossRef Hochreiter S, Schmidhuber J (1997) Long short-term memory. Neural Comput 9(8):1735–1780CrossRef
15.
Zurück zum Zitat Hodo E, Bellekens X, Hamilton A, Dubouilh PL, Iorkyase E, Tachtatzis C, Atkinson R (2016) Threat analysis of iot networks using artificial neural network intrusion detection system. In: International Symposium on Networks, Computers and Communications (ISNCC), pp 1–6 Hodo E, Bellekens X, Hamilton A, Dubouilh PL, Iorkyase E, Tachtatzis C, Atkinson R (2016) Threat analysis of iot networks using artificial neural network intrusion detection system. In: International Symposium on Networks, Computers and Communications (ISNCC), pp 1–6
16.
Zurück zum Zitat Hsu CM, Hsieh HY, Prakosa SW, Azhari MZ, Leu JS (2018) Using long-short-term memory based convolutional neural networks for network intrusion detection. In: IEEE International Wireless Internet Conference, pp 86–94 Hsu CM, Hsieh HY, Prakosa SW, Azhari MZ, Leu JS (2018) Using long-short-term memory based convolutional neural networks for network intrusion detection. In: IEEE International Wireless Internet Conference, pp 86–94
17.
Zurück zum Zitat Iqbal A, Aftab S (2019) A feed-forward and pattern recognition ann model for network intrusion detection. Int J Comput Netw Inf Secur 11(4):19–25 Iqbal A, Aftab S (2019) A feed-forward and pattern recognition ann model for network intrusion detection. Int J Comput Netw Inf Secur 11(4):19–25
18.
Zurück zum Zitat Javaid A, Niyaz Q, Sun W, Alam M (2016) A deep learning approach for network intrusion detection system. In: Proceedings of the 9th EAI International Conference on Bio-inspired Information and Communications Technologies (formerly BIONETICS), pp 21–26 Javaid A, Niyaz Q, Sun W, Alam M (2016) A deep learning approach for network intrusion detection system. In: Proceedings of the 9th EAI International Conference on Bio-inspired Information and Communications Technologies (formerly BIONETICS), pp 21–26
19.
Zurück zum Zitat Karatas G, Demir O, Sahingoz OK (2020) Increasing the performance of machine learning-based IDSs on an imbalanced and up-to-date dataset. IEEE Access Karatas G, Demir O, Sahingoz OK (2020) Increasing the performance of machine learning-based IDSs on an imbalanced and up-to-date dataset. IEEE Access
20.
Zurück zum Zitat Kevric J, Jukic S, Subasi A (2017) An effective combining classifier approach using tree algorithms for network intrusion detection. Neural Comput Appl 28(1):1051–1058CrossRef Kevric J, Jukic S, Subasi A (2017) An effective combining classifier approach using tree algorithms for network intrusion detection. Neural Comput Appl 28(1):1051–1058CrossRef
21.
Zurück zum Zitat Lee S (2004) Hierarchical neural network intrusion detector. US Patent App. 10/433,713 Lee S (2004) Hierarchical neural network intrusion detector. US Patent App. 10/433,713
22.
Zurück zum Zitat Lin P, Ye K, Xu CZ (2019) Dynamic network anomaly detection system by using deep learning techniques. In: International Conference on Cloud Computing, pp 161–176 Lin P, Ye K, Xu CZ (2019) Dynamic network anomaly detection system by using deep learning techniques. In: International Conference on Cloud Computing, pp 161–176
23.
Zurück zum Zitat Lypa B, Iver O, Kifer V (2019) Application of machine learning methods for network intrusion detection system Lypa B, Iver O, Kifer V (2019) Application of machine learning methods for network intrusion detection system
24.
Zurück zum Zitat Marir N, Wang H, Feng G, Li B, Jia M (2018) Distributed abnormal behavior detection approach based on deep belief network and ensemble SVM using spark. IEEE Access 6:59657–59671CrossRef Marir N, Wang H, Feng G, Li B, Jia M (2018) Distributed abnormal behavior detection approach based on deep belief network and ensemble SVM using spark. IEEE Access 6:59657–59671CrossRef
25.
Zurück zum Zitat Paxson V (1999) Bro: a system for detecting network intruders in real-time. Comput Netw 31(23–24):2435–2463CrossRef Paxson V (1999) Bro: a system for detecting network intruders in real-time. Comput Netw 31(23–24):2435–2463CrossRef
26.
Zurück zum Zitat Rios ALG, Li Z, Bekshentayeva K, Trajkovic L (2020) Detection of denial of service attacks in communication networks Rios ALG, Li Z, Bekshentayeva K, Trajkovic L (2020) Detection of denial of service attacks in communication networks
27.
Zurück zum Zitat Roesch M (1999) Snort: lightweight intrusion detection for networks. In: LISA ’99: Proceedings of the 13th USENIX Conference on System Administration, vol 99, pp 229–238 Roesch M (1999) Snort: lightweight intrusion detection for networks. In: LISA ’99: Proceedings of the 13th USENIX Conference on System Administration, vol 99, pp 229–238
28.
Zurück zum Zitat Sahu S, Mehtre BM (2015) Network intrusion detection system using j48 decision tree. In: 2015 International Conference on Advances in Computing, Communications and Informatics (ICACCI), pp 2023–2026 Sahu S, Mehtre BM (2015) Network intrusion detection system using j48 decision tree. In: 2015 International Conference on Advances in Computing, Communications and Informatics (ICACCI), pp 2023–2026
29.
Zurück zum Zitat Saraswati A, Hagenbuchner M, Zhou ZQ (2016) High resolution som approach to improving anomaly detection in intrusion detection systems. In: AI 2016: Advances in Artificial Intelligence, pp 191–199 Saraswati A, Hagenbuchner M, Zhou ZQ (2016) High resolution som approach to improving anomaly detection in intrusion detection systems. In: AI 2016: Advances in Artificial Intelligence, pp 191–199
30.
Zurück zum Zitat Shams EA, Rizaner A (2018) A novel support vector machine based intrusion detection system for mobile ad hoc networks. Wireless Netw 24(5):1821–1829CrossRef Shams EA, Rizaner A (2018) A novel support vector machine based intrusion detection system for mobile ad hoc networks. Wireless Netw 24(5):1821–1829CrossRef
31.
Zurück zum Zitat Shone N, Ngoc TN, Phai VD, Shi Q (2018) A deep learning approach to network intrusion detection. IEEE Trans Emerg Top Comput Intell 2(1):41–50CrossRef Shone N, Ngoc TN, Phai VD, Shi Q (2018) A deep learning approach to network intrusion detection. IEEE Trans Emerg Top Comput Intell 2(1):41–50CrossRef
32.
Zurück zum Zitat Singh Panwar S, Raiwani Y, Panwar LS (2019) Evaluation of network intrusion detection with features selection and machine learning algorithms on CICIDS-2017 dataset. Available at SSRN 3394103 Singh Panwar S, Raiwani Y, Panwar LS (2019) Evaluation of network intrusion detection with features selection and machine learning algorithms on CICIDS-2017 dataset. Available at SSRN 3394103
33.
Zurück zum Zitat Song H, Woo J, Li FF (2019) In-vehicle network intrusion detection using deep convolutional neural network Song H, Woo J, Li FF (2019) In-vehicle network intrusion detection using deep convolutional neural network
34.
Zurück zum Zitat Sporns O, Betzel RF (2016) Modular brain networks. Annu Rev Psychol 67:613–640CrossRef Sporns O, Betzel RF (2016) Modular brain networks. Annu Rev Psychol 67:613–640CrossRef
35.
Zurück zum Zitat Ullah I, Mahmoud QH (2019) A two-level hybrid model for anomalous activity detection in IoT networks. In: 2019 16th IEEE Annual Consumer Communications and Networking Conference (CCNC), pp 1–6 Ullah I, Mahmoud QH (2019) A two-level hybrid model for anomalous activity detection in IoT networks. In: 2019 16th IEEE Annual Consumer Communications and Networking Conference (CCNC), pp 1–6
36.
Zurück zum Zitat Xiao Y, Xing C, Zhang T, Zhao Z (2019) An intrusion detection model based on feature reduction and convolutional neural networks. IEEE Access 7:42210–42219CrossRef Xiao Y, Xing C, Zhang T, Zhao Z (2019) An intrusion detection model based on feature reduction and convolutional neural networks. IEEE Access 7:42210–42219CrossRef
37.
Zurück zum Zitat Zhou Q, Pezaros D (2019) Evaluation of machine learning classifiers for zero-day intrusion detection: an analysis on CIC-AWS-2018 dataset. arXiv preprint arXiv:190503685 Zhou Q, Pezaros D (2019) Evaluation of machine learning classifiers for zero-day intrusion detection: an analysis on CIC-AWS-2018 dataset. arXiv preprint arXiv:​190503685
Metadaten
Titel
Network intrusion detection using multi-architectural modular deep neural network
verfasst von
Ramin Atefinia
Mahmood Ahmadi
Publikationsdatum
25.08.2020
Verlag
Springer US
Erschienen in
The Journal of Supercomputing / Ausgabe 4/2021
Print ISSN: 0920-8542
Elektronische ISSN: 1573-0484
DOI
https://doi.org/10.1007/s11227-020-03410-y

Weitere Artikel der Ausgabe 4/2021

The Journal of Supercomputing 4/2021 Zur Ausgabe

Premium Partner