Skip to main content

2020 | OriginalPaper | Buchkapitel

MLP4NIDS: An Efficient MLP-Based Network Intrusion Detection for CICIDS2017 Dataset

verfasst von : Arnaud Rosay, Florent Carlier, Pascal Leroux

Erschienen in: Machine Learning for Networking

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

More and more embedded devices are connected to the internet and therefore are potential victims of intrusion. While machine learning algorithms have proven to be robust techniques, it is mainly achieved with traditional processing, neural network giving worse results. In this paper, we propose usage of a multi-layer perceptron neural network for intrusion detection and provide a detailed description of our methodology. We detail all steps to achieve better performances than traditional machine learning techniques with a detection of intrusion accuracy above 99% and a low false positive rate kept below 0.7%. Results of previous works are analyzed and compared with the performances of the proposed solution.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
2.
Zurück zum Zitat Chawla, N.V., Bowyer, K.W., Hall, L.O., Kegelmeyer, W.P.: SMOTE: synthetic minority over-sampling technique. J. Artif. Intell. Res. 16, 321–357 (2002)CrossRef Chawla, N.V., Bowyer, K.W., Hall, L.O., Kegelmeyer, W.P.: SMOTE: synthetic minority over-sampling technique. J. Artif. Intell. Res. 16, 321–357 (2002)CrossRef
3.
Zurück zum Zitat Dhanabal, L., Shantharajah, D.S.P.: A study on NSL-KDD dataset for intrusion detection system based on classification algorithms. Int. J. Adv. Res. Comput. Commun. Eng. 4, 446–452 (2015) Dhanabal, L., Shantharajah, D.S.P.: A study on NSL-KDD dataset for intrusion detection system based on classification algorithms. Int. J. Adv. Res. Comput. Commun. Eng. 4, 446–452 (2015)
6.
Zurück zum Zitat Jiang, J., et al.: ALDD: a hybrid traffic-user behavior detection method for application layer DDoS. In: 2018 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications/12th IEEE International Conference on Big Data Science and Engineering (TrustCom/BigDataSE), pp. 1565–1569, August 2018. https://doi.org/10.1109/TrustCom/BigDataSE.2018.00225 Jiang, J., et al.: ALDD: a hybrid traffic-user behavior detection method for application layer DDoS. In: 2018 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications/12th IEEE International Conference on Big Data Science and Engineering (TrustCom/BigDataSE), pp. 1565–1569, August 2018. https://​doi.​org/​10.​1109/​TrustCom/​BigDataSE.​2018.​00225
7.
Zurück zum Zitat Kingma, D.P., Ba, J.: Adam: a method for stochastic optimization. In: 2015 3rd International Conference for Learning Representations (2014) Kingma, D.P., Ba, J.: Adam: a method for stochastic optimization. In: 2015 3rd International Conference for Learning Representations (2014)
8.
Zurück zum Zitat Klambauer, G., Unterthiner, T., Mayr, A., Hochreiter, S.: Self-normalizing neural networks. In: 2017 Advances in Neural Information Processing Systems, pp. 971–980 (2017) Klambauer, G., Unterthiner, T., Mayr, A., Hochreiter, S.: Self-normalizing neural networks. In: 2017 Advances in Neural Information Processing Systems, pp. 971–980 (2017)
9.
Zurück zum Zitat Lee, W., Stolfo, S.J., Mok, K.W.: Mining in a data-flow environment: experience in network intrusion detection. In: Proceedings of the Fifth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD 1999, pp. 114–124. ACM, New York (1999). https://doi.org/10.1145/312129.312212 Lee, W., Stolfo, S.J., Mok, K.W.: Mining in a data-flow environment: experience in network intrusion detection. In: Proceedings of the Fifth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD 1999, pp. 114–124. ACM, New York (1999). https://​doi.​org/​10.​1145/​312129.​312212
12.
Zurück zum Zitat European Parliament: Regulation (EU) 2015/758 of the European Parliament and of the Council of 29 April 2015 concerning type-approval requirements for the deployment of the eCall in-vehicle system based on the 112 service and amending Directive 2007/46/EC. Official Journal of the European Union, May 2015 European Parliament: Regulation (EU) 2015/758 of the European Parliament and of the Council of 29 April 2015 concerning type-approval requirements for the deployment of the eCall in-vehicle system based on the 112 service and amending Directive 2007/46/EC. Official Journal of the European Union, May 2015
13.
Zurück zum Zitat Riyaz, B., Ganapathy, S.: An intelligent fuzzy rule based feature selection for effective intrusion detection. In: 2018 International Conference on Recent Trends in Advance Computing (ICRTAC), pp. 206–211, September 2018 Riyaz, B., Ganapathy, S.: An intelligent fuzzy rule based feature selection for effective intrusion detection. In: 2018 International Conference on Recent Trends in Advance Computing (ICRTAC), pp. 206–211, September 2018
14.
Zurück zum Zitat Sharafaldin, I., Lashkari, A.H., Ghorbani, A.A.: Toward generating a new intrusion detection dataset and intrusion traffic characterization. In: Proceedings of the 4th International Conference on Information Systems Security and Privacy - Volume 1: ICISSP, pp. 108–116. SciTePress, January 2018. https://doi.org/10.5220/0006639801080116 Sharafaldin, I., Lashkari, A.H., Ghorbani, A.A.: Toward generating a new intrusion detection dataset and intrusion traffic characterization. In: Proceedings of the 4th International Conference on Information Systems Security and Privacy - Volume 1: ICISSP, pp. 108–116. SciTePress, January 2018. https://​doi.​org/​10.​5220/​0006639801080116​
16.
Zurück zum Zitat Tang, T.A., Mhamdi, L., McLernon, D., Zaidi, S.A.R., Ghogho, M.: Deep learning approach for Network Intrusion Detection in Software Defined Networking. In: 2016 International Conference on Wireless Networks and Mobile Communications (WINCOM), pp. 258–263, October 2016. https://doi.org/10.1109/WINCOM.2016.7777224 Tang, T.A., Mhamdi, L., McLernon, D., Zaidi, S.A.R., Ghogho, M.: Deep learning approach for Network Intrusion Detection in Software Defined Networking. In: 2016 International Conference on Wireless Networks and Mobile Communications (WINCOM), pp. 258–263, October 2016. https://​doi.​org/​10.​1109/​WINCOM.​2016.​7777224
19.
Zurück zum Zitat Ustebay, S., Turgut, Z., Aydin, M.A.: Intrusion detection system with recursive feature elimination by using random forest and deep learning classifier. In: 2018 International Congress on Big Data, Deep Learning and Fighting Cyber Terrorism (IBIGDELFT), pp. 71–76, December 2018. https://doi.org/10.1109/IBIGDELFT.2018.8625318 Ustebay, S., Turgut, Z., Aydin, M.A.: Intrusion detection system with recursive feature elimination by using random forest and deep learning classifier. In: 2018 International Congress on Big Data, Deep Learning and Fighting Cyber Terrorism (IBIGDELFT), pp. 71–76, December 2018. https://​doi.​org/​10.​1109/​IBIGDELFT.​2018.​8625318
Metadaten
Titel
MLP4NIDS: An Efficient MLP-Based Network Intrusion Detection for CICIDS2017 Dataset
verfasst von
Arnaud Rosay
Florent Carlier
Pascal Leroux
Copyright-Jahr
2020
DOI
https://doi.org/10.1007/978-3-030-45778-5_16