Skip to main content
Erschienen in: The Journal of Supercomputing 15/2023

08.05.2023

TL-CNN-IDS: transfer learning-based intrusion detection system using convolutional neural network

verfasst von: Fengru Yan, Guanghua Zhang, Dongwen Zhang, Xinghua Sun, Botao Hou, Naiwen Yu

Erschienen in: The Journal of Supercomputing | Ausgabe 15/2023

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

To address the problems of insufficient training samples and unbalanced sample classes for intrusion detection in real network environments, this paper proposes an intrusion detection system TL-CNN-IDS based on transfer learning and ensemble learning. First, preprocessing using IG-FCBF feature engineering methods followed by conversion of the obtained dataset into an image form suitable for CNN model input. Secondly, three CNN models of VGG16, Inception, and Xception are selected as the basic learning model, and the hyperparameter optimization method of the Tree-Structured Parzen Estimator algorithm is adopted to search the best model on the target dataset. Finally, the optimized CNN model is integrated using the ensemble learning method of confidence averaging. Experiments were conducted on the CICIDS2017 dataset with accuracy, precision, recall, and F1-score exceeding 99.85% and validation of model effectiveness on the NSL-KDD dataset. The experimental results show that the proposed TL-CNN-IDS can achieve network intrusion detection and outperform other intrusion detection methods.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Yang L, Manias D M, Shami A (2021) PWPAE: An Ensemble Framework for Concept Drift Adaptation in IoT Data Streams. In: IEEE Global Communications Conference (GLOBECOM), pp 01–06 Yang L, Manias D M, Shami A (2021) PWPAE: An Ensemble Framework for Concept Drift Adaptation in IoT Data Streams. In: IEEE Global Communications Conference (GLOBECOM), pp 01–06
2.
Zurück zum Zitat Hosseini S, Nezhad AE, Seilani H (2022) Botnet detection using negative selection algorithm, convolution neural network and classification methods. Evol Syst 13(1):101–115CrossRef Hosseini S, Nezhad AE, Seilani H (2022) Botnet detection using negative selection algorithm, convolution neural network and classification methods. Evol Syst 13(1):101–115CrossRef
3.
Zurück zum Zitat Alauthman M, Aslam N, Al-Kasassbeh M et al (2020) An efficient reinforcement learning-based Botnet detection approach. J Netw Comput Appl 150:102479CrossRef Alauthman M, Aslam N, Al-Kasassbeh M et al (2020) An efficient reinforcement learning-based Botnet detection approach. J Netw Comput Appl 150:102479CrossRef
4.
Zurück zum Zitat Obaidat I, Sridhar M, Pham KM et al (2022) Jadeite: a novel image-behavior-based approach for Java malware detection using deep learning. Comput Secur 113:102547CrossRef Obaidat I, Sridhar M, Pham KM et al (2022) Jadeite: a novel image-behavior-based approach for Java malware detection using deep learning. Comput Secur 113:102547CrossRef
5.
Zurück zum Zitat Kim TG, Kang BJ, Rho M et al (2018) A multimodal deep learning method for android malware detection using various features. IEEE Trans Inf Forensics Secur 14(3):773–788CrossRef Kim TG, Kang BJ, Rho M et al (2018) A multimodal deep learning method for android malware detection using various features. IEEE Trans Inf Forensics Secur 14(3):773–788CrossRef
6.
Zurück zum Zitat Alzaylaee MK, Yerima SY, Sezer S (2020) DL-Droid: deep learning based android malware detection using real devices. Comput Secur 89:101663CrossRef Alzaylaee MK, Yerima SY, Sezer S (2020) DL-Droid: deep learning based android malware detection using real devices. Comput Secur 89:101663CrossRef
7.
Zurück zum Zitat Ferrag MA, Maglaras L, Moschoyiannis S et al (2020) Deep learning for cyber security intrusion detection: approaches, datasets, and comparative study. J Inf Secur Appl 50:102419 Ferrag MA, Maglaras L, Moschoyiannis S et al (2020) Deep learning for cyber security intrusion detection: approaches, datasets, and comparative study. J Inf Secur Appl 50:102419
8.
Zurück zum Zitat Vinayakumar R, Alazab M, Soman KP et al (2019) Deep learning approach for intelligent intrusion detection system. IEEE Access 7:41525–41550CrossRef Vinayakumar R, Alazab M, Soman KP et al (2019) Deep learning approach for intelligent intrusion detection system. IEEE Access 7:41525–41550CrossRef
9.
Zurück zum Zitat Alzubi OA (2022) A deep learning-based frechet and dirichlet model for intrusion detection in IWSN. J Intell Fuzzy Syst 42(2):873–883CrossRef Alzubi OA (2022) A deep learning-based frechet and dirichlet model for intrusion detection in IWSN. J Intell Fuzzy Syst 42(2):873–883CrossRef
10.
Zurück zum Zitat Shahamiri SR (2021) Speech vision: an end-to-end deep learning-based dysarthric automatic speech recognition system. IEEE Trans Neural Syst Rehabil Eng 29:852–861CrossRef Shahamiri SR (2021) Speech vision: an end-to-end deep learning-based dysarthric automatic speech recognition system. IEEE Trans Neural Syst Rehabil Eng 29:852–861CrossRef
11.
Zurück zum Zitat Syed ZH, Trabelsi A, Helbert E et al (2021) Question answering chatbot for troubleshooting queries based on transfer learning. Proc Comput Sci 192:941–950CrossRef Syed ZH, Trabelsi A, Helbert E et al (2021) Question answering chatbot for troubleshooting queries based on transfer learning. Proc Comput Sci 192:941–950CrossRef
12.
Zurück zum Zitat Abou Baker N, Zengeler N, Handmann U (2022) A transfer learning evaluation of deep neural networks for image classification. Mach Learn Knowl Extr 4(1):22–41CrossRef Abou Baker N, Zengeler N, Handmann U (2022) A transfer learning evaluation of deep neural networks for image classification. Mach Learn Knowl Extr 4(1):22–41CrossRef
13.
Zurück zum Zitat Kaur T, Gandhi TK (2020) Deep convolutional neural networks with transfer learning for automated brain image classification. Mach Vis Appl 31(3):1–16CrossRef Kaur T, Gandhi TK (2020) Deep convolutional neural networks with transfer learning for automated brain image classification. Mach Vis Appl 31(3):1–16CrossRef
14.
Zurück zum Zitat Liu B, Xiao Y, Hao Z (2018) A selective multiple instance transfer learning method for text categorization problems. Knowl-Based Syst 141:178–187CrossRef Liu B, Xiao Y, Hao Z (2018) A selective multiple instance transfer learning method for text categorization problems. Knowl-Based Syst 141:178–187CrossRef
15.
Zurück zum Zitat Semwal T, Yenigalla P, Mathur G et al (2018) A practitioners' guide to transfer learning for text classification using convolutional neural networks. In: Proceedings of the 2018 SIAM International Conference on Data Mining. Society for Industrial and Applied Mathematics, pp 513–521 Semwal T, Yenigalla P, Mathur G et al (2018) A practitioners' guide to transfer learning for text classification using convolutional neural networks. In: Proceedings of the 2018 SIAM International Conference on Data Mining. Society for Industrial and Applied Mathematics, pp 513–521
16.
Zurück zum Zitat Tan C, Sun F, Kong T et al (2018) A survey on deep transfer learning. In: International Conference on Artificial Neural Metworks. Springer, Cham, pp 270-279 Tan C, Sun F, Kong T et al (2018) A survey on deep transfer learning. In: International Conference on Artificial Neural Metworks. Springer, Cham, pp 270-279
17.
Zurück zum Zitat Sharafaldin I, Lashkari AH, Ghorbani AA (2018) Toward generating a new intrusion detection dataset and intrusion traffic characterization. ICISSp 1:108–116 Sharafaldin I, Lashkari AH, Ghorbani AA (2018) Toward generating a new intrusion detection dataset and intrusion traffic characterization. ICISSp 1:108–116
18.
Zurück zum Zitat Su T, Sun H, Zhu J et al (2020) BAT: deep learning methods on network intrusion detection using NSL-KDD dataset. IEEE Access 8:29575–29585CrossRef Su T, Sun H, Zhu J et al (2020) BAT: deep learning methods on network intrusion detection using NSL-KDD dataset. IEEE Access 8:29575–29585CrossRef
19.
Zurück zum Zitat Wang Z, Liu Y, Daojing HE et al (2021) Intrusion detection methods based on integrated deep learning model. Comput Secur 2021:102177CrossRef Wang Z, Liu Y, Daojing HE et al (2021) Intrusion detection methods based on integrated deep learning model. Comput Secur 2021:102177CrossRef
20.
Zurück zum Zitat Shone N, Ngoc TN, Phai VD et al (2018) A deep learning approach to net-intrusion detection. IEEE Trans Emerg Topics Comput Intell 2(1):41–50CrossRef Shone N, Ngoc TN, Phai VD et al (2018) A deep learning approach to net-intrusion detection. IEEE Trans Emerg Topics Comput Intell 2(1):41–50CrossRef
21.
Zurück zum Zitat Jie HJ, Wanda P (2020) RunPool: a dynamic pooling layer for convolution neural network. Int J Comput Intell Syst 13(1):66–76CrossRef Jie HJ, Wanda P (2020) RunPool: a dynamic pooling layer for convolution neural network. Int J Comput Intell Syst 13(1):66–76CrossRef
22.
Zurück zum Zitat Wanda P, Jie HJ (2020) DeepProfile: finding fake profile in online social network using dynamic CNN. J Inf Secur Appl 52:102465 Wanda P, Jie HJ (2020) DeepProfile: finding fake profile in online social network using dynamic CNN. J Inf Secur Appl 52:102465
23.
Zurück zum Zitat Wanda P, Jie HJ (2019) URLDeep: continuous prediction of malicious URL with dynamic deep learning in social networks. Int J Netw Secur 21(6):971–978 Wanda P, Jie HJ (2019) URLDeep: continuous prediction of malicious URL with dynamic deep learning in social networks. Int J Netw Secur 21(6):971–978
24.
Zurück zum Zitat Mehedi ST, Anwar A, Rahman Z et al (2021) Deep transfer learning based intrusion detection system for electric vehicular networks. Sensors 21(14):4736CrossRef Mehedi ST, Anwar A, Rahman Z et al (2021) Deep transfer learning based intrusion detection system for electric vehicular networks. Sensors 21(14):4736CrossRef
25.
Zurück zum Zitat Lu MX, Du GZ, Ji ZX (2020) Network intrusion detection based on deep transfer learning. Appl Res Comput 37(9):4 Lu MX, Du GZ, Ji ZX (2020) Network intrusion detection based on deep transfer learning. Appl Res Comput 37(9):4
26.
Zurück zum Zitat Hu J, Su YD, Huang WZ et al (2019) Intrusion detection method based on ensemble transfer learning via weighted mutual information. J Comput Appl 39(11):3310–3315 Hu J, Su YD, Huang WZ et al (2019) Intrusion detection method based on ensemble transfer learning via weighted mutual information. J Comput Appl 39(11):3310–3315
27.
Zurück zum Zitat Hundman K, Constantinou V, Laporte C et al (2018) Detecting spacecraft anomalies using lstms and nonparametric dynamic thresholding. In: Proceedings of the 24th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, pp 387–395 Hundman K, Constantinou V, Laporte C et al (2018) Detecting spacecraft anomalies using lstms and nonparametric dynamic thresholding. In: Proceedings of the 24th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, pp 387–395
28.
Zurück zum Zitat Muningsih E, Kiswati S (2018) Sistem aplikasi berbasis optimasi metode elbow untuk penentuan clustering pelanggan. Joutica 3(1):117–124CrossRef Muningsih E, Kiswati S (2018) Sistem aplikasi berbasis optimasi metode elbow untuk penentuan clustering pelanggan. Joutica 3(1):117–124CrossRef
29.
Zurück zum Zitat Wu T, Fan H, Zhu H et al (2022) (2022) Intrusion detection system combined enhanced random forest with SMOTE algorithm. EURASIP J Adv Signal Process 1:1–20 Wu T, Fan H, Zhu H et al (2022) (2022) Intrusion detection system combined enhanced random forest with SMOTE algorithm. EURASIP J Adv Signal Process 1:1–20
30.
Zurück zum Zitat Yu L, Liu H (2003) Efficiently handling feature redundancy in high-dimensional data. In: Proceedings of the Ninth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp 685–690 Yu L, Liu H (2003) Efficiently handling feature redundancy in high-dimensional data. In: Proceedings of the Ninth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp 685–690
31.
Zurück zum Zitat Li Z, Yu-Yu Y, Cong W (2018) FCBF feature selection algorithm based on maximum information coefficient. J Beijing Univ Posts Telecommun 41(4):86 Li Z, Yu-Yu Y, Cong W (2018) FCBF feature selection algorithm based on maximum information coefficient. J Beijing Univ Posts Telecommun 41(4):86
32.
Zurück zum Zitat Lokman SF, Othman AT, Bakar MHA et al (2019). The impact of different feature scaling methods on intrusion detection for in-Vehicle Controller Area Network (CAN). In: International Conference on Advances in Cyber Security. Springer, Singapore, pp 195-205 Lokman SF, Othman AT, Bakar MHA et al (2019). The impact of different feature scaling methods on intrusion detection for in-Vehicle Controller Area Network (CAN). In: International Conference on Advances in Cyber Security. Springer, Singapore, pp 195-205
33.
34.
Zurück zum Zitat Simonyan K, Zisserman A (2014) Very deep convolutional networks for large-scale image recognition. arXiv preprint arXiv:1409.1556 Simonyan K, Zisserman A (2014) Very deep convolutional networks for large-scale image recognition. arXiv preprint arXiv:​1409.​1556
35.
Zurück zum Zitat Szegedy C, Vanhoucke V, Ioffe S et al (2016) Rethinking the inception architecture for computer vision. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp 2818–2826 Szegedy C, Vanhoucke V, Ioffe S et al (2016) Rethinking the inception architecture for computer vision. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp 2818–2826
36.
Zurück zum Zitat Chollet F (2017) Xception: Deep learning with depthwise separable convolutions. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp 1251–1258 Chollet F (2017) Xception: Deep learning with depthwise separable convolutions. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp 1251–1258
37.
Zurück zum Zitat Leonardo M M, Carvalho T J, Rezende E et al (2018) Deep feature-based classifiers for fruit fly identification (Diptera: Tephritidae). In: 2018 31st SIBGRAPI Conference on Graphics, Patterns and Images (SIBGRAPI), pp 41–47 Leonardo M M, Carvalho T J, Rezende E et al (2018) Deep feature-based classifiers for fruit fly identification (Diptera: Tephritidae). In: 2018 31st SIBGRAPI Conference on Graphics, Patterns and Images (SIBGRAPI), pp 41–47
38.
Zurück zum Zitat Bergstra J, Bardenet R, Bengio Y et al (2011) Algorithms for hyper-parameter optimization. In: Advances in neural information processing systems, pp 2546–2554 Bergstra J, Bardenet R, Bengio Y et al (2011) Algorithms for hyper-parameter optimization. In: Advances in neural information processing systems, pp 2546–2554
39.
Zurück zum Zitat Yang L, Moubayed A, Shami A (2021) MTH-IDS: a multitiered hybrid intrusion detection system for Internet of vehicles. IEEE Internet Things J 9(1):616–632CrossRef Yang L, Moubayed A, Shami A (2021) MTH-IDS: a multitiered hybrid intrusion detection system for Internet of vehicles. IEEE Internet Things J 9(1):616–632CrossRef
40.
Zurück zum Zitat Large J, Lines J, Bagnall A (2019) A probabilistic classifier ensemble weighting scheme based on cross-validated accuracy estimates. Data Min Knowl Disc 33(6):1674–1709MathSciNetCrossRefMATH Large J, Lines J, Bagnall A (2019) A probabilistic classifier ensemble weighting scheme based on cross-validated accuracy estimates. Data Min Knowl Disc 33(6):1674–1709MathSciNetCrossRefMATH
41.
Zurück zum Zitat Yang L, Moubayed A, Hamieh I et al (2019) Tree-based intelligent intrusion detection system in internet of vehicles. In: 2019 IEEE Global Communications Conference (GLOBECOM), pp 1–6 Yang L, Moubayed A, Hamieh I et al (2019) Tree-based intelligent intrusion detection system in internet of vehicles. In: 2019 IEEE Global Communications Conference (GLOBECOM), pp 1–6
42.
Zurück zum Zitat Rosay A, Carlier F, Leroux P (2020) Feed-forward neural network for Network Intrusion Detection. In: 2020 IEEE 91st Vehicular Technology Conference (VTC2020-Spring), pp 1–6 Rosay A, Carlier F, Leroux P (2020) Feed-forward neural network for Network Intrusion Detection. In: 2020 IEEE 91st Vehicular Technology Conference (VTC2020-Spring), pp 1–6
43.
Zurück zum Zitat Elmasry W, Akbulut A, Zaim AH (2020) Evolving deep learning architectures for network intrusion detection using a double PSO metaheuristic. Comput Netw 168:107042CrossRef Elmasry W, Akbulut A, Zaim AH (2020) Evolving deep learning architectures for network intrusion detection using a double PSO metaheuristic. Comput Netw 168:107042CrossRef
44.
Zurück zum Zitat Mushtaq E, Zameer A, Umer M, Abbasi AA (2022) A two-stage intrusion detection system with auto-encoder and LSTMs. Appl Soft Comput 121:108768CrossRef Mushtaq E, Zameer A, Umer M, Abbasi AA (2022) A two-stage intrusion detection system with auto-encoder and LSTMs. Appl Soft Comput 121:108768CrossRef
Metadaten
Titel
TL-CNN-IDS: transfer learning-based intrusion detection system using convolutional neural network
verfasst von
Fengru Yan
Guanghua Zhang
Dongwen Zhang
Xinghua Sun
Botao Hou
Naiwen Yu
Publikationsdatum
08.05.2023
Verlag
Springer US
Erschienen in
The Journal of Supercomputing / Ausgabe 15/2023
Print ISSN: 0920-8542
Elektronische ISSN: 1573-0484
DOI
https://doi.org/10.1007/s11227-023-05347-4

Weitere Artikel der Ausgabe 15/2023

The Journal of Supercomputing 15/2023 Zur Ausgabe

Premium Partner