Skip to main content

2020 | OriginalPaper | Buchkapitel

Towards a Hierarchical Deep Learning Approach for Intrusion Detection

verfasst von : François Alin, Amine Chemchem, Florent Nolot, Olivier Flauzac, Michaël Krajecki

Erschienen in: Machine Learning for Networking

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Nowadays, it is almost impossible to imagine our daily life without Internet. This strong dependence requires an effective and rigorous consideration of all the risks related to computer attacks. However traditional methods of protection are not always effective, and usually very expensive in treatment resources. That is why this paper presents a new hierarchical method based on deep learning algorithms to deal with intrusion detection. This method has proven to be very effective across traditional implementation on four public datasets, and meets all the other requirements of an efficient intrusion detection system.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
2.
Zurück zum Zitat Stolfo, S.J., Salem, M.B., Keromytis, A.D.: Fog computing: mitigating insider data theft attacks in the cloud. In: 2012 IEEE Symposium on Security Privacy Workshops. IEEE (2012) Stolfo, S.J., Salem, M.B., Keromytis, A.D.: Fog computing: mitigating insider data theft attacks in the cloud. In: 2012 IEEE Symposium on Security Privacy Workshops. IEEE (2012)
3.
Zurück zum Zitat Carter, E.: CCSP Self-study: Cisco Secure Intrusion Detection System (CSIDS). Cisco Press, Indianapolis (2004) Carter, E.: CCSP Self-study: Cisco Secure Intrusion Detection System (CSIDS). Cisco Press, Indianapolis (2004)
4.
Zurück zum Zitat Ouharoun, M., Adi, K., Pelc, A.: Modélisation de détection d’intrusion par des jeux probabilistes. Diss. Université du Québec en Outaouais (2010) Ouharoun, M., Adi, K., Pelc, A.: Modélisation de détection d’intrusion par des jeux probabilistes. Diss. Université du Québec en Outaouais (2010)
5.
Zurück zum Zitat Leite, A., Girardi, R.: A hybrid and learning agent architecture for network intrusion detection. J. Syst. Softw. 130, 59–80 (2017)CrossRef Leite, A., Girardi, R.: A hybrid and learning agent architecture for network intrusion detection. J. Syst. Softw. 130, 59–80 (2017)CrossRef
6.
Zurück zum Zitat Wang, H., Jie, G., Wang, S.: An effective intrusion detection framework based on SVM with feature augmentation. Knowl.-Based Syst. 136, 130–139 (2017)CrossRef Wang, H., Jie, G., Wang, S.: An effective intrusion detection framework based on SVM with feature augmentation. Knowl.-Based Syst. 136, 130–139 (2017)CrossRef
7.
Zurück zum Zitat Kuang, F., Weihong, X., Zhang, S.: A novel hybrid KPCA and SVM with GA model for intrusion detection. Appl. Soft Comput. 18, 178–184 (2014)CrossRef Kuang, F., Weihong, X., Zhang, S.: A novel hybrid KPCA and SVM with GA model for intrusion detection. Appl. Soft Comput. 18, 178–184 (2014)CrossRef
8.
Zurück zum Zitat Stein, G., et al.: Decision tree classifier for network intrusion detection with GA-based feature selection. In: Proceedings of the 43rd Annual Southeast Regional Conference-Volume 2. ACM (2005) Stein, G., et al.: Decision tree classifier for network intrusion detection with GA-based feature selection. In: Proceedings of the 43rd Annual Southeast Regional Conference-Volume 2. ACM (2005)
9.
Zurück zum Zitat Al-Yaseen, W.L., Othman, Z.A., Nazri, M.Z.A.: Multi-level hybrid support vector machine and extreme learning machine based on modified K-means for intrusion detection system. Expert Syst. Appl. 67, 296–303 (2017) Al-Yaseen, W.L., Othman, Z.A., Nazri, M.Z.A.: Multi-level hybrid support vector machine and extreme learning machine based on modified K-means for intrusion detection system. Expert Syst. Appl. 67, 296–303 (2017)
10.
Zurück zum Zitat Kim, J., et al.: Long short term memory recurrent neural network classifier for intrusion detection. In: 2016 International Conference on Platform Technology and Service (PlatCon). IEEE (2016) Kim, J., et al.: Long short term memory recurrent neural network classifier for intrusion detection. In: 2016 International Conference on Platform Technology and Service (PlatCon). IEEE (2016)
11.
Zurück zum Zitat RajeshKumar, G., Mangathayaru, N., Narsimha, G.: Intrusion detection a text mining based approach. arXiv preprint arXiv:1603.03837 (2016) RajeshKumar, G., Mangathayaru, N., Narsimha, G.: Intrusion detection a text mining based approach. arXiv preprint arXiv:​1603.​03837 (2016)
12.
Zurück zum Zitat Buczak, A.L., Guven, E.: A survey of data mining and machine learning methods for cyber security intrusion detection. IEEE Commun. Surv. Tutorials 18(2), 1153–1176 (2016)CrossRef Buczak, A.L., Guven, E.: A survey of data mining and machine learning methods for cyber security intrusion detection. IEEE Commun. Surv. Tutorials 18(2), 1153–1176 (2016)CrossRef
13.
Zurück zum Zitat Wang, W., et al.: HAST-IDS: learning hierarchical spatial-temporal features using deep neural networks to improve intrusion detection. IEEE Access 6, 1792–1806 (2018) Wang, W., et al.: HAST-IDS: learning hierarchical spatial-temporal features using deep neural networks to improve intrusion detection. IEEE Access 6, 1792–1806 (2018)
14.
Zurück zum Zitat Chemchem, A., Alin, F., Krajecki, M.: Improving the cognitive agent intelligence by deep knowledge classification. Int. J. Comput. Intell. Appl. 18, 1950005 (2019) Chemchem, A., Alin, F., Krajecki, M.: Improving the cognitive agent intelligence by deep knowledge classification. Int. J. Comput. Intell. Appl. 18, 1950005 (2019)
15.
Zurück zum Zitat Chemchem, A., Alin, F., Krajecki, M.: Combining SMOTE sampling and machine learning for forecasting wheat yields in France. In: 2019 IEEE Second International Conference on Artificial Intelligence and Knowledge Engineering (AIKE). IEEE (2019) Chemchem, A., Alin, F., Krajecki, M.: Combining SMOTE sampling and machine learning for forecasting wheat yields in France. In: 2019 IEEE Second International Conference on Artificial Intelligence and Knowledge Engineering (AIKE). IEEE (2019)
16.
Zurück zum Zitat Jain, A., Mandowara, J.: Text classification by combining text classifiers to improve the efficiency of classification. Int. J. Comput. Appl. (2250–1797) 6(2) (2016) Jain, A., Mandowara, J.: Text classification by combining text classifiers to improve the efficiency of classification. Int. J. Comput. Appl. (2250–1797) 6(2) (2016)
17.
Zurück zum Zitat Huang, J., Lu, J., Ling, C.X.: Comparing naive Bayes, decision trees, and SVM with AUC and accuracy. In: Third IEEE International Conference on Data Mining (ICDM), p. 553 (2003) Huang, J., Lu, J., Ling, C.X.: Comparing naive Bayes, decision trees, and SVM with AUC and accuracy. In: Third IEEE International Conference on Data Mining (ICDM), p. 553 (2003)
18.
Zurück zum Zitat Adeniyi, D., Wei, Z., Yongquan, Y.: Automated web usage data mining and recommendation system using K-nearest neighbor (KNN) classification method. Appl. Comput. Inform. 12(1), 90–108 (2016)CrossRef Adeniyi, D., Wei, Z., Yongquan, Y.: Automated web usage data mining and recommendation system using K-nearest neighbor (KNN) classification method. Appl. Comput. Inform. 12(1), 90–108 (2016)CrossRef
19.
Zurück zum Zitat Wu, X.: Top 10 algorithms in data mining. Knowl. Inf. Syst. 14(1), 1–37 (2008) Wu, X.: Top 10 algorithms in data mining. Knowl. Inf. Syst. 14(1), 1–37 (2008)
20.
Zurück zum Zitat Guyon, I., Weston, J., Barnhill, S., Vapnik, V.: Gene selection for cancer classification using support vector machines. Mach. Learn. 46(1), 389–422 (2002)CrossRef Guyon, I., Weston, J., Barnhill, S., Vapnik, V.: Gene selection for cancer classification using support vector machines. Mach. Learn. 46(1), 389–422 (2002)CrossRef
21.
Zurück zum Zitat Vapnik, V.: The Nature of Statistical Learning Theory. Springer, Heidelberg (2013)MATH Vapnik, V.: The Nature of Statistical Learning Theory. Springer, Heidelberg (2013)MATH
22.
Zurück zum Zitat Hsu, C.-W., Lin, C.-J.: A comparison of methods for multiclass support vector machines. IEEE Trans. Neural Netw. 13(2), 415–425 (2002)CrossRef Hsu, C.-W., Lin, C.-J.: A comparison of methods for multiclass support vector machines. IEEE Trans. Neural Netw. 13(2), 415–425 (2002)CrossRef
24.
Zurück zum Zitat Dietterich, T.G.: Machine learning: four current directions. AI Mag. 18(4), 97–136 (1997) Dietterich, T.G.: Machine learning: four current directions. AI Mag. 18(4), 97–136 (1997)
26.
Zurück zum Zitat Aggarwal, C.C.: Data Classification: Algorithms and Applications. CRC Press, Boca Raton (2014) Aggarwal, C.C.: Data Classification: Algorithms and Applications. CRC Press, Boca Raton (2014)
27.
Zurück zum Zitat Anthimopoulos, M., Christodoulidis, S., Ebner, L., Christe, A., Mougiakakou, S.: Lung pattern classification for interstitial lung diseases using a deep convolutional neural network. IEEE Trans. Med. Imaging 35(5), 1207–1216 (2016)CrossRef Anthimopoulos, M., Christodoulidis, S., Ebner, L., Christe, A., Mougiakakou, S.: Lung pattern classification for interstitial lung diseases using a deep convolutional neural network. IEEE Trans. Med. Imaging 35(5), 1207–1216 (2016)CrossRef
28.
Zurück zum Zitat Kim, Y.: Convolutional neural networks for sentence classification, CoRR abs/1408.5882 (2014) Kim, Y.: Convolutional neural networks for sentence classification, CoRR abs/1408.5882 (2014)
Metadaten
Titel
Towards a Hierarchical Deep Learning Approach for Intrusion Detection
verfasst von
François Alin
Amine Chemchem
Florent Nolot
Olivier Flauzac
Michaël Krajecki
Copyright-Jahr
2020
DOI
https://doi.org/10.1007/978-3-030-45778-5_2