skip to main content
10.1145/3297156.3297230acmotherconferencesArticle/Chapter ViewAbstractPublication PagescsaiConference Proceedingsconference-collections
research-article

Intrusion Detection System for NSL-KDD Dataset Using Convolutional Neural Networks

Published:08 December 2018Publication History

ABSTRACT

With the increment of cyber traffic, there is a growing demand for cyber security. How to accurately detect cyber intrusions is the hotspot of recent research. Traditional Intrusion Detection Systems (IDS), based on traditional machine learning methods, lacks reliability and accuracy. In this paper, we build an IDS model with deep learning methodology. Instead of the traditional machine learning used in previous researches, we think deep learning has the potential to perform better in extracting features of massive data considering the massive cyber traffic in real life. Therefore, we propose to train an IDS model based on Convolution Neural Networks (CNN), a typical deep learning method, using entire NSL-KDD dataset. We study the performance of the model using multi class classification to compare with the performance of traditional machine learning methods including Random Forest (RF) and Support Vector Machine (SVM), and deep learning methods including Deep Belief Network (DBN) and Long Short Term Memory (LSTM). The experimental results show that the performance of our IDS model is superior to the performance of models based on traditional machine learning methods and novel deep learning methods in multi-class classification. Our model improves the accuracy of the intrusion detection and provides a new research direction for intrusion detection.

References

  1. SANS Institute.(2018, Oct.) The History and Evolution of Intrusion Detection. {Online}.Available: https://www.sans.org/reading-room/whitepapers/detection/history-evolution-intrusion-detection-344.Google ScholarGoogle Scholar
  2. Sarkar T, Das N. Survey on Host and Network Based Intrusion Detection System{J}. 2014, 6(2):2266--2269.Google ScholarGoogle Scholar
  3. Yin C, Zhu Y, Fei J, et al. A Deep Learning Approach for Intrusion Detection Using Recurrent Neural Networks{J}. IEEE Access, 2017, 5(99):21954--21961.Google ScholarGoogle ScholarCross RefCross Ref
  4. MLecun Y, Bengio Y, Hinton G. Deep learning{J}. Nature, 2015, 521(7553):436.Google ScholarGoogle ScholarCross RefCross Ref
  5. Schmidhuber J. Deep Learning in neural networks: An overview.{J}. Neural Netw, 2015, 61:85--117. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Javaid A, Niyaz Q, Sun W, et al. A Deep Learning Approach for Network Intrusion Detection System{C}// Eai International Conference on Bio-Inspired Information and Communications Technologies. ICST, 2016:21--26. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Kuang F, Xu W, Zhang S. A novel hybrid KPCA and SVM with GA model for intrusion detection{J}. Applied Soft Computing Journal, 2014, 18(C):178--184. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Li W, Yi P, Wu Y, et al. A New Intrusion Detection System Based on KNN Classification Algorithm in Wireless Sensor Network{J}. Journal of Electrical and Computer Engineering, 2014, 2014(5):1--8.Google ScholarGoogle Scholar
  9. Ingre B, Yadav A. Performance analysis of NSL-KDD dataset using ANN{C}// International Conference on Signal Processing and Communication Engineering Systems. IEEE, 2015:92--96.Google ScholarGoogle Scholar
  10. Farnaaz N, Jabbar M A. Random Forest Modeling for Network Intrusion Detection System{J}. Procedia Computer Science, 2016, 89:213--217.Google ScholarGoogle ScholarCross RefCross Ref
  11. Buczak A L, Guven E. A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection{J}. IEEE Communications Surveys and Tutorials, 2017, 18(2):1153--1176.Google ScholarGoogle ScholarCross RefCross Ref
  12. Qu F, Zhang J, Shao Z, et al. An Intrusion Detection Model Based on Deep Belief Network{C}// Vi International Conference. 2017:97--101. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Kim J, Kim J, Thu H L T, et al. Long Short Term Memory Recurrent Neural Network Classifier for Intrusion Detection{C}// International Conference on Platform Technology and Service. IEEE, 2016:1--5.Google ScholarGoogle Scholar
  14. Abolhasanzadeh B. Nonlinear dimensionality reduction for intrusion detection using auto-encoder bottleneck features{C}// Information and Knowledge Technology. IEEE, 2015:1--5.Google ScholarGoogle Scholar
  15. Fiore U, Palmieri F, Castiglione A, et al. Network anomaly detection with the restricted Boltzmann machine{J}. Neurocomputing, 2013, 122:13--23. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Gibiansky A.(2018, Oct.) Convolutional Neural Networks{Online}. Available: http://andrew.gibiansky.com/blog/machine-learning/convolutional-neural-networks/.Google ScholarGoogle Scholar
  17. Y. LeCun.(2018, Oct.) Learning Invariant feature Hierarchies, 2012. {Online}. Available: http://yann.lecun.com/exdb/publis/pdf/lecun-eccv-12.pdf. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. (2018, Oct.) KDD Cup 1999. {Online}. Available: http://kdd.ics.uci.edu/databases/kddcup99/.Google ScholarGoogle Scholar
  19. Paulauskas N, Auskalnis J. Analysis of data pre-processing influence on intrusion detection using NSL-KDD dataset{C}// Electrical, Electronic and Information Sciences. IEEE, 2017:1--5.Google ScholarGoogle Scholar
  20. Shone N, Ngoc T N, Phai V D, et al. A Deep Learning Approach to Network Intrusion Detection{J}. IEEE Transactions on Emerging Topics in Computational Intelligence, 2018, 2(1):41--50.Google ScholarGoogle ScholarCross RefCross Ref
  21. Naseer S, Saleem Y, Khalid S, et al. Enhanced Network Anomaly Detection Based on Deep Neural Networks{J}. IEEE Access, 2018, PP(99):1--1.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. Intrusion Detection System for NSL-KDD Dataset Using Convolutional Neural Networks

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Other conferences
        CSAI '18: Proceedings of the 2018 2nd International Conference on Computer Science and Artificial Intelligence
        December 2018
        641 pages
        ISBN:9781450366069
        DOI:10.1145/3297156

        Copyright © 2018 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 8 December 2018

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article
        • Research
        • Refereed limited

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader