A Simple Recurrent Unit Model Based Intrusion Detection System With DCGAN

Due to the complex and time-varying network environments, traditional methods are difficult to extract accurate features of intrusion behavior from the high-dimensional data samples and process the high-volume of these data efficiently. Even worse, the network intrusion samples are submerged into a...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:IEEE access 2019, Vol.7, p.83286-83296
Hauptverfasser: Yang, Jin, Li, Tao, Liang, Gang, He, Wenbo, Zhao, Yue
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 83296
container_issue
container_start_page 83286
container_title IEEE access
container_volume 7
creator Yang, Jin
Li, Tao
Liang, Gang
He, Wenbo
Zhao, Yue
description Due to the complex and time-varying network environments, traditional methods are difficult to extract accurate features of intrusion behavior from the high-dimensional data samples and process the high-volume of these data efficiently. Even worse, the network intrusion samples are submerged into a large number of normal data packets, which leads to insufficient samples for model training; therefore it is accompanied by high false detection rates. To address the challenge of unbalanced positive and negative learning samples, we propose using deep convolutional generative adversarial networks (DCGAN), which allows features to be extracted directly from the rawdata, and then generates new training-sets by learning from the rawdata. Given the fact that the attack samples are usually intra-dependent time sequence data, we apply long short-term memory (LSTM) to automatically learn the features of network intrusion behaviors. However, it is hard to parallelize the learning/training of the LSTM network, since the LSTM algorithm depends on the result of the previous moment. To remove such dependency and enable intrusion detection in real time, we propose a simple recurrent unit based (SRU)-based model. The proposed model was verified by extensive experiments on the benchmark datasets KDD'99 and NSL-KDD, which effectively identifies normal and abnormal network activities. It achieves 99.73% accuracy on the KDD'99 dataset and 99.62% on the NSL-KDD dataset.
doi_str_mv 10.1109/ACCESS.2019.2922692
format Article
fullrecord <record><control><sourceid>proquest_doaj_</sourceid><recordid>TN_cdi_proquest_journals_2455612113</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>8736331</ieee_id><doaj_id>oai_doaj_org_article_e04989d3e06244fba9fca696bb26c7d1</doaj_id><sourcerecordid>2455612113</sourcerecordid><originalsourceid>FETCH-LOGICAL-c458t-c55ba8ba2d4c532c2458778cfcef8d8cd968fb52a9c5af0303e122c9d380d7253</originalsourceid><addsrcrecordid>eNpNUctOwzAQjBBIIOALerHEucWP2LGPIS0QiYdEqThajr2BVG1SbPfA3-MShNjLrkYzsyNNlk0InhGC1XVZVYvlckYxUTOqKBWKHmVnlAg1ZZyJ43_3aXYZwhqnkQnixVlWl2jZbXcbQC9g995DH9Gq7yJ6HBxs0I0J4FDdR78P3dCjOUSw8XAtv0KELXrr4geaV3fl00V20ppNgMvffZ6tbhev1f304fmursqHqc25jFPLeWNkY6jLLWfU0oQWhbSthVY6aZ0Ssm04Ncpy02KGGRBKrXJMYldQzs6zevR1g1nrne-2xn_pwXT6Bxj8uzY-dnYDGnCuZFICFjTP28ao1hqhRNNQYQtHktfV6LXzw-ceQtTrYe_7FF-nXFwQSghLLDayrB9C8ND-fSVYHyrQYwX6UIH-rSCpJqOqA4A_hSyYYIywbw4kgJg</addsrcrecordid><sourcetype>Open Website</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2455612113</pqid></control><display><type>article</type><title>A Simple Recurrent Unit Model Based Intrusion Detection System With DCGAN</title><source>IEEE Open Access Journals</source><source>DOAJ Directory of Open Access Journals</source><source>Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals</source><creator>Yang, Jin ; Li, Tao ; Liang, Gang ; He, Wenbo ; Zhao, Yue</creator><creatorcontrib>Yang, Jin ; Li, Tao ; Liang, Gang ; He, Wenbo ; Zhao, Yue</creatorcontrib><description>Due to the complex and time-varying network environments, traditional methods are difficult to extract accurate features of intrusion behavior from the high-dimensional data samples and process the high-volume of these data efficiently. Even worse, the network intrusion samples are submerged into a large number of normal data packets, which leads to insufficient samples for model training; therefore it is accompanied by high false detection rates. To address the challenge of unbalanced positive and negative learning samples, we propose using deep convolutional generative adversarial networks (DCGAN), which allows features to be extracted directly from the rawdata, and then generates new training-sets by learning from the rawdata. Given the fact that the attack samples are usually intra-dependent time sequence data, we apply long short-term memory (LSTM) to automatically learn the features of network intrusion behaviors. However, it is hard to parallelize the learning/training of the LSTM network, since the LSTM algorithm depends on the result of the previous moment. To remove such dependency and enable intrusion detection in real time, we propose a simple recurrent unit based (SRU)-based model. The proposed model was verified by extensive experiments on the benchmark datasets KDD'99 and NSL-KDD, which effectively identifies normal and abnormal network activities. It achieves 99.73% accuracy on the KDD'99 dataset and 99.62% on the NSL-KDD dataset.</description><identifier>ISSN: 2169-3536</identifier><identifier>EISSN: 2169-3536</identifier><identifier>DOI: 10.1109/ACCESS.2019.2922692</identifier><identifier>CODEN: IAECCG</identifier><language>eng</language><publisher>Piscataway: IEEE</publisher><subject>Algorithms ; Computer architecture ; Datasets ; deep convolutional generative adversarial networks ; Deep learning ; Feature extraction ; Intrusion detection ; intrusion detection system (IDS) ; Intrusion detection systems ; Logic gates ; Machine learning ; Malware ; Network security ; Packets (communication) ; Parallel processing ; simple recurrent unit ; Time dependence ; Training</subject><ispartof>IEEE access, 2019, Vol.7, p.83286-83296</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2019</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c458t-c55ba8ba2d4c532c2458778cfcef8d8cd968fb52a9c5af0303e122c9d380d7253</citedby><cites>FETCH-LOGICAL-c458t-c55ba8ba2d4c532c2458778cfcef8d8cd968fb52a9c5af0303e122c9d380d7253</cites><orcidid>0000-0002-7919-5714</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/8736331$$EHTML$$P50$$Gieee$$Hfree_for_read</linktohtml><link.rule.ids>314,776,780,860,2096,4010,27610,27900,27901,27902,54908</link.rule.ids></links><search><creatorcontrib>Yang, Jin</creatorcontrib><creatorcontrib>Li, Tao</creatorcontrib><creatorcontrib>Liang, Gang</creatorcontrib><creatorcontrib>He, Wenbo</creatorcontrib><creatorcontrib>Zhao, Yue</creatorcontrib><title>A Simple Recurrent Unit Model Based Intrusion Detection System With DCGAN</title><title>IEEE access</title><addtitle>Access</addtitle><description>Due to the complex and time-varying network environments, traditional methods are difficult to extract accurate features of intrusion behavior from the high-dimensional data samples and process the high-volume of these data efficiently. Even worse, the network intrusion samples are submerged into a large number of normal data packets, which leads to insufficient samples for model training; therefore it is accompanied by high false detection rates. To address the challenge of unbalanced positive and negative learning samples, we propose using deep convolutional generative adversarial networks (DCGAN), which allows features to be extracted directly from the rawdata, and then generates new training-sets by learning from the rawdata. Given the fact that the attack samples are usually intra-dependent time sequence data, we apply long short-term memory (LSTM) to automatically learn the features of network intrusion behaviors. However, it is hard to parallelize the learning/training of the LSTM network, since the LSTM algorithm depends on the result of the previous moment. To remove such dependency and enable intrusion detection in real time, we propose a simple recurrent unit based (SRU)-based model. The proposed model was verified by extensive experiments on the benchmark datasets KDD'99 and NSL-KDD, which effectively identifies normal and abnormal network activities. It achieves 99.73% accuracy on the KDD'99 dataset and 99.62% on the NSL-KDD dataset.</description><subject>Algorithms</subject><subject>Computer architecture</subject><subject>Datasets</subject><subject>deep convolutional generative adversarial networks</subject><subject>Deep learning</subject><subject>Feature extraction</subject><subject>Intrusion detection</subject><subject>intrusion detection system (IDS)</subject><subject>Intrusion detection systems</subject><subject>Logic gates</subject><subject>Machine learning</subject><subject>Malware</subject><subject>Network security</subject><subject>Packets (communication)</subject><subject>Parallel processing</subject><subject>simple recurrent unit</subject><subject>Time dependence</subject><subject>Training</subject><issn>2169-3536</issn><issn>2169-3536</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2019</creationdate><recordtype>article</recordtype><sourceid>ESBDL</sourceid><sourceid>RIE</sourceid><sourceid>DOA</sourceid><recordid>eNpNUctOwzAQjBBIIOALerHEucWP2LGPIS0QiYdEqThajr2BVG1SbPfA3-MShNjLrkYzsyNNlk0InhGC1XVZVYvlckYxUTOqKBWKHmVnlAg1ZZyJ43_3aXYZwhqnkQnixVlWl2jZbXcbQC9g995DH9Gq7yJ6HBxs0I0J4FDdR78P3dCjOUSw8XAtv0KELXrr4geaV3fl00V20ppNgMvffZ6tbhev1f304fmursqHqc25jFPLeWNkY6jLLWfU0oQWhbSthVY6aZ0Ssm04Ncpy02KGGRBKrXJMYldQzs6zevR1g1nrne-2xn_pwXT6Bxj8uzY-dnYDGnCuZFICFjTP28ao1hqhRNNQYQtHktfV6LXzw-ceQtTrYe_7FF-nXFwQSghLLDayrB9C8ND-fSVYHyrQYwX6UIH-rSCpJqOqA4A_hSyYYIywbw4kgJg</recordid><startdate>2019</startdate><enddate>2019</enddate><creator>Yang, Jin</creator><creator>Li, Tao</creator><creator>Liang, Gang</creator><creator>He, Wenbo</creator><creator>Zhao, Yue</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>ESBDL</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>7SR</scope><scope>8BQ</scope><scope>8FD</scope><scope>JG9</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>DOA</scope><orcidid>https://orcid.org/0000-0002-7919-5714</orcidid></search><sort><creationdate>2019</creationdate><title>A Simple Recurrent Unit Model Based Intrusion Detection System With DCGAN</title><author>Yang, Jin ; Li, Tao ; Liang, Gang ; He, Wenbo ; Zhao, Yue</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c458t-c55ba8ba2d4c532c2458778cfcef8d8cd968fb52a9c5af0303e122c9d380d7253</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2019</creationdate><topic>Algorithms</topic><topic>Computer architecture</topic><topic>Datasets</topic><topic>deep convolutional generative adversarial networks</topic><topic>Deep learning</topic><topic>Feature extraction</topic><topic>Intrusion detection</topic><topic>intrusion detection system (IDS)</topic><topic>Intrusion detection systems</topic><topic>Logic gates</topic><topic>Machine learning</topic><topic>Malware</topic><topic>Network security</topic><topic>Packets (communication)</topic><topic>Parallel processing</topic><topic>simple recurrent unit</topic><topic>Time dependence</topic><topic>Training</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Yang, Jin</creatorcontrib><creatorcontrib>Li, Tao</creatorcontrib><creatorcontrib>Liang, Gang</creatorcontrib><creatorcontrib>He, Wenbo</creatorcontrib><creatorcontrib>Zhao, Yue</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE Open Access Journals</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics &amp; Communications Abstracts</collection><collection>Engineered Materials Abstracts</collection><collection>METADEX</collection><collection>Technology Research Database</collection><collection>Materials Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>DOAJ Directory of Open Access Journals</collection><jtitle>IEEE access</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Yang, Jin</au><au>Li, Tao</au><au>Liang, Gang</au><au>He, Wenbo</au><au>Zhao, Yue</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>A Simple Recurrent Unit Model Based Intrusion Detection System With DCGAN</atitle><jtitle>IEEE access</jtitle><stitle>Access</stitle><date>2019</date><risdate>2019</risdate><volume>7</volume><spage>83286</spage><epage>83296</epage><pages>83286-83296</pages><issn>2169-3536</issn><eissn>2169-3536</eissn><coden>IAECCG</coden><abstract>Due to the complex and time-varying network environments, traditional methods are difficult to extract accurate features of intrusion behavior from the high-dimensional data samples and process the high-volume of these data efficiently. Even worse, the network intrusion samples are submerged into a large number of normal data packets, which leads to insufficient samples for model training; therefore it is accompanied by high false detection rates. To address the challenge of unbalanced positive and negative learning samples, we propose using deep convolutional generative adversarial networks (DCGAN), which allows features to be extracted directly from the rawdata, and then generates new training-sets by learning from the rawdata. Given the fact that the attack samples are usually intra-dependent time sequence data, we apply long short-term memory (LSTM) to automatically learn the features of network intrusion behaviors. However, it is hard to parallelize the learning/training of the LSTM network, since the LSTM algorithm depends on the result of the previous moment. To remove such dependency and enable intrusion detection in real time, we propose a simple recurrent unit based (SRU)-based model. The proposed model was verified by extensive experiments on the benchmark datasets KDD'99 and NSL-KDD, which effectively identifies normal and abnormal network activities. It achieves 99.73% accuracy on the KDD'99 dataset and 99.62% on the NSL-KDD dataset.</abstract><cop>Piscataway</cop><pub>IEEE</pub><doi>10.1109/ACCESS.2019.2922692</doi><tpages>11</tpages><orcidid>https://orcid.org/0000-0002-7919-5714</orcidid><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 2169-3536
ispartof IEEE access, 2019, Vol.7, p.83286-83296
issn 2169-3536
2169-3536
language eng
recordid cdi_proquest_journals_2455612113
source IEEE Open Access Journals; DOAJ Directory of Open Access Journals; Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals
subjects Algorithms
Computer architecture
Datasets
deep convolutional generative adversarial networks
Deep learning
Feature extraction
Intrusion detection
intrusion detection system (IDS)
Intrusion detection systems
Logic gates
Machine learning
Malware
Network security
Packets (communication)
Parallel processing
simple recurrent unit
Time dependence
Training
title A Simple Recurrent Unit Model Based Intrusion Detection System With DCGAN
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-06T20%3A41%3A04IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_doaj_&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=A%20Simple%20Recurrent%20Unit%20Model%20Based%20Intrusion%20Detection%20System%20With%20DCGAN&rft.jtitle=IEEE%20access&rft.au=Yang,%20Jin&rft.date=2019&rft.volume=7&rft.spage=83286&rft.epage=83296&rft.pages=83286-83296&rft.issn=2169-3536&rft.eissn=2169-3536&rft.coden=IAECCG&rft_id=info:doi/10.1109/ACCESS.2019.2922692&rft_dat=%3Cproquest_doaj_%3E2455612113%3C/proquest_doaj_%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2455612113&rft_id=info:pmid/&rft_ieee_id=8736331&rft_doaj_id=oai_doaj_org_article_e04989d3e06244fba9fca696bb26c7d1&rfr_iscdi=true