A Simple Recurrent Unit Model Based Intrusion Detection System With DCGAN
Due to the complex and time-varying network environments, traditional methods are difficult to extract accurate features of intrusion behavior from the high-dimensional data samples and process the high-volume of these data efficiently. Even worse, the network intrusion samples are submerged into a...
Gespeichert in:
Veröffentlicht in: | IEEE access 2019, Vol.7, p.83286-83296 |
---|---|
Hauptverfasser: | , , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 83296 |
---|---|
container_issue | |
container_start_page | 83286 |
container_title | IEEE access |
container_volume | 7 |
creator | Yang, Jin Li, Tao Liang, Gang He, Wenbo Zhao, Yue |
description | Due to the complex and time-varying network environments, traditional methods are difficult to extract accurate features of intrusion behavior from the high-dimensional data samples and process the high-volume of these data efficiently. Even worse, the network intrusion samples are submerged into a large number of normal data packets, which leads to insufficient samples for model training; therefore it is accompanied by high false detection rates. To address the challenge of unbalanced positive and negative learning samples, we propose using deep convolutional generative adversarial networks (DCGAN), which allows features to be extracted directly from the rawdata, and then generates new training-sets by learning from the rawdata. Given the fact that the attack samples are usually intra-dependent time sequence data, we apply long short-term memory (LSTM) to automatically learn the features of network intrusion behaviors. However, it is hard to parallelize the learning/training of the LSTM network, since the LSTM algorithm depends on the result of the previous moment. To remove such dependency and enable intrusion detection in real time, we propose a simple recurrent unit based (SRU)-based model. The proposed model was verified by extensive experiments on the benchmark datasets KDD'99 and NSL-KDD, which effectively identifies normal and abnormal network activities. It achieves 99.73% accuracy on the KDD'99 dataset and 99.62% on the NSL-KDD dataset. |
doi_str_mv | 10.1109/ACCESS.2019.2922692 |
format | Article |
fullrecord | <record><control><sourceid>proquest_doaj_</sourceid><recordid>TN_cdi_proquest_journals_2455612113</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>8736331</ieee_id><doaj_id>oai_doaj_org_article_e04989d3e06244fba9fca696bb26c7d1</doaj_id><sourcerecordid>2455612113</sourcerecordid><originalsourceid>FETCH-LOGICAL-c458t-c55ba8ba2d4c532c2458778cfcef8d8cd968fb52a9c5af0303e122c9d380d7253</originalsourceid><addsrcrecordid>eNpNUctOwzAQjBBIIOALerHEucWP2LGPIS0QiYdEqThajr2BVG1SbPfA3-MShNjLrkYzsyNNlk0InhGC1XVZVYvlckYxUTOqKBWKHmVnlAg1ZZyJ43_3aXYZwhqnkQnixVlWl2jZbXcbQC9g995DH9Gq7yJ6HBxs0I0J4FDdR78P3dCjOUSw8XAtv0KELXrr4geaV3fl00V20ppNgMvffZ6tbhev1f304fmursqHqc25jFPLeWNkY6jLLWfU0oQWhbSthVY6aZ0Ssm04Ncpy02KGGRBKrXJMYldQzs6zevR1g1nrne-2xn_pwXT6Bxj8uzY-dnYDGnCuZFICFjTP28ao1hqhRNNQYQtHktfV6LXzw-ceQtTrYe_7FF-nXFwQSghLLDayrB9C8ND-fSVYHyrQYwX6UIH-rSCpJqOqA4A_hSyYYIywbw4kgJg</addsrcrecordid><sourcetype>Open Website</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2455612113</pqid></control><display><type>article</type><title>A Simple Recurrent Unit Model Based Intrusion Detection System With DCGAN</title><source>IEEE Open Access Journals</source><source>DOAJ Directory of Open Access Journals</source><source>Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals</source><creator>Yang, Jin ; Li, Tao ; Liang, Gang ; He, Wenbo ; Zhao, Yue</creator><creatorcontrib>Yang, Jin ; Li, Tao ; Liang, Gang ; He, Wenbo ; Zhao, Yue</creatorcontrib><description>Due to the complex and time-varying network environments, traditional methods are difficult to extract accurate features of intrusion behavior from the high-dimensional data samples and process the high-volume of these data efficiently. Even worse, the network intrusion samples are submerged into a large number of normal data packets, which leads to insufficient samples for model training; therefore it is accompanied by high false detection rates. To address the challenge of unbalanced positive and negative learning samples, we propose using deep convolutional generative adversarial networks (DCGAN), which allows features to be extracted directly from the rawdata, and then generates new training-sets by learning from the rawdata. Given the fact that the attack samples are usually intra-dependent time sequence data, we apply long short-term memory (LSTM) to automatically learn the features of network intrusion behaviors. However, it is hard to parallelize the learning/training of the LSTM network, since the LSTM algorithm depends on the result of the previous moment. To remove such dependency and enable intrusion detection in real time, we propose a simple recurrent unit based (SRU)-based model. The proposed model was verified by extensive experiments on the benchmark datasets KDD'99 and NSL-KDD, which effectively identifies normal and abnormal network activities. It achieves 99.73% accuracy on the KDD'99 dataset and 99.62% on the NSL-KDD dataset.</description><identifier>ISSN: 2169-3536</identifier><identifier>EISSN: 2169-3536</identifier><identifier>DOI: 10.1109/ACCESS.2019.2922692</identifier><identifier>CODEN: IAECCG</identifier><language>eng</language><publisher>Piscataway: IEEE</publisher><subject>Algorithms ; Computer architecture ; Datasets ; deep convolutional generative adversarial networks ; Deep learning ; Feature extraction ; Intrusion detection ; intrusion detection system (IDS) ; Intrusion detection systems ; Logic gates ; Machine learning ; Malware ; Network security ; Packets (communication) ; Parallel processing ; simple recurrent unit ; Time dependence ; Training</subject><ispartof>IEEE access, 2019, Vol.7, p.83286-83296</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2019</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c458t-c55ba8ba2d4c532c2458778cfcef8d8cd968fb52a9c5af0303e122c9d380d7253</citedby><cites>FETCH-LOGICAL-c458t-c55ba8ba2d4c532c2458778cfcef8d8cd968fb52a9c5af0303e122c9d380d7253</cites><orcidid>0000-0002-7919-5714</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/8736331$$EHTML$$P50$$Gieee$$Hfree_for_read</linktohtml><link.rule.ids>314,776,780,860,2096,4010,27610,27900,27901,27902,54908</link.rule.ids></links><search><creatorcontrib>Yang, Jin</creatorcontrib><creatorcontrib>Li, Tao</creatorcontrib><creatorcontrib>Liang, Gang</creatorcontrib><creatorcontrib>He, Wenbo</creatorcontrib><creatorcontrib>Zhao, Yue</creatorcontrib><title>A Simple Recurrent Unit Model Based Intrusion Detection System With DCGAN</title><title>IEEE access</title><addtitle>Access</addtitle><description>Due to the complex and time-varying network environments, traditional methods are difficult to extract accurate features of intrusion behavior from the high-dimensional data samples and process the high-volume of these data efficiently. Even worse, the network intrusion samples are submerged into a large number of normal data packets, which leads to insufficient samples for model training; therefore it is accompanied by high false detection rates. To address the challenge of unbalanced positive and negative learning samples, we propose using deep convolutional generative adversarial networks (DCGAN), which allows features to be extracted directly from the rawdata, and then generates new training-sets by learning from the rawdata. Given the fact that the attack samples are usually intra-dependent time sequence data, we apply long short-term memory (LSTM) to automatically learn the features of network intrusion behaviors. However, it is hard to parallelize the learning/training of the LSTM network, since the LSTM algorithm depends on the result of the previous moment. To remove such dependency and enable intrusion detection in real time, we propose a simple recurrent unit based (SRU)-based model. The proposed model was verified by extensive experiments on the benchmark datasets KDD'99 and NSL-KDD, which effectively identifies normal and abnormal network activities. It achieves 99.73% accuracy on the KDD'99 dataset and 99.62% on the NSL-KDD dataset.</description><subject>Algorithms</subject><subject>Computer architecture</subject><subject>Datasets</subject><subject>deep convolutional generative adversarial networks</subject><subject>Deep learning</subject><subject>Feature extraction</subject><subject>Intrusion detection</subject><subject>intrusion detection system (IDS)</subject><subject>Intrusion detection systems</subject><subject>Logic gates</subject><subject>Machine learning</subject><subject>Malware</subject><subject>Network security</subject><subject>Packets (communication)</subject><subject>Parallel processing</subject><subject>simple recurrent unit</subject><subject>Time dependence</subject><subject>Training</subject><issn>2169-3536</issn><issn>2169-3536</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2019</creationdate><recordtype>article</recordtype><sourceid>ESBDL</sourceid><sourceid>RIE</sourceid><sourceid>DOA</sourceid><recordid>eNpNUctOwzAQjBBIIOALerHEucWP2LGPIS0QiYdEqThajr2BVG1SbPfA3-MShNjLrkYzsyNNlk0InhGC1XVZVYvlckYxUTOqKBWKHmVnlAg1ZZyJ43_3aXYZwhqnkQnixVlWl2jZbXcbQC9g995DH9Gq7yJ6HBxs0I0J4FDdR78P3dCjOUSw8XAtv0KELXrr4geaV3fl00V20ppNgMvffZ6tbhev1f304fmursqHqc25jFPLeWNkY6jLLWfU0oQWhbSthVY6aZ0Ssm04Ncpy02KGGRBKrXJMYldQzs6zevR1g1nrne-2xn_pwXT6Bxj8uzY-dnYDGnCuZFICFjTP28ao1hqhRNNQYQtHktfV6LXzw-ceQtTrYe_7FF-nXFwQSghLLDayrB9C8ND-fSVYHyrQYwX6UIH-rSCpJqOqA4A_hSyYYIywbw4kgJg</recordid><startdate>2019</startdate><enddate>2019</enddate><creator>Yang, Jin</creator><creator>Li, Tao</creator><creator>Liang, Gang</creator><creator>He, Wenbo</creator><creator>Zhao, Yue</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>ESBDL</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>7SR</scope><scope>8BQ</scope><scope>8FD</scope><scope>JG9</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>DOA</scope><orcidid>https://orcid.org/0000-0002-7919-5714</orcidid></search><sort><creationdate>2019</creationdate><title>A Simple Recurrent Unit Model Based Intrusion Detection System With DCGAN</title><author>Yang, Jin ; Li, Tao ; Liang, Gang ; He, Wenbo ; Zhao, Yue</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c458t-c55ba8ba2d4c532c2458778cfcef8d8cd968fb52a9c5af0303e122c9d380d7253</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2019</creationdate><topic>Algorithms</topic><topic>Computer architecture</topic><topic>Datasets</topic><topic>deep convolutional generative adversarial networks</topic><topic>Deep learning</topic><topic>Feature extraction</topic><topic>Intrusion detection</topic><topic>intrusion detection system (IDS)</topic><topic>Intrusion detection systems</topic><topic>Logic gates</topic><topic>Machine learning</topic><topic>Malware</topic><topic>Network security</topic><topic>Packets (communication)</topic><topic>Parallel processing</topic><topic>simple recurrent unit</topic><topic>Time dependence</topic><topic>Training</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Yang, Jin</creatorcontrib><creatorcontrib>Li, Tao</creatorcontrib><creatorcontrib>Liang, Gang</creatorcontrib><creatorcontrib>He, Wenbo</creatorcontrib><creatorcontrib>Zhao, Yue</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE Open Access Journals</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics & Communications Abstracts</collection><collection>Engineered Materials Abstracts</collection><collection>METADEX</collection><collection>Technology Research Database</collection><collection>Materials Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>DOAJ Directory of Open Access Journals</collection><jtitle>IEEE access</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Yang, Jin</au><au>Li, Tao</au><au>Liang, Gang</au><au>He, Wenbo</au><au>Zhao, Yue</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>A Simple Recurrent Unit Model Based Intrusion Detection System With DCGAN</atitle><jtitle>IEEE access</jtitle><stitle>Access</stitle><date>2019</date><risdate>2019</risdate><volume>7</volume><spage>83286</spage><epage>83296</epage><pages>83286-83296</pages><issn>2169-3536</issn><eissn>2169-3536</eissn><coden>IAECCG</coden><abstract>Due to the complex and time-varying network environments, traditional methods are difficult to extract accurate features of intrusion behavior from the high-dimensional data samples and process the high-volume of these data efficiently. Even worse, the network intrusion samples are submerged into a large number of normal data packets, which leads to insufficient samples for model training; therefore it is accompanied by high false detection rates. To address the challenge of unbalanced positive and negative learning samples, we propose using deep convolutional generative adversarial networks (DCGAN), which allows features to be extracted directly from the rawdata, and then generates new training-sets by learning from the rawdata. Given the fact that the attack samples are usually intra-dependent time sequence data, we apply long short-term memory (LSTM) to automatically learn the features of network intrusion behaviors. However, it is hard to parallelize the learning/training of the LSTM network, since the LSTM algorithm depends on the result of the previous moment. To remove such dependency and enable intrusion detection in real time, we propose a simple recurrent unit based (SRU)-based model. The proposed model was verified by extensive experiments on the benchmark datasets KDD'99 and NSL-KDD, which effectively identifies normal and abnormal network activities. It achieves 99.73% accuracy on the KDD'99 dataset and 99.62% on the NSL-KDD dataset.</abstract><cop>Piscataway</cop><pub>IEEE</pub><doi>10.1109/ACCESS.2019.2922692</doi><tpages>11</tpages><orcidid>https://orcid.org/0000-0002-7919-5714</orcidid><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | ISSN: 2169-3536 |
ispartof | IEEE access, 2019, Vol.7, p.83286-83296 |
issn | 2169-3536 2169-3536 |
language | eng |
recordid | cdi_proquest_journals_2455612113 |
source | IEEE Open Access Journals; DOAJ Directory of Open Access Journals; Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals |
subjects | Algorithms Computer architecture Datasets deep convolutional generative adversarial networks Deep learning Feature extraction Intrusion detection intrusion detection system (IDS) Intrusion detection systems Logic gates Machine learning Malware Network security Packets (communication) Parallel processing simple recurrent unit Time dependence Training |
title | A Simple Recurrent Unit Model Based Intrusion Detection System With DCGAN |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-06T20%3A41%3A04IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_doaj_&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=A%20Simple%20Recurrent%20Unit%20Model%20Based%20Intrusion%20Detection%20System%20With%20DCGAN&rft.jtitle=IEEE%20access&rft.au=Yang,%20Jin&rft.date=2019&rft.volume=7&rft.spage=83286&rft.epage=83296&rft.pages=83286-83296&rft.issn=2169-3536&rft.eissn=2169-3536&rft.coden=IAECCG&rft_id=info:doi/10.1109/ACCESS.2019.2922692&rft_dat=%3Cproquest_doaj_%3E2455612113%3C/proquest_doaj_%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2455612113&rft_id=info:pmid/&rft_ieee_id=8736331&rft_doaj_id=oai_doaj_org_article_e04989d3e06244fba9fca696bb26c7d1&rfr_iscdi=true |