IJCNIS Vol. 11, No. 3, 8 Mar. 2019
Cover page and Table of Contents: PDF (size: 698KB)
Full Text (PDF, 698KB), PP.8-14
Views: 0 Downloads: 0
NIDS, deep learning, Sparse auto-encoder, logistic classifier, NSL-KDD
The network infrastructure of any organization is always under constant threat to a variety of attacks; namely, break-ins, security breach or system misuse. The Network Intrusion Detection System (NIDS) employed in a network detects such penetration attacks and intrusions within a network. Known classes of attacks can be detected easily by performing pattern matching while the unknown attacks are harder to detect. An attempt has been made to design a system using a deep learning approach for intrusion detection that not only learns but also adjusts itself to the patterns not defined earlier. Sparse auto-encoder has been used for unsupervised feature learning. Logistic classifier is then utilized for classification on NSL-KDD dataset. The performance of the system has been measured with respect to accuracy, precision and recall and the results have been found to be very promising for future use and modifications.
Sandeep Gurung, Mirnal Kanti Ghose, Aroj Subedi, "Deep Learning Approach on Network Intrusion Detection System using NSL-KDD Dataset", International Journal of Computer Network and Information Security(IJCNIS), Vol.11, No.3, pp.8-14, 2019. DOI:10.5815/ijcnis.2019.03.02
[1]Behrouz A Forouzan, Debdeep Mukhopadhyay (2017), Cryptography and Network Security, (Third Edition), McGraw Hill Education (India) Private Limited.
[2]D. E. Denning, “An Intrusion Detection Model,” IEEE Transactions on Software Engineering, SE-13, pp. 222- 232, 1987.
[3]S. Revathi, Dr. A. Malathi, “A Detailed Analysis on NSL-KDD Dataset Using Various Machine Learning Techniques for Intrusion Detection”, International Journal of Engineering Research & Technology (IJERT), ISSN: 2278- 0181 Vol. 2 Issue 12, December - 2013.
[4]KDD Cup 1999 Data, Available on: http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html, August 2003.
[5]“Nsl-kdd data set for network-based intrusion detection systems.” Available on: http://nsl.cs.unb.ca/KDD/NSL- KDD.html, March 2009.
[6]Q. Niyaz, W. Sun, AY Javaid, and M. Alam, “A Deep Learning Approach for Network Intrusion Detection System” in Proceedings of the 9th EAI International Conference on Bio-inspired Information and Communications Technologies, ser. BICT’15. ICST, Brussels, Belgium, Belgium: ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering), 2016, pp. 21–26. [Online]. Available: http://dx.doi.org/10.4108/eai. 3-12-2015.2262516.
[7]R. Heady, G. Luger, A. Maccabe, and M. Servilla, “The architecture of a network level intrusion detection system”, Technical report, Computer Science Department, University of New Mexico, August 1990.
[8]N. Shone, T. N. Ngoc, Vu D. Phai, “A Deep Learning Approach to Network Intrusion Detection”, IEEE Transactions on Emerging Topics in Computational Intelligence (Volume: 2, Issue: 1) Feb. 2018.
[9]Shyu, M-L., S-C. Chen, K. Sarinnapakorn, and LW. Chang, “A Novel Anomaly Detection Scheme Based on Principal Component Classifier”, ICDM Foundation and New Direction of Data Mining workshop, 03-1221.1-2312, 2003.
[10]K. Alrawashdeh and C. Purdy, “Toward an Online Anomaly Intrusion Detection System Based on Deep Learning,” in 2016 15th IEEE International Conference on Machine Learning and Applications (ICMLA). Anaheim, California, USA: IEEE, dec 2016, pp. 195–200.
[11]Chuanlong Yin, Yuefei Zhu, Jinlong Fei, Xinzheng He, “A Deep Learning Approach for Intrusion Detection Using Recurrent Neural Networks”.