首页> 外文期刊>International journal of digital crime and forensics >A Comparative Analysis of Deep Learning Approaches for Network Intrusion Detection Systems (N-IDSs): Deep Learning for N-IDSs
【24h】

A Comparative Analysis of Deep Learning Approaches for Network Intrusion Detection Systems (N-IDSs): Deep Learning for N-IDSs

机译:网络入侵检测系统(N-IDS)的深度学习方法的比较分析:N-IDS的深度学习

获取原文
获取原文并翻译 | 示例
       

摘要

Recently, due to the advance and impressive results of deep learning techniques in the fields of image recognition, natural language processing and speech recognition for various long-standing artificial intelligence (AI) tasks, there has been a great interest in applying towards security tasks too. This article focuses on applying these deep taxonomy techniques to network intrusion detection system (N-IDS) with the aim to enhance the performance in classifying the network connections as either good or bad. To substantiate this to NIDS, this article models network traffic as a time series data, specifically transmission control protocol / internet protocol (TCP/IP) packets in a predefined time-window with a supervised deep learning methods such as recurrent neural network (RNN), identity matrix of initialized values typically termed as identity recurrent neural network (IRNN), long short-term memory (LSTM), clock-work RNN (CWRNN) and gated recurrent unit (GRU), utilizing connection records of KDDCup-99 challenge data set. The main interest is given to evaluate the performance of RNN over newly introduced method such as LSTM and IRNN to alleviate the vanishing and exploding gradient problem in memorizing the long-term dependencies. The efficient network architecture for all deep models is chosen based on comparing the performance of various network topologies and network parameters. The experiments of such chosen efficient configurations of deep models were run up to 1,000 epochs by varying learning-rates between 0.01-05. The observed results of IRNN are relatively close to the performance of LSTM on KDDCup-99 NIDS data set. In addition to KDDCup-99, the effectiveness of deep model architectures are evaluated on refined version of KDDCup-99: NSL-KDD and most recent one, UNSW-NB15 NIDS datasets.
机译:近年来,由于深度学习技术在图像识别,自然语言处理和语音识别等领域的长期应用,在各种长期的人工智能(AI)任务中取得了令人瞩目的成就,因此人们对将其应用于安全任务也产生了极大的兴趣。 。本文重点介绍将这些深层分类技术应用于网络入侵检测系统(N-IDS),旨在提高将网络连接分类为好还是坏的性能。为了用NIDS证实这一点,本文将网络流量建模为时间序列数据,特别是在预定义的时间窗中使用监督型深度学习方法(例如递归神经网络(RNN))将传输控制协议/互联网协议(TCP / IP)数据包建模,利用KDDCup-99质询数据的连接记录,通常称为身份递归神经网络(IRNN),长期短期记忆(LSTM),时钟工作RNN(CWRNN)和门控递归单元(GRU)的初始值的身份矩阵组。主要兴趣在于评估RNN在新引入的方法(如LSTM和IRNN)上的性能,以缓解记忆长期依赖关系时消失和爆炸的梯度问题。通过比较各种网络拓扑和网络参数的性能,为所有深度模型选择有效的网络体系结构。通过选择学习率在0.01-05之间,这种选择的有效的深度模型配置实验最多可运行1,000个纪元。 IRNN的观察结果相对接近LSTM在KDDCup-99 NIDS数据集上的性能。除了KDDCup-99之外,还在完善版本的KDDCup-99(NSL-KDD)和最新的UNSW-NB15 NIDS数据集上评估了深度模型架构的有效性。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号