16
views
0
recommends
+1 Recommend
0 collections
    0
    shares
      • Record: found
      • Abstract: found
      • Article: found
      Is Open Access

      Improving the Classification Effectiveness of Intrusion Detection by Using Improved Conditional Variational AutoEncoder and Deep Neural Network

      research-article

      Read this article at

      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Abstract

          Intrusion detection systems play an important role in preventing security threats and protecting networks from attacks. However, with the emergence of unknown attacks and imbalanced samples, traditional machine learning methods suffer from lower detection rates and higher false positive rates. We propose a novel intrusion detection model that combines an improved conditional variational AutoEncoder (ICVAE) with a deep neural network (DNN), namely ICVAE-DNN. ICVAE is used to learn and explore potential sparse representations between network data features and classes. The trained ICVAE decoder generates new attack samples according to the specified intrusion categories to balance the training data and increase the diversity of training samples, thereby improving the detection rate of the imbalanced attacks. The trained ICVAE encoder is not only used to automatically reduce data dimension, but also to initialize the weight of DNN hidden layers, so that DNN can easily achieve global optimization through back propagation and fine tuning. The NSL-KDD and UNSW-NB15 datasets are used to evaluate the performance of the ICVAE-DNN. The ICVAE-DNN is superior to the three well-known oversampling methods in data augmentation. Moreover, the ICVAE-DNN outperforms six well-known models in detection performance, and is more effective in detecting minority attacks and unknown attacks. In addition, the ICVAE-DNN also shows better overall accuracy, detection rate and false positive rate than the nine state-of-the-art intrusion detection methods.

          Related collections

          Most cited references56

          • Record: found
          • Abstract: found
          • Article: found
          Is Open Access

          Adam: A Method for Stochastic Optimization

          , (2015)
          We introduce Adam, an algorithm for first-order gradient-based optimization of stochastic objective functions, based on adaptive estimates of lower-order moments. The method is straightforward to implement, is computationally efficient, has little memory requirements, is invariant to diagonal rescaling of the gradients, and is well suited for problems that are large in terms of data and/or parameters. The method is also appropriate for non-stationary objectives and problems with very noisy and/or sparse gradients. The hyper-parameters have intuitive interpretations and typically require little tuning. Some connections to related algorithms, on which Adam was inspired, are discussed. We also analyze the theoretical convergence properties of the algorithm and provide a regret bound on the convergence rate that is comparable to the best known results under the online convex optimization framework. Empirical results demonstrate that Adam works well in practice and compares favorably to other stochastic optimization methods. Finally, we discuss AdaMax, a variant of Adam based on the infinity norm.
            Bookmark
            • Record: found
            • Abstract: not found
            • Conference Proceedings: not found

            A detailed analysis of the KDD CUP 99 data set

              Bookmark
              • Record: found
              • Abstract: not found
              • Article: not found

              A Deep Learning Approach for Intrusion Detection Using Recurrent Neural Networks

                Bookmark

                Author and article information

                Journal
                Sensors (Basel)
                Sensors (Basel)
                sensors
                Sensors (Basel, Switzerland)
                MDPI
                1424-8220
                02 June 2019
                June 2019
                : 19
                : 11
                : 2528
                Affiliations
                [1 ]School of Cyberspace Security, Beijing University of Posts and Telecommunications, Beijing 100876, China; qing0991@ 123456163.com (Y.Y.); wuchunhua@ 123456bupt.edu.cn (C.W.); yxyang@ 123456bupt.edu.cn (Y.Y.)
                [2 ]College of Information Science and Engineering, Xinjiang University, Urumqi 830046, China
                [3 ]Guizhou Provincial Key Laboratory of Public Big Data, Guizhou University, Guiyang 550025, China
                Author notes
                [* ]Correspondence: zkf_bupt@ 123456163.com
                Author information
                https://orcid.org/0000-0001-9993-7757
                https://orcid.org/0000-0002-1160-5596
                https://orcid.org/0000-0001-5082-2422
                Article
                sensors-19-02528
                10.3390/s19112528
                6603523
                31159512
                0dcdc8f3-0e36-425c-91d8-22cd48d44c22
                © 2019 by the authors.

                Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license ( http://creativecommons.org/licenses/by/4.0/).

                History
                : 18 March 2019
                : 30 May 2019
                Categories
                Article

                Biomedical engineering
                intrusion detection,variational inference,improved conditional variational autoencoder,generator network,deep neural network

                Comments

                Comment on this article