1
views
0
recommends
+1 Recommend
0 collections
    0
    shares
      • Record: found
      • Abstract: found
      • Article: found
      Is Open Access

      End-to-End Adversarial Learning for Intrusion Detection in Computer Networks

      Preprint
      ,

      Read this article at

      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Abstract

          This paper presents a simple yet efficient method for an anomaly-based Intrusion Detection System (IDS). In reality, IDSs can be defined as a one-class classification system, where the normal traffic is the target class. The high diversity of network attacks in addition to the need for generalization, motivate us to propose a semi-supervised method. Inspired by the successes of Generative Adversarial Networks (GANs) for training deep models in semi-unsupervised setting, we have proposed an end-to-end deep architecture for IDS. The proposed architecture is composed of two deep networks, each of which trained by competing with each other to understand the underlying concept of the normal traffic class. The key idea of this paper is to compensate the lack of anomalous traffic by approximately obtain them from normal flows. In this case, our method is not biased towards the available intrusions in the training set leading to more accurate detection. The proposed method has been evaluated on NSL-KDD dataset. The results confirm that our method outperforms the other state-of-the-art approaches.

          Related collections

          Most cited references7

          • Record: found
          • Abstract: not found
          • Article: not found

          Anomaly-based network intrusion detection: Techniques, systems and challenges

            Bookmark
            • Record: found
            • Abstract: not found
            • Article: not found

            A Deep Learning Approach for Intrusion Detection Using Recurrent Neural Networks

              Bookmark
              • Record: found
              • Abstract: not found
              • Article: not found

              Intrusion detection system: A comprehensive review

                Bookmark

                Author and article information

                Journal
                25 April 2019
                Article
                1904.11577
                e753ccbf-65e4-4109-b3f4-52b6d58dc3ff

                http://arxiv.org/licenses/nonexclusive-distrib/1.0/

                History
                Custom metadata
                cs.LG cs.CR stat.ML

                Security & Cryptology,Machine learning,Artificial intelligence
                Security & Cryptology, Machine learning, Artificial intelligence

                Comments

                Comment on this article