Efficient BiSRU Combined With Feature Dimensionality Reduction for Abnormal Traffic Detection

Abnormal traffic detection is an important network security technology to protect computer systems from malicious attacks. Existing detection methods are usually based on traditional machine learning, such as Support Vector Machine (SVM), Naive Bayes, etc. They rely heavily on manual design of traffic features and usually shallow feature learning, which get a low accuracy for high-dimensional traffic. Although the method based on Long Short-Term Memory (LSTM) has an excellent ability to detect abnormal traffic. The sequence-dependent structure of LSTM cannot realize parallel computation, which leads to slow model training and limits its applicability. To address the above problem, we propose an efficient Bidirectional Simple Recurrent Unit (BiSRU) combined with feature dimensionality reduction for abnormal traffic detection. Specifically, in order to perform feature dimensionality reduction on the original high-dimensional network traffic, we design a stack Sparse Autoencoder (sSAE) to extract the compressed high-level features. For the purpose of realizing efficient parallel computation and accurate feature extraction, a BiSRU is utilized to extract the bidirectional structural features of the traffic. Finally, the experimental results show that our proposed method significantly outperforms existing methods in terms of accuracy and training time. The method we propose can timely and accurately detect various abnormal traffic and achieve effective network security protection.

[1]  Tien-Tsin Wong,et al.  Perceptual-Aware Sketch Simplification Based on Integrated VGG Layers , 2021, IEEE Transactions on Visualization and Computer Graphics.

[2]  Nour Moustafa,et al.  UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set) , 2015, 2015 Military Communications and Information Systems Conference (MilCIS).

[3]  Manas Ranjan Patra,et al.  NETWORK INTRUSION DETECTION USING NAÏVE BAYES , 2007 .

[4]  Sergey Ioffe,et al.  Batch Normalization: Accelerating Deep Network Training by Reducing Internal Covariate Shift , 2015, ICML.

[5]  Waqar Ahmad,et al.  A Comparative Study of Data Mining Algorithms for High Detection Rate in Intrusion Detection System , 2018 .

[6]  Qing Li,et al.  Research of the processing technology for time complex event based on LSTM , 2018, Cluster Computing.

[7]  Yu Zhang,et al.  Simple Recurrent Units for Highly Parallelizable Recurrence , 2017, EMNLP.

[8]  Joel J. P. C. Rodrigues,et al.  A comprehensive survey on network anomaly detection , 2018, Telecommunication Systems.

[9]  Xin Liao,et al.  Robust Detection of Image Operator Chain With Two-Stream Convolutional Neural Network , 2020, IEEE Journal of Selected Topics in Signal Processing.

[10]  Chu Zhang,et al.  Cost-sensitive stacked sparse auto-encoder models to detect striped stem borer infestation on rice based on hyperspectral imaging , 2019, Knowl. Based Syst..

[11]  Andreas Hotho,et al.  A Survey of Network-based Intrusion Detection Data Sets , 2019, Comput. Secur..

[12]  Ning Zhang,et al.  Investigation on Performance of Neural Networks Using Quadratic Relative Error Cost Function , 2019, IEEE Access.

[13]  Syed Hassan Ahmed,et al.  A Review of Current Security Issues in Internet of Things , 2019, Recent Trends and Advances in Wireless and IoT-enabled Networks.

[14]  Preeti Mishra,et al.  VMAnalyzer: Malware Semantic Analysis using Integrated CNN and Bi-Directional LSTM for Detecting VM-level Attacks in Cloud , 2019, 2019 Twelfth International Conference on Contemporary Computing (IC3).

[15]  Parul Sahare,et al.  Communication technologies and security challenges for internet of things: A comprehensive review , 2019, AEU - International Journal of Electronics and Communications.

[16]  Yanfen Gan,et al.  Video Object Forgery Detection Algorithm Based on VGG-11 Convolutional Neural Network , 2019, 2019 International Conference on Intelligent Computing, Automation and Systems (ICICAS).

[17]  Da Guo,et al.  Abnormal Network Traffic Detection Based on Transfer Component Analysis , 2019, 2019 IEEE International Conference on Communications Workshops (ICC Workshops).

[18]  Kajal Rai,et al.  Decision Tree Based Algorithm for Intrusion Detection , 2016 .

[19]  Guy Lapalme,et al.  A systematic analysis of performance measures for classification tasks , 2009, Inf. Process. Manag..

[20]  Jiajun Zhang,et al.  An Empirical Exploration of Skip Connections for Sequential Tagging , 2016, COLING.

[21]  Raghavendra Chalapathy University of Sydney,et al.  Deep Learning for Anomaly Detection: A Survey , 2019, ArXiv.

[22]  Xiangjie Kong,et al.  Spatio-Temporal Network Traffic Estimation and Anomaly Detection Based on Convolutional Neural Network in Vehicular Ad-Hoc Networks , 2018, IEEE Access.

[23]  Haibo Liu,et al.  A Method for Guaranteeing Wireless Communication Based on a Combination of Deep and Shallow Learning , 2019, IEEE Access.

[24]  Hon Cheung,et al.  A Deep Learning Approach for Intrusion Detection in Internet of Things using Bi-Directional Long Short-Term Memory Recurrent Neural Network , 2018, 2018 28th International Telecommunication Networks and Applications Conference (ITNAC).

[25]  Feng Zhou,et al.  Longitudinal and Multi-modal Data Learning for Parkinson’s Disease Diagnosis via Stacked Sparse Auto-encoder , 2019, 2019 IEEE 16th International Symposium on Biomedical Imaging (ISBI 2019).

[26]  Francisco Argüello,et al.  Caffe CNN-based classification of hyperspectral images on GPU , 2018, The Journal of Supercomputing.

[27]  Ruiyu Liang,et al.  Attention-Based Dense LSTM for Speech Emotion Recognition , 2019, IEICE Trans. Inf. Syst..

[28]  Dewan Md. Farid,et al.  Combining Naive Bayes and Decision Tree for Adaptive Intrusion Detection , 2010, ArXiv.

[29]  Zhigang Chen,et al.  Verifiable Keyword-Based Semantic Similarity Search on Social Data Outsourcing , 2019, IEEE Access.

[30]  Sunwoo Kim,et al.  Signal Classification and Jamming Detection in Wide-Band Radios Using Naïve Bayes Classifier , 2018, IEEE Communications Letters.

[31]  Khan Muhammad,et al.  Five-category classification of pathological brain images based on deep stacked sparse autoencoder , 2017, Multimedia Tools and Applications.

[32]  Li Liu,et al.  Latent Relationship Guided Stacked Sparse Autoencoder for Hyperspectral Imagery Classification , 2020, IEEE Transactions on Geoscience and Remote Sensing.

[33]  Mohamed Abdel-Nasser,et al.  Accurate photovoltaic power forecasting models using deep LSTM-RNN , 2017, Neural Computing and Applications.

[34]  K. V. N. Sunitha,et al.  Effective discriminant function for intrusion detection using SVM , 2016, 2016 International Conference on Advances in Computing, Communications and Informatics (ICACCI).

[35]  Yong Yu,et al.  A Review of Recurrent Neural Networks: LSTM Cells and Network Architectures , 2019, Neural Computation.

[36]  Yuefei Zhu,et al.  A Deep Learning Approach for Intrusion Detection Using Recurrent Neural Networks , 2017, IEEE Access.

[37]  Jinfeng Yi,et al.  Efficient distance metric learning by adaptive sampling and mini-batch stochastic gradient descent (SGD) , 2013, Machine Learning.

[38]  Kamal El-Sankary,et al.  Impact of Approximate Multipliers on VGG Deep Learning Network , 2018, IEEE Access.

[39]  Mohamed Farouk,et al.  A framework for efficient network anomaly intrusion detection with features selection , 2018, 2018 9th International Conference on Information and Communication Systems (ICICS).

[40]  Jong Hyuk Park,et al.  DTB-IDS: an intrusion detection system based on decision tree using behavior analysis for preventing APT attacks , 2015, The Journal of Supercomputing.

[41]  Chen Yang,et al.  Anomaly network traffic detection algorithm based on information entropy measurement under the cloud computing environment , 2018, Cluster Computing.

[42]  Olivier Déforges,et al.  DDSA: A Defense Against Adversarial Attacks Using Deep Denoising Sparse Autoencoder , 2019, IEEE Access.