A survey of deep learning-based network anomaly detection

A great deal of attention has been given to deep learning over the past several years, and new deep learning techniques are emerging with improved functionality. Many computer and network applications actively utilize such deep learning algorithms and report enhanced performance through them. In this study, we present an overview of deep learning methodologies, including restricted Bolzmann machine-based deep belief network, deep neural network, and recurrent neural network, as well as the machine learning techniques relevant to network anomaly detection. In addition, this article introduces the latest work that employed deep learning techniques with the focus on network anomaly detection through the extensive literature survey. We also discuss our local experiments showing the feasibility of the deep learning approach to network traffic analysis.

[1]  Tarek M. Taha,et al.  Intrusion Detection Using Deep Belief Network and Extreme Learning Machine , 2015, Int. J. Monit. Surveillance Technol. Res..

[2]  Debajyoti Mukhopadhyay,et al.  A Survey of Classification Techniques in the Area of Big Data , 2015, ArXiv.

[3]  Hiroshi Motoda,et al.  Feature Selection Extraction and Construction , 2002 .

[4]  Wei Yi,et al.  A Big Network Traffic Data Fusion Approach Based on Fisher and Deep Auto-Encoder , 2016 .

[5]  Pradeep Kumar Mallick,et al.  Research Advances in the Integration of Big Data and Smart Computing , 2015 .

[6]  Heba F. Eid,et al.  Hybrid Intelligent Intrusion Detection Scheme , 2011 .

[7]  Dong Yu,et al.  Deep Learning: Methods and Applications , 2014, Found. Trends Signal Process..

[8]  M Namratha,et al.  A Comprehensive Overview of Clustering Algorithms in Pattern Recognition , 2012 .

[9]  Anil K. Jain Data clustering: 50 years beyond K-means , 2008, Pattern Recognit. Lett..

[10]  Shilpa Lakhina,et al.  Performance Comparison of Features Reduction Techniques for Intrusion Detection System , 2012 .

[11]  Hemanta Kumar Kalita,et al.  Advanced Dimensionality Reduction Method for Big Data , 2016 .

[12]  Christian Igel,et al.  Training restricted Boltzmann machines: An introduction , 2014, Pattern Recognit..

[13]  Howon Kim,et al.  Long Short Term Memory Recurrent Neural Network Classifier for Intrusion Detection , 2016, 2016 International Conference on Platform Technology and Service (PlatCon).

[14]  William W. Cohen,et al.  Semi-Supervised Classification of Network Data Using Very Few Labels , 2010, 2010 International Conference on Advances in Social Networks Analysis and Mining.

[15]  Emile H. L. Aarts,et al.  Boltzmann machines , 1998 .

[16]  Kunle Olukotun,et al.  A Large-Scale Architecture for Restricted Boltzmann Machines , 2010, 2010 18th IEEE Annual International Symposium on Field-Programmable Custom Computing Machines.

[17]  Shailesh Singh Panwar,et al.  DATA REDUCTION TECHNIQUES TO ANALYZE NSL-KDD DATASET , 2014 .

[18]  Yong Wang,et al.  A Big Network Traffic Data Fusion Approach Based on Fisher and Deep Auto-Encoder , 2016, Inf..

[19]  Taghi M. Khoshgoftaar,et al.  Deep learning applications and challenges in big data analytics , 2015, Journal of Big Data.

[20]  Abdelfatah M. Mohamed,et al.  IDS in Telecommunication Network Using PCA , 2013, ArXiv.

[21]  Je-Won Kang,et al.  Intrusion Detection System Using Deep Neural Network for In-Vehicle Network Security , 2016, PloS one.

[22]  Alpa Reshamwala,et al.  A Review of Intrusion Detection System Using Neural Network and Machine Learning Technique , 2012 .

[23]  Geoffrey E. Hinton,et al.  Reducing the Dimensionality of Data with Neural Networks , 2006, Science.

[24]  Georg Langs,et al.  Unsupervised Anomaly Detection with Generative Adversarial Networks to Guide Marker Discovery , 2017, IPMI.

[25]  Ali A. Ghorbani,et al.  A detailed analysis of the KDD CUP 99 data set , 2009, 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications.

[26]  Md Zahangir Alom,et al.  Intrusion detection using deep belief networks , 2015, 2015 National Aerospace and Electronics Conference (NAECON).

[27]  Mansoor Alam,et al.  A Deep Learning Approach for Network Intrusion Detection System , 2016, EAI Endorsed Trans. Security Safety.

[28]  Najla B. Ibraheem,et al.  Principle Components Analysis and Multi Layer Perceptron Based Intrusion Detection System , 2013 .

[29]  Vivienne Sze,et al.  Efficient Processing of Deep Neural Networks: A Tutorial and Survey , 2017, Proceedings of the IEEE.

[30]  Aijaz Ahmed,et al.  Signature-based Network Intrusion Detection System using JESS (SNIDJ) , 2005, EuroIMSA.

[31]  Geoffrey E. Hinton A Practical Guide to Training Restricted Boltzmann Machines , 2012, Neural Networks: Tricks of the Trade.

[32]  Hironobu Fujiyoshi,et al.  To Be Bernoulli or to Be Gaussian, for a Restricted Boltzmann Machine , 2014, 2014 22nd International Conference on Pattern Recognition.

[33]  Amita Arora,et al.  Dimension Reduction in Intrusion Detection Features Using Discriminative Machine Learning Approach , 2013 .

[34]  Jinoh Kim,et al.  Unsupervised Labeling for Supervised Anomaly Detection in Enterprise and Cloud Networks , 2017, 2017 IEEE 4th International Conference on Cyber Security and Cloud Computing (CSCloud).

[35]  Tao Xu,et al.  SegAN: Adversarial Network with Multi-scale L1 Loss for Medical Image Segmentation , 2017, Neuroinformatics.

[36]  Mounir Ghogho,et al.  Deep learning approach for Network Intrusion Detection in Software Defined Networking , 2016, 2016 International Conference on Wireless Networks and Mobile Communications (WINCOM).

[37]  Sushil Jajodia,et al.  Intrusion Detection Techniques , 2004 .

[38]  Pat Langley,et al.  Static Versus Dynamic Sampling for Data Mining , 1996, KDD.

[39]  Hee-su Chae,et al.  Feature Selection for Intrusion Detection using NSL-KDD , 2013 .

[40]  Malcolm I. Heywood,et al.  Selecting Features for Intrusion Detection: A Feature Relevance Analysis on KDD 99 , 2005, PST.

[41]  Yuancheng Li,et al.  A Hybrid Malicious Code Detection Method based on Deep Learning , 2015 .

[42]  Rich Caruana,et al.  An empirical comparison of supervised learning algorithms , 2006, ICML.

[43]  A. Malathi,et al.  A Detailed Analysis on NSL-KDD Dataset Using Various Machine Learning Techniques for Intrusion Detection , 2013 .