Network Intrusion Detection Based on an Improved Long-Short-Term Memory Model in Combination with Multiple Spatiotemporal Structures

Aimed at the existing problems in network intrusion detection, this paper proposes an improved LSTM combined with spatiotemporal structure for intrusion detection. The unsupervised spatiotemporal encoder is used to intelligently extract the spatial characteristics of network traffic data samples. It can not only retain the overall/nonlocal characteristics of the data samples but also extract the most essential deep features of the data samples. Finally, the extracted features are used as input of the LSTM model to realize classification and identification for intrusion samples. Experimental verification shows that the accuracy and false alarm rate of the intrusion detection model based on the neural network are significantly better than those of other traditional models.

[1]  Lizhong Xu,et al.  A Security Concept Based on Scaler Distribution of a Novel Intrusion Detection Device for Wireless Sensor Networks in a Smart Environment , 2020, Sensors.

[2]  Nan Ding,et al.  Real-time anomaly detection based on long short-Term memory and Gaussian Mixture Model , 2019, Comput. Electr. Eng..

[3]  Georgios Spathoulas,et al.  Using homomorphic encryption for privacy-preserving clustering of intrusion detection alerts , 2020, International Journal of Information Security.

[4]  Gaoming Yang,et al.  An intrusion detection algorithm for sensor network based on normalized cut spectral clustering , 2019, PloS one.

[5]  Miad Faezipour,et al.  Deep and Machine Learning Approaches for Anomaly-Based Intrusion Detection of Imbalanced Network Traffic , 2019, IEEE Sensors Letters.

[6]  Lixiang Li,et al.  Nearest neighbors based density peaks approach to intrusion detection , 2018 .

[7]  Fadi Al-Turjman,et al.  An improved ensemble based intrusion detection technique using XGBoost , 2020, Trans. Emerg. Telecommun. Technol..

[8]  Longqing Li,et al.  Wireless Sensor Networks Intrusion Detection Based on SMOTE and the Random Forest Algorithm , 2019, Sensors.

[9]  Haifang Li,et al.  Object Tracking Algorithm based on Improved Context Model in Combination with Detection Mechanism for Suspected Objects , 2018, Multimedia Tools and Applications.

[10]  Naveen K. Chilamkurti,et al.  Leveraging LSTM Networks for Attack Detection in Fog-to-Things Communications , 2018, IEEE Communications Magazine.

[11]  Haifang Li,et al.  An Improved Two-steps Saliency Detection Algorithm based on Binarized Normed Gradients and Nuclear Norm Model in Video Sequences , 2018, J. Inf. Hiding Multim. Signal Process..

[12]  Hongpo Zhang,et al.  An effective convolutional neural network based on SMOTE and Gaussian mixture model for intrusion detection in imbalanced dataset , 2020, Comput. Networks.

[13]  Michał Choraś,et al.  A Deep Learning Ensemble for Network Anomaly and Cyber-Attack Detection , 2020, Sensors.

[14]  Lei Yang,et al.  Sample Selected Extreme Learning Machine Based Intrusion Detection in Fog Computing and MEC , 2018, Wirel. Commun. Mob. Comput..

[15]  Muhammad Sher,et al.  A two-stage flow-based intrusion detection model for next-generation networks , 2018, PloS one.

[16]  Mu Zhou,et al.  Indoor intrusion detection based on fuzzy membership-aided Dempster-Shaper theory , 2020, J. Intell. Fuzzy Syst..

[17]  Dongrui Wu,et al.  A Novel Negative-Transfer-Resistant Fuzzy Clustering Model With a Shared Cross-Domain Transfer Latent Space and its Application to Brain CT Image Segmentation , 2020, IEEE/ACM Transactions on Computational Biology and Bioinformatics.

[18]  Jun-Ho Huh,et al.  Implementation of lightweight intrusion detection model for security of smart green house and vertical farm , 2018, Int. J. Distributed Sens. Networks.

[19]  Carlos Becker Westphall,et al.  Autonomic Intrusion Detection and Response Using Big Data , 2020, IEEE Systems Journal.

[20]  Prajoona Valsalan,et al.  Retracted: Intrusion detection in cloud environment using hybrid genetic algorithm and back propagation neural network , 2020, International Journal of Communication Systems.

[21]  Amin Karami,et al.  An anomaly-based intrusion detection system in presence of benign outliers with visualization capabilities , 2018, Expert Syst. Appl..

[22]  Daojing He,et al.  Intrusion Detection Based on Stacked Autoencoder for Connected Healthcare Systems , 2019, IEEE Network.

[23]  Ning Wang,et al.  An Improved LDA-Based ELM Classification for Intrusion Detection Algorithm in IoT Application , 2020, Sensors.

[24]  Dongrui Wu,et al.  EEG-Based Driver Drowsiness Estimation Using an Online Multi-View and Transfer TSK Fuzzy System , 2021, IEEE Transactions on Intelligent Transportation Systems.

[25]  Mahesh Kumar Prasath,et al.  A meta-heuristic Bayesian network classification for intrusion detection , 2019, Int. J. Netw. Manag..

[26]  Haifang Li,et al.  Object Tracking Algorithm based on Improved Siamese Convolutional Networks Combined with Deep Contour Extraction and Object Detection Under Airborne Platform , 2020 .

[27]  Maode Ma,et al.  A filter model for intrusion detection system in Vehicle Ad Hoc Networks: A hidden Markov methodology , 2019, Knowl. Based Syst..

[28]  V. S. Shankar Sriram,et al.  An Improved Rough Set Theory based Feature Selection Approach for Intrusion Detection in SCADA Systems , 2019, J. Intell. Fuzzy Syst..

[29]  Luigi Pontieri,et al.  A GP-based ensemble classification framework for time-changing streams of intrusion detection data , 2020, Soft Computing.

[30]  Weizhi Meng,et al.  Intrusion Detection in the Era of IoT: Building Trust via Traffic Filtering and Sampling , 2018, Computer.

[31]  Halit Alptekin,et al.  Intrusion Detection Over Encrypted Network Data , 2020, Comput. J..

[32]  Kaijian Xia,et al.  A Novel Distributed Multitask Fuzzy Clustering Algorithm for Automatic MR Brain Image Segmentation , 2019, Journal of Medical Systems.

[33]  Christos Diou,et al.  Of daemons and men: reducing false positive rate in intrusion detection systems with file system footprint analysis , 2018, Neural Computing and Applications.

[34]  Rui-Hong Dong,et al.  Network intrusion detection model based on multivariate correlation analysis - long short-time memory network , 2020, IET Inf. Secur..

[35]  Deepali Bankatsingh Gothawal,et al.  Anomaly-Based Intrusion Detection System in RPL by Applying Stochastic and Evolutionary Game Models over IoT Environment , 2019, Wireless Personal Communications.

[36]  Shengzhe Wang,et al.  Bayesian Framework with Non-local and Low-rank Constraint for Image Reconstruction , 2017 .

[37]  Seong Oun Hwang,et al.  Study of long short-term memory in flow-based network intrusion detection system , 2018, J. Intell. Fuzzy Syst..