Analysis of LSTM-RNN Based on Attack Type of KDD-99 Dataset

Method and model of machine learning have applied to many industry fields. Employing RNN to detect and recognize network events and intrusions is extensively studied. This paper divides KDD-99 dataset into 4 subsets according to data item’s ‘attack type’ field. And then, LSTM-RNN is trained and verified on each subset in order to optimize model parameters. Experiments show the strategy of training for LSTM-RNN could boost model accuracy.

[1]  Roberto J. Bayardo,et al.  Efficiently mining long patterns from databases , 1998, SIGMOD '98.

[2]  Mansoor Alam,et al.  A Deep Learning Approach for Network Intrusion Detection System , 2016, EAI Endorsed Trans. Security Safety.

[3]  Irina Rish,et al.  An empirical study of the naive Bayes classifier , 2001 .

[4]  D. Hand,et al.  Idiot's Bayes—Not So Stupid After All? , 2001 .

[5]  Frank Klawonn,et al.  Computational Intelligence: A Methodological Introduction , 2015, Texts in Computer Science.

[6]  Jürgen Schmidhuber,et al.  Deep learning in neural networks: An overview , 2014, Neural Networks.

[7]  C. Malsburg Self-organization of orientation sensitive cells in the striate cortex , 2004, Kybernetik.

[8]  Reyadh Shaker Naoum,et al.  An Enhanced Resilient Backpropagation Artificial Neural Network for Intrusion Detection System , 2012 .

[9]  Alireza Mehridehnavi,et al.  Deep neural network in QSAR studies using deep belief network , 2018, Appl. Soft Comput..

[10]  S. P. Lloyd,et al.  Least squares quantization in PCM , 1982, IEEE Trans. Inf. Theory.

[11]  C. A. Kumar,et al.  An analysis of supervised tree based classifiers for intrusion detection system , 2013, 2013 International Conference on Pattern Recognition, Informatics and Mobile Engineering.

[12]  Pascal Vincent,et al.  Representation Learning: A Review and New Perspectives , 2012, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[13]  Hava T. Siegelmann,et al.  Analog computation via neural networks , 1993, [1993] The 2nd Israel Symposium on Theory and Computing Systems.

[14]  Teuvo Kohonen,et al.  Self-organized formation of topologically correct feature maps , 2004, Biological Cybernetics.

[15]  Roman Bek,et al.  Discourse on one way in which a quantum-mechanics language on the classical logical base can be built up , 1978, Kybernetika.

[16]  Geoffrey E. Hinton,et al.  Deep Learning , 2015, Nature.

[17]  A. Turing The chemical basis of morphogenesis , 1952, Philosophical Transactions of the Royal Society of London. Series B, Biological Sciences.

[18]  David R. Karger,et al.  Tackling the Poor Assumptions of Naive Bayes Text Classifiers , 2003, ICML.

[19]  Philip D. Wasserman,et al.  Advanced methods in neural computing , 1993, VNR computer library.

[20]  Lukás Burget,et al.  Recurrent neural network based language model , 2010, INTERSPEECH.

[21]  Jürgen Schmidhuber,et al.  Multi-column deep neural networks for image classification , 2012, 2012 IEEE Conference on Computer Vision and Pattern Recognition.

[22]  T. Kohonen Self-organized formation of topographically correct feature maps , 1982 .

[23]  O. J. Vrieze,et al.  Kohonen Network , 1995, Artificial Neural Networks.

[24]  Ramakrishnan Srikant,et al.  Fast algorithms for mining association rules , 1998, VLDB 1998.

[25]  Brian D. Ripley,et al.  Pattern Recognition and Neural Networks , 1996 .