Performance Evaluation of Deep Learning Based Network Intrusion Detection System across Multiple Balanced and Imbalanced Datasets
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Meliboev, A. | - |
dc.contributor.author | Alikhanov, J. | - |
dc.contributor.author | Kim, Wooseong | - |
dc.date.accessioned | 2022-03-18T01:42:09Z | - |
dc.date.available | 2022-03-18T01:42:09Z | - |
dc.date.created | 2022-02-13 | - |
dc.date.issued | 2022-02 | - |
dc.identifier.issn | 2079-9292 | - |
dc.identifier.uri | https://scholarworks.bwise.kr/gachon/handle/2020.sw.gachon/83754 | - |
dc.description.abstract | In the modern era of active network throughput and communication, the study of Intrusion Detection Systems (IDS) is a crucial role to ensure safe network resources and information from outside invasion. Recently, IDS has become a needful tool for improving flexibility and efficiency for unexpected and unpredictable invasions of the network. Deep learning (DL) is an essential and well-known tool to solve complex system problems and can learn rich features of enormous data. In this work, we aimed at a DL method for applying the effective and adaptive IDS by applying the architectures such as Convolutional Neural Network (CNN) and Long-Short Term Memory (LSTM), Recurrent Neural Network (RNN), Gated Recurrent Unit (GRU). CNN models have already proved an incredible performance in computer vision tasks. Moreover, the CNN can be applied to timesequence data. We implement the DL models such as CNN, LSTM, RNN, GRU by using sequential data in a prearranged time range as a malicious traffic record for developing the IDS. The benign and attack records of network activities are classified, and a label is given for the supervised-learning method. We applied our approaches to three different benchmark data sets which are UNSW NB15, KDDCup ’99, NSL-KDD to show the efficiency of DL approaches. For contrast in performance, we applied CNN and LSTM combination models with varied parameters and architectures. In each implementation, we trained the models until 100 epochs accompanied by a learning rate of 0.0001 for both balanced and imbalanced train data scenarios. The single CNN and combination of LSTM models have overcome compared to others. This is essentially because the CNN model can learn high-level features that characterize the abstract patterns from network traffic records data. © 2022 by the authors. Licensee MDPI, Basel, Switzerland. | - |
dc.language | 영어 | - |
dc.language.iso | en | - |
dc.publisher | MDPI | - |
dc.relation.isPartOf | Electronics | - |
dc.title | Performance Evaluation of Deep Learning Based Network Intrusion Detection System across Multiple Balanced and Imbalanced Datasets | - |
dc.type | Article | - |
dc.type.rims | ART | - |
dc.description.journalClass | 1 | - |
dc.identifier.wosid | 000763638700001 | - |
dc.identifier.doi | 10.3390/electronics11040515 | - |
dc.identifier.bibliographicCitation | Electronics, v.11, no.4 | - |
dc.description.isOpenAccess | N | - |
dc.identifier.scopusid | 2-s2.0-85124128903 | - |
dc.citation.title | Electronics | - |
dc.citation.volume | 11 | - |
dc.citation.number | 4 | - |
dc.contributor.affiliatedAuthor | Meliboev, A. | - |
dc.contributor.affiliatedAuthor | Kim, Wooseong | - |
dc.type.docType | Article | - |
dc.subject.keywordAuthor | CNN | - |
dc.subject.keywordAuthor | GRU | - |
dc.subject.keywordAuthor | IDS | - |
dc.subject.keywordAuthor | KDDCup ’99 | - |
dc.subject.keywordAuthor | LSTM | - |
dc.subject.keywordAuthor | NSL-KDD | - |
dc.subject.keywordAuthor | RNN | - |
dc.subject.keywordAuthor | UNSW NB15 | - |
dc.relation.journalResearchArea | Computer Science | - |
dc.relation.journalResearchArea | Engineering | - |
dc.relation.journalResearchArea | Physics | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Information Systems | - |
dc.relation.journalWebOfScienceCategory | Engineering, Electrical & Electronic | - |
dc.relation.journalWebOfScienceCategory | Physics, Applied | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
1342, Seongnam-daero, Sujeong-gu, Seongnam-si, Gyeonggi-do, Republic of Korea(13120)031-750-5114
COPYRIGHT 2020 Gachon University All Rights Reserved.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.