A bidirectional LSTM deep learning approach for intrusion detection

被引:174
|
作者
Imrana, Yakubu [1 ]
Xiang, Yanping [1 ]
Ali, Liaqat [2 ,3 ]
Abdul-Rauf, Zaharawu [4 ]
机构
[1] Univ Elect Sci & Technol China UESTC, Sch Comp Sci & Engn, Chengdu 611731, Peoples R China
[2] Univ Elect Sci & Technol China UESTC, Sch Informat & Commun Engn, Chengdu 611731, Peoples R China
[3] Univ Sci & Technol, Dept Elect Engn, Bannu, Pakistan
[4] Univ Dev Studies UDS, Dept Educ, Tamale, Ghana
关键词
Machine learning; Deep learning; Recurrent neural networks; Bidirectional LSTM; Intrusion detection; ANOMALY DETECTION; NEURAL-NETWORKS;
D O I
10.1016/j.eswa.2021.115524
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The rise in computer networks and internet attacks has become alarming for most service providers. It has triggered the need for the development and implementation of intrusion detection systems (IDSs) to help prevent and or mitigate the challenges posed by network intruders. Over the years, intrusion detection systems have played and continue to play a very significant role in spotting network attacks and anomalies. Numerous researchers around the globe have proposed many IDSs to combat the threat of network invaders. However, most of the previously proposed IDSs have high rates of raising false alarms. Additionally, most existing models suffer the difficulty of detecting the different attack types, especially User-to-Root (U2R) and Remote-to-Local (R2L) attacks. These two types of attacks often appear to have lower detection accuracy for the existing models. Hence, in this paper, we propose a bidirectional Long-Short-Term-Memory (BiDLSTM) based intrusion detection system to handle the challenges mentioned above. To train and measure our model's performance, we use the NSL-KDD dataset, a benchmark dataset for most IDSs. Experimental results show and validate the effectiveness of the BiDLSTM approach. It outperforms conventional LSTM and other state-of-the-art models in terms of accuracy, precision, recall, and F-score values. It also has a much more reduced false alarm rate than the existing models. Furthermore, the BiDLSTM model achieves a higher detection accuracy for U2R and R2L attacks than the conventional LSTM.
引用
收藏
页数:12
相关论文
共 50 条
  • [31] A Step-Based Deep Learning Approach for Network Intrusion Detection
    Zhang, Yanyan
    Ran, Xiangjin
    CMES-COMPUTER MODELING IN ENGINEERING & SCIENCES, 2021, 128 (03): : 1231 - 1245
  • [32] A Deep Reinforcement Learning Approach for Anomaly Network Intrusion Detection System
    Hsu, Ying-Feng
    Matsuoka, Morito
    2020 IEEE 9TH INTERNATIONAL CONFERENCE ON CLOUD NETWORKING (CLOUDNET), 2020,
  • [33] Feature selection and deep learning approach for anomaly network intrusion detection
    Bennaceur, Khadidja
    Sahraoui, Zakaria
    Nacer, Mohamed Ahmad
    INTERNATIONAL JOURNAL OF INFORMATION AND COMPUTER SECURITY, 2024, 23 (04) : 433 - 453
  • [34] Unsupervised Deep Learning Approach for In-Vehicle Intrusion Detection System
    Narasimhan, Harini
    Ravi, Vinayakumar
    Mohammad, Nazeeruddin
    IEEE CONSUMER ELECTRONICS MAGAZINE, 2023, 12 (01) : 103 - 108
  • [35] DeepIDS: Deep Learning Approach for Intrusion Detection in Software Defined Networking
    Tuan Anh Tang
    Mhamdi, Lotfi
    McLernon, Des
    Zaidi, Syed Ali Raza
    Ghogho, Mounir
    El Moussa, Fadi
    ELECTRONICS, 2020, 9 (09) : 1 - 18
  • [36] Intrusion Detection in Software Defined Network Using Deep Learning Approach
    Susilo, Bambang
    Sari, Riri Fitri
    2021 IEEE 11TH ANNUAL COMPUTING AND COMMUNICATION WORKSHOP AND CONFERENCE (CCWC), 2021, : 807 - 812
  • [37] Robust Network Security: A Deep Learning Approach to Intrusion Detection in IoT
    Odeh, Ammar
    Abu Taleb, Anas
    Computers, Materials and Continua, 2024, 81 (03): : 4149 - 4169
  • [38] A Deep Learning Approach for Intrusion Detection Systems in Cloud Computing Environments
    Aljuaid, Wa'ad H.
    Alshamrani, Sultan S.
    APPLIED SCIENCES-BASEL, 2024, 14 (13):
  • [39] A multi-task based deep learning approach for intrusion detection
    Liu, Qigang
    Wang, Deming
    Jia, Yuhang
    Luo, Suyuan
    Wang, Chongren
    KNOWLEDGE-BASED SYSTEMS, 2022, 238
  • [40] Deep Learning in IoT Intrusion Detection
    Stefanos Tsimenidis
    Thomas Lagkas
    Konstantinos Rantos
    Journal of Network and Systems Management, 2022, 30