A bidirectional LSTM deep learning approach for intrusion detection

被引:174
|
作者
Imrana, Yakubu [1 ]
Xiang, Yanping [1 ]
Ali, Liaqat [2 ,3 ]
Abdul-Rauf, Zaharawu [4 ]
机构
[1] Univ Elect Sci & Technol China UESTC, Sch Comp Sci & Engn, Chengdu 611731, Peoples R China
[2] Univ Elect Sci & Technol China UESTC, Sch Informat & Commun Engn, Chengdu 611731, Peoples R China
[3] Univ Sci & Technol, Dept Elect Engn, Bannu, Pakistan
[4] Univ Dev Studies UDS, Dept Educ, Tamale, Ghana
关键词
Machine learning; Deep learning; Recurrent neural networks; Bidirectional LSTM; Intrusion detection; ANOMALY DETECTION; NEURAL-NETWORKS;
D O I
10.1016/j.eswa.2021.115524
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The rise in computer networks and internet attacks has become alarming for most service providers. It has triggered the need for the development and implementation of intrusion detection systems (IDSs) to help prevent and or mitigate the challenges posed by network intruders. Over the years, intrusion detection systems have played and continue to play a very significant role in spotting network attacks and anomalies. Numerous researchers around the globe have proposed many IDSs to combat the threat of network invaders. However, most of the previously proposed IDSs have high rates of raising false alarms. Additionally, most existing models suffer the difficulty of detecting the different attack types, especially User-to-Root (U2R) and Remote-to-Local (R2L) attacks. These two types of attacks often appear to have lower detection accuracy for the existing models. Hence, in this paper, we propose a bidirectional Long-Short-Term-Memory (BiDLSTM) based intrusion detection system to handle the challenges mentioned above. To train and measure our model's performance, we use the NSL-KDD dataset, a benchmark dataset for most IDSs. Experimental results show and validate the effectiveness of the BiDLSTM approach. It outperforms conventional LSTM and other state-of-the-art models in terms of accuracy, precision, recall, and F-score values. It also has a much more reduced false alarm rate than the existing models. Furthermore, the BiDLSTM model achieves a higher detection accuracy for U2R and R2L attacks than the conventional LSTM.
引用
收藏
页数:12
相关论文
共 50 条
  • [41] Intrusion Detection by Deep Learning with TensorFlow
    Chockwanich, Navaporn
    Visoottiviseth, Vasaka
    2019 21ST INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY (ICACT): ICT FOR 4TH INDUSTRIAL REVOLUTION, 2019, : 654 - 659
  • [42] Deep Learning in Intrusion Detection Systems
    Karatas, Gozde
    Demir, Onder
    Sahingoz, Ozgur Koray
    2018 INTERNATIONAL CONGRESS ON BIG DATA, DEEP LEARNING AND FIGHTING CYBER TERRORISM (IBIGDELFT), 2018, : 113 - 116
  • [43] Deep Learning in IoT Intrusion Detection
    Tsimenidis, Stefanos
    Lagkas, Thomas
    Rantos, Konstantinos
    JOURNAL OF NETWORK AND SYSTEMS MANAGEMENT, 2022, 30 (01)
  • [44] Deep Learning for Web Intrusion Detection
    Philip, Jeethu
    Harshini, M.
    Patil, Shruti
    Shareef, Sk Khaja
    Reddy, B. Veerasekhar
    Sridevi, Samala
    2ND INTERNATIONAL CONFERENCE ON SUSTAINABLE COMPUTING AND SMART SYSTEMS, ICSCSS 2024, 2024, : 580 - 585
  • [45] Deep Q-Learning Based Reinforcement Learning Approach for Network Intrusion Detection
    Alavizadeh, Hooman
    Alavizadeh, Hootan
    Jang-Jaccard, Julian
    COMPUTERS, 2022, 11 (03)
  • [46] Optimizing cybercrime detection: A hybrid deep learning approach for enhanced intrusion detection systems
    Rima Alshaya
    Salim E. L. khediri
    Peer-to-Peer Networking and Applications, 2025, 18 (3)
  • [47] A Novel Two-Stage Deep Learning Model for Network Intrusion Detection: LSTM-AE
    Hnamte, Vanlalruata
    Nhung-Nguyen, Hong
    Hussain, Jamal
    Hwa-Kim, Yong
    IEEE ACCESS, 2023, 11 : 37131 - 37148
  • [48] Deep Packet: Deep Learning Model for Intrusion Detection
    Kiet Nguyen Tuan
    Nguyen Duc Thai
    INTELLIGENCE OF THINGS: TECHNOLOGIES AND APPLICATIONS, ICIT 2024, VOL 2, 2025, 230 : 339 - 348
  • [49] Deep Learning Bidirectional LSTM based Detection of Prolongation and Repetition in Stuttered Speech using Weighted MFCC
    Gupta, Sakshi
    Shukla, Ravi S.
    Shukla, Rajesh K.
    Verma, Rajesh
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2020, 11 (09) : 345 - 356
  • [50] A novel bidirectional LSTM model for network intrusion detection in SDN-IoT network
    Sri Vidhya, G.
    Nagarajan, R.
    COMPUTING, 2024, 106 (08) : 2613 - 2642