{"title":"Network Intrusion Detection Using Sequence Models","authors":"Archana Prabhu, H. Champa, Deepti Kalasapura","doi":"10.1109/GHCI47972.2019.9071806","DOIUrl":null,"url":null,"abstract":"The increase in network users has diversified the nature of attacks and increased their frequency. Existing intrusion detection systems rely on inefficient signature based approaches which can easily be evaded by attackers. Many shallow learning approaches have been explored but they require expert knowledge and longer training times. In this paper we utilize architectures such as RNN, LSTM and GRU to provide a solution to this problem. We also analyze and build upon an existing NDAE model and provide a comparative analysis. We have implemented our models using Keras with a TensorFlow backend. The benchmark NSL-KDD dataset is used for training and validation. The results obtained are promising and our models have potential to detect attacks in real-time backbone network traffic.","PeriodicalId":153240,"journal":{"name":"2019 Grace Hopper Celebration India (GHCI)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 Grace Hopper Celebration India (GHCI)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/GHCI47972.2019.9071806","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
The increase in network users has diversified the nature of attacks and increased their frequency. Existing intrusion detection systems rely on inefficient signature based approaches which can easily be evaded by attackers. Many shallow learning approaches have been explored but they require expert knowledge and longer training times. In this paper we utilize architectures such as RNN, LSTM and GRU to provide a solution to this problem. We also analyze and build upon an existing NDAE model and provide a comparative analysis. We have implemented our models using Keras with a TensorFlow backend. The benchmark NSL-KDD dataset is used for training and validation. The results obtained are promising and our models have potential to detect attacks in real-time backbone network traffic.