Intrusion Detection Systems with GPU-Accelerated Deep Neural Networks and Effect of the Depth

B. Reis, Sami Berk Kaya, Gozde Karatas, O. K. Sahingoz
{"title":"Intrusion Detection Systems with GPU-Accelerated Deep Neural Networks and Effect of the Depth","authors":"B. Reis, Sami Berk Kaya, Gozde Karatas, O. K. Sahingoz","doi":"10.1109/CEIT.2018.8751784","DOIUrl":null,"url":null,"abstract":"With the extended use of the Internet, which connects millions of computers across the world, there is a growing number and types of intrusions which complicate ensuring the security of information and computers. Although Firewalls and rule/signature base Intrusion Detection Systems (IDSs) are used as the first line of the defense of networks, they cannot be sufficient for detecting the zero-day type attacks, which are not previously encountered. For this type of attacks, Anomaly-Based Intrusion detection systems arise as an acceptable solution which models the normal communication behavior of the network and identifies the others as a suspicious transaction. To classify the normal behavior, usage of neural networks and machine learning approaches are accepted as powerful solutions. However, due to the lack of computation power, generally single hidden layer approach is preferred.With the enhancement of the parallel computation technology, especially in Graphics Processing Units (GPUs), it will be easy to implement a multi-layer approach in Deep Neural Network concept which has a great deal of attention within Deep Learning approach. Therefore, a better accuracy rate could be reached. In this paper, we aimed to implement a Deep Neural Network-based Intrusion Detection System. Moreover, we also study the performance of the proposed model in the binary classification with a different number of layers, neurons, and parameters. Additionally, the acceleration of the GPU usage is also measured and presented with a comparison. To measure the performance of the proposed system the NSL-KDD data set, which is a cleaned data set of the KDD data set, is preferred. The experimental results showed that the proposed multi-layer Deep Neural Network model produces an acceptable performance in its classification with a high accuracy rate with the design of a 64x32 hidden layer structure depending on the data set NSL-KDD.","PeriodicalId":357613,"journal":{"name":"2018 6th International Conference on Control Engineering & Information Technology (CEIT)","volume":"79 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 6th International Conference on Control Engineering & Information Technology (CEIT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CEIT.2018.8751784","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 5

Abstract

With the extended use of the Internet, which connects millions of computers across the world, there is a growing number and types of intrusions which complicate ensuring the security of information and computers. Although Firewalls and rule/signature base Intrusion Detection Systems (IDSs) are used as the first line of the defense of networks, they cannot be sufficient for detecting the zero-day type attacks, which are not previously encountered. For this type of attacks, Anomaly-Based Intrusion detection systems arise as an acceptable solution which models the normal communication behavior of the network and identifies the others as a suspicious transaction. To classify the normal behavior, usage of neural networks and machine learning approaches are accepted as powerful solutions. However, due to the lack of computation power, generally single hidden layer approach is preferred.With the enhancement of the parallel computation technology, especially in Graphics Processing Units (GPUs), it will be easy to implement a multi-layer approach in Deep Neural Network concept which has a great deal of attention within Deep Learning approach. Therefore, a better accuracy rate could be reached. In this paper, we aimed to implement a Deep Neural Network-based Intrusion Detection System. Moreover, we also study the performance of the proposed model in the binary classification with a different number of layers, neurons, and parameters. Additionally, the acceleration of the GPU usage is also measured and presented with a comparison. To measure the performance of the proposed system the NSL-KDD data set, which is a cleaned data set of the KDD data set, is preferred. The experimental results showed that the proposed multi-layer Deep Neural Network model produces an acceptable performance in its classification with a high accuracy rate with the design of a 64x32 hidden layer structure depending on the data set NSL-KDD.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
基于gpu加速的深度神经网络入侵检测系统及其深度效应
随着互联网的广泛使用,它连接了世界各地数以百万计的计算机,入侵的数量和类型越来越多,这使得确保信息和计算机的安全变得更加复杂。虽然防火墙和基于规则/签名的入侵检测系统(ids)被用作网络防御的第一道防线,但它们不足以检测以前没有遇到过的零日攻击。对于这种类型的攻击,基于异常的入侵检测系统作为一种可接受的解决方案出现,它模拟网络的正常通信行为,并将其他交易识别为可疑交易。为了对正常行为进行分类,神经网络和机器学习方法的使用被认为是有效的解决方案。但是,由于计算能力不足,一般采用单隐藏层的方法。随着并行计算技术的发展,特别是图形处理器(gpu)的发展,深度神经网络概念中的多层方法将很容易实现,这在深度学习方法中备受关注。因此,可以达到较好的准确率。在本文中,我们旨在实现一个基于深度神经网络的入侵检测系统。此外,我们还研究了该模型在不同层数、神经元数和参数的二值分类中的性能。此外,还测量了GPU使用的加速,并进行了比较。为了衡量所提议系统的性能,首选NSL-KDD数据集,它是KDD数据集的清理数据集。实验结果表明,基于NSL-KDD数据集的64 × 32隐层结构设计,所提出的多层深度神经网络模型在分类方面具有良好的性能,准确率较高。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
An Approach for Moving Block Signalling System and Safe Distance Calculation Intersection Navigation Under Dynamic Constraints Using Deep Reinforcement Learning Public Health Surveillance System for Online Social Networks using One-Class Text Classification Micro-Flow Sensor Design and Implementation Based on Diamagnetic Levitation Detecting Road Lanes under Extreme Conditions: A Quantitative Performance Evaluation
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1