Applying long short-term memory recurrent neural networks to intrusion detection

Q3 Social Sciences South African Computer Journal Pub Date : 2015-07-11 DOI:10.18489/SACJ.V56I1.248
R. C. Staudemeyer
{"title":"Applying long short-term memory recurrent neural networks to intrusion detection","authors":"R. C. Staudemeyer","doi":"10.18489/SACJ.V56I1.248","DOIUrl":null,"url":null,"abstract":"We claim that modelling network trac as a time series with a supervised learning approach, using known genuine and malicious behaviour, improves intrusion detection. To substantiate this, we trained long short-term memory (LSTM) recurrent neural networks with the training data provided by the DARPA / KDD Cup ’99 challenge. To identify suitable LSTM-RNN network parameters and structure we experimented with various network topologies. We found networks with four memory blocks containing two cells each oer a good compromise between computational cost and detection performance. We applied forget gates and shortcut connections respectively. A learning rate of 0.1 and up to 1,000 epochs showed good results. We tested the performance on all features and on extracted minimal feature sets respectively. We evaluated dierent feature sets for the detection of all attacks within one network and also to train networks specialised on individual attack classes. Our results show that the LSTM classier provides superior performance in comparison to results previously published results of strong static classiers. With 93.82% accuracy and 22.13 cost, LSTM outperforms the winning entries of the KDD Cup ’99 challenge by far. This is due to the fact that LSTM learns to look back in time and correlate consecutive connection records. For the rst time ever, we have demonstrated the usefulness of LSTM networks to intrusion detection.","PeriodicalId":55859,"journal":{"name":"South African Computer Journal","volume":"56 1","pages":"136-154"},"PeriodicalIF":0.0000,"publicationDate":"2015-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"152","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"South African Computer Journal","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.18489/SACJ.V56I1.248","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"Social Sciences","Score":null,"Total":0}
引用次数: 152

Abstract

We claim that modelling network trac as a time series with a supervised learning approach, using known genuine and malicious behaviour, improves intrusion detection. To substantiate this, we trained long short-term memory (LSTM) recurrent neural networks with the training data provided by the DARPA / KDD Cup ’99 challenge. To identify suitable LSTM-RNN network parameters and structure we experimented with various network topologies. We found networks with four memory blocks containing two cells each oer a good compromise between computational cost and detection performance. We applied forget gates and shortcut connections respectively. A learning rate of 0.1 and up to 1,000 epochs showed good results. We tested the performance on all features and on extracted minimal feature sets respectively. We evaluated dierent feature sets for the detection of all attacks within one network and also to train networks specialised on individual attack classes. Our results show that the LSTM classier provides superior performance in comparison to results previously published results of strong static classiers. With 93.82% accuracy and 22.13 cost, LSTM outperforms the winning entries of the KDD Cup ’99 challenge by far. This is due to the fact that LSTM learns to look back in time and correlate consecutive connection records. For the rst time ever, we have demonstrated the usefulness of LSTM networks to intrusion detection.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
长短期记忆递归神经网络在入侵检测中的应用
我们声称,使用已知的真实和恶意行为,将网络轨迹建模为具有监督学习方法的时间序列,可以改进入侵检测。为了证实这一点,我们使用DARPA / KDD杯挑战赛提供的训练数据训练了长短期记忆(LSTM)递归神经网络。为了确定合适的LSTM-RNN网络参数和结构,我们对各种网络拓扑进行了实验。我们发现具有四个存储块的网络,每个存储块包含两个单元,在计算成本和检测性能之间取得了很好的折衷。我们分别应用了遗忘门和快捷连接。学习率为0.1,最多可达1000次,效果很好。我们分别在所有特征和提取的最小特征集上测试了性能。我们评估了不同的特征集,以检测一个网络中的所有攻击,并训练专门针对单个攻击类别的网络。我们的结果表明,与之前发布的强静态分类器的结果相比,LSTM分类器提供了更好的性能。到目前为止,LSTM的准确率为93.82%,成本为22.13%,远远超过了1999年KDD杯挑战赛的获奖作品。这是由于LSTM学会了回顾时间并关联连续的连接记录。我们第一次证明了LSTM网络对入侵检测的有用性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
South African Computer Journal
South African Computer Journal Social Sciences-Education
CiteScore
1.30
自引率
0.00%
发文量
10
审稿时长
24 weeks
期刊介绍: The South African Computer Journal is specialist ICT academic journal, accredited by the South African Department of Higher Education and Training SACJ publishes research articles, viewpoints and communications in English in Computer Science and Information Systems.
期刊最新文献
Virtual learner experience (VLX) Editorial: A new era for SACJ Obituary – Conrad Mueller The Influence of Change Management Process on Cloud Transitioning Online Platform Privacy Policies
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1