Affiliation:
1. Department of Information and Communication Engineering, Yeungnam University, Gyeongsan 38541, Republic of Korea
Abstract
Currently used network-intrusion detection systems (NIDSs) using deep learning have limitations in processing large amounts of data in real time. This is because collecting flow information and creating features are time consuming and require considerable memory. To solve this problem, a novel NIDS with θ(1) memory complexity for processing a flow is proposed in this study. Owing to its small memory requirement, the proposed model can handle numerous concurrent flows. In addition, it uses raw packet data as input features for the deep learning models, resulting in a lightweight feature-creation process. For fast detection, the proposed NIDS classifies a flow using a received packet, though it is prone to false detection. This weakness is solved through the validation model proposed in this research, resulting in high detection accuracy. Furthermore, real-time detection is possible since intrusion detection can be performed for every received packet using the Inception model. A performance comparison with existing methods confirmed an effectively improved detection time and lower memory requirement by 73% and 77% on average while maintaining high detection accuracy. Thus, the proposed model can effectively overcome the problems with modern deep-learning-based NIDSs.
Funder
National Research Foundation of Korea
Subject
Electrical and Electronic Engineering,Computer Networks and Communications,Hardware and Architecture,Signal Processing,Control and Systems Engineering
Reference30 articles.
1. Roesch, M. (1999, January 7–12). Snort: Lightweight intrusion detection for networks. Proceedings of the LISA ’99: 13th Systems Administration Conference USENIX, Seattle, WA, USA.
2. HAST-IDS: Learning hierarchical spatial-temporal features using deep neural networks to improve intrusion detection;Wang;IEEE Access,2017
3. Seelammal, C., and Devi, K.V. (2016, January 16–17). Computational intelligence in intrusion detection system for snort log using Hadoop. Proceedings of the International Conference on Control, Instrumentation, Communication and Computational Technologies ICCICCT, Kumaracoil, India.
4. Bilge, L., and Dumitras, T. (2012, January 16–18). Before we knew it: An empirical study of zero-day attacks in the real world. Proceedings of the 2012 ACM Conference on Computer and Communications Security, Raleigh, NC, USA.
5. Deep learning approach combining sparse autoencoder with SVM for network intrusion detection;Lasheng;IEEE Access,2018
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献