Affiliation:
1. Department of Information and Communication Engineering, Yeungnam University, Gyeongsan 38541, Republic of Korea
Abstract
The development of computer vision-based deep learning models for accurate two-dimensional (2D) image classification has enabled us to surpass existing machine learning-based classifiers and human classification capabilities. Recently, steady efforts have been made to apply these sophisticated vision-based deep learning models as network intrusion detection domains, and various experimental results have confirmed their applicability and limitations. In this paper, we present an optimized method for processing network intrusion detection system (NIDS) datasets using vision-based deep learning models by further expanding existing studies to overcome these limitations. In the proposed method, the NIDS dataset can further enhance the performance of existing deep-learning-based intrusion detection by converting the dataset into 2D images through various image transformers and then integrating into three-channel RGB color images, unlike the existing method. Various performance evaluations confirm that the proposed method can significantly improve intrusion detection performance over the recent method using grayscale images, and existing NIDSs without the use of images. As network intrusion is increasingly evolving in complexity and variety, we anticipate that the intrusion detection algorithm outlined in this study will facilitate network security.
Funder
National Research Foundation of Korea
Subject
Fluid Flow and Transfer Processes,Computer Science Applications,Process Chemistry and Technology,General Engineering,Instrumentation,General Materials Science
Reference38 articles.
1. Faizal, M.A., Mohd Zaki, M., Shahrin, S., Robiah, Y., Siti Rahayu, S., and Nazrulazhar, B. (2009). Threshold Verification Technique for Network Intrusion Detection System. arXiv.
2. Chunyue, Z., Yun, L., and Hongke, Z. (2006, January 5–8). A Pattern matching based Network Intrusion Detection System. Proceedings of the 2006 9th International Conference on Control, Automation, Robotics and Vision, Singapore.
3. Bilge, L., and Dumitras, T. (2012, January 16–18). Before we knew it: An empirical study of zero-day attacks in the real world. Proceedings of the 2012 ACM Conference on Computer and Communications Security, Raleigh, NC, USA.
4. Kruegel, C., and Toth, T. (2003, January 8–10). Using decision trees to improve signature-based intrusion detection. Proceedings of the 2003 International Workshop on Recent Advances in Intrusion Detection, Pittsburgh, PA, USA.
5. Sahu, S., and Mehtre, B.M. (2015, January 10–13). Network intrusion detection system using J48 Decision Tree. Proceedings of the 2015 International Conference on Advances in Computing, Communications and Informatics (ICACCI), Kochi, India.
Cited by
13 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献