Skip to main content

Comparative Study of CNN and RNN for Deep Learning Based Intrusion Detection System

  • Conference paper
  • First Online:
Cloud Computing and Security (ICCCS 2018)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 11067))

Included in the following conference series:

Abstract

Intrusion detection system plays an important role in ensuring information security, and the key technology is to accurately identify various attacks in the network. Due to huge increase in network traffic and different types of attacks, accurately classifying the malicious and legitimate network traffic is time consuming and computational intensive. Recently, more and more researchers applied deep neural networks (DNNs) to solve intrusion detection problems. Convolutional Neural Network (CNN) and Recurrent Neural Network (RNN), the two main types of DNN architectures, are widely explored to enhance the performance of intrusion detection system. In this paper, we made a systematic comparison of CNN and RNN on the deep learning based intrusion detection systems, aiming to give basic guidance for DNN selection.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Liu, X., Yin, J., Wang, L.: An adaptive approach to learning optimal neighborhood kernels. IEEE Trans. Syst. Man Cybern. Part B Cybern. A Publ. IEEE Syst. Man Cybern. Soc. 43(1), 371–384 (2012)

    Google Scholar 

  2. Ming, Y., Zhao, Y., Wu, C., et al.: Distributed and asynchronous stochastic gradient descent with variance reduction. Neurocomputing 281, 27–36 (2017)

    Article  Google Scholar 

  3. Lecun, Y., Bottou, L., Bengio, Y.: Gradient-based learning applied to document recognition. Proc. IEEE 86(11), 2278–2324 (1998)

    Article  Google Scholar 

  4. Elman, J.L.: Finding structure in time. Cogn. Sci. 14(2), 179–211 (1990)

    Article  Google Scholar 

  5. Yin, W., Kann, K., Yu, M., et al.: Comparative Study of CNN and RNN for Natural Language Processing (2017)

    Google Scholar 

  6. Singh, J., Nene, M.J.: A survey on machine learning techniques for intrusion detection systems. Int. J. Adv. Res. Comput. Commun. Eng. 2(11), 4349–4355 (2013)

    Google Scholar 

  7. Kishorwagh, S., Pachghare, V.K., Kolhe, S.R.: Survey on intrusion detection system using machine learning techniques. Int. J. Comput. Appl. 78(16), 30–37 (2013)

    Google Scholar 

  8. Qiu, C., Shan, J.: Research on intrusion detection algorithm based on BP neural network. Int. J. Secur. Appl. 9(4), 247–258 (2015)

    Google Scholar 

  9. Planquart, J.P.: Application of neural networks to intrusion detection. Sans Institute (2001)

    Google Scholar 

  10. Krizhevsky, A., Sutskever, I., Hinton, G.E.: ImageNet classification with deep convolutional neural networks. In: International Conference on Neural Information Processing Systems, pp. 1097–1105. Curran Associates Inc. (2012)

    Google Scholar 

  11. Mikolov, T., Yih, W.T., Zweig, G.: Linguistic regularities in continuous space word representations. In: HLT-NAACL (2013)

    Google Scholar 

  12. Dainotti, A., Pescape, A., Claffy, K.C.: Issues and future directions in traffic classification. IEEE Netw. 26(1), 35–40 (2012)

    Article  Google Scholar 

  13. Wang, W., Zhu, M., Zeng, X., et al.: Malware traffic classification using convolutional neural network for representation learning. In: International Conference on Information Networking, pp. 712–717. IEEE (2017)

    Google Scholar 

  14. Jia, F., Kong, L.Z.: Intrusion detection algorithm based on convolutional neural network. Beijing Ligong Daxue Xuebao/Trans. Beijing Inst. Technol. 37(12), 1271–1275 (2017)

    MATH  Google Scholar 

  15. Qian, T., Wang, Y., Zhang, M., et al.: Intrusion detection method based on deep neural network. Huazhong Keji Daxue Xuebao 46(1), 6–10 (2018)

    Google Scholar 

  16. Torres, P., Catania, C., Garcia, S., et al.: An analysis of Recurrent Neural Networks for Botnet detection behavior. In: Biennial Congress of Argentina (ARGENCON), pp. 1–6. IEEE (2016)

    Google Scholar 

  17. Yuan, X., Li, C., Li, X.: DeepDefense: identifying DDoS attack via deep learning. In: 2017 IEEE International Conference on Smart Computing (SMARTCOMP), pp. 1–8. IEEE (2017)

    Google Scholar 

  18. Sheikhan, M., Jadidi, Z., Farrokhi, A.: Intrusion detection using reduced-size RNN based on feature grouping. Neural Comput. Appl. 21(6), 1185–1190 (2012)

    Article  Google Scholar 

  19. Yin, C., Zhu, Y., Fei, J.: A deep learning approach for intrusion detection using recurrent neural networksl. IEEE Access 5, 21954–21961 (2017)

    Article  Google Scholar 

  20. Szegedy, C., Liu, W., Jia, Y., et al.: Going deeper with convolutions. In: IEEE Conference on Computer Vision and Pattern Recognition, pp. 1–9. IEEE Computer Society (2015)

    Google Scholar 

  21. Hochreiter, S., Schmidhuber, J.: Long short-term memory. Neural Comput. 9(8), 1735–1780 (1997)

    Article  Google Scholar 

  22. Cho, K., Van Merrienboer, B., Bahdanau, D., et al.: On the properties of neural machine translation: encoder-decoder approaches. Computer Science (2014)

    Google Scholar 

  23. Shiravi, A., Shiravi, H., Tavallaee, M.: Toward developing a systematic approach to generate benchmark datasets for intrusion detection. Comput. Secur. 31(3), 357–374 (2012)

    Article  Google Scholar 

Download references

Acknowledgement

This research work is supported by National Natural Science Foundation of China under grant number 61702539 and 60970034.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jianjing Cui .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Cui, J., Long, J., Min, E., Liu, Q., Li, Q. (2018). Comparative Study of CNN and RNN for Deep Learning Based Intrusion Detection System. In: Sun, X., Pan, Z., Bertino, E. (eds) Cloud Computing and Security. ICCCS 2018. Lecture Notes in Computer Science(), vol 11067. Springer, Cham. https://doi.org/10.1007/978-3-030-00018-9_15

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-00018-9_15

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-00017-2

  • Online ISBN: 978-3-030-00018-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics