Skip to main content

Using Long-Short-Term Memory Based Convolutional Neural Networks for Network Intrusion Detection

  • Conference paper
  • First Online:

Abstract

The quantity of internet use has grown dramatically in the last decade. Internet is almost available in every human activity. However, there are some critical obstacles behind this massive development. Security becomes the hottest issue among the researchers. In this study, we focus on intrusion detection system (IDS) which is one of the solutions for security problems on network administration. Since intrusion detection system is a kind of classifier machine, it is allowed to engage with machine learning schemes. Related to this reason, the number of studies related to utilizing machine learning schemes for intrusion detection system has been increased recently. In this study, we use NSL-KDD dataset as the benchmark. Even though machine learning schemes perform well on intrusion detection, the obtained result on NSL-KDD dataset is not satisfied enough. On the other hand, deep learning offers the solution to overcome this issue. We propose two deep learning models which are long-short-term memory only (LSTM-only) and the combination of convolutional neural networks and LSTM (CNN-LSTM) for intrusion detection system. Both proposed methods achieve better accuracy than that of the existing method which uses recurrent neural networks (RNN).

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Revathi, S., Malathi, A.: A detailed analysis on NSL-KDD dataset using various machine learning techniques for intrusion detection. Int. J. Eng. Res. Technol. 2, 1848–1853 (2013)

    Google Scholar 

  2. Dhanabal, L., Shantharajah, S.P., Dr.: A study on NSL-KDD dataset for intrusion detection system based on classification algorithms. In: International Journal of Advanced Research in Computer and Communication Engineering, vol. 4, pp. 446–452 (2015)

    Google Scholar 

  3. Kuang, F., Xu, W., Zhang, S.: A novel hybrid KPCA and SVM with GA model for intrusion detection. Appl. Soft Comput. 18, 178–184 (2014)

    Article  Google Scholar 

  4. Hettich, S., Bay, S.D.: The UCI KDD Archive, University of California, Department of Information and Computer Science, Irvine, CA (1999). http://kdd.ics.uci.edu

  5. Reddy, R.R., Ramadevi, Y., Sunitha, K.V.N.: Effective discriminant function for intrusion detection using SVM. In: International Conference on Advances in Computing, Communications and Informatics (ICACCI), pp. 11481153 (2016)

    Google Scholar 

  6. Ingre, B., Yadav, A.: Performance analysis of NSL-KDD dataset using ANN. In: International Conference on Signal Processing and Communication Engineering Systems (SPACES), pp. 9296 (2015)

    Google Scholar 

  7. Farnaaz, N., Jabbar, M.A.: Random forest modeling for network intrusion detection system. Procedia Comput. Sci. 89, 213217 (2016)

    Article  Google Scholar 

  8. Zhang, J., Zulkernine, M., Haque, A.: Random-forests-based network intrusion detection systems. IEEE Trans. Syst. Man Cybern. Part C (Appl. Rev.) 38, 649–659 (2008)

    Google Scholar 

  9. Niyaz, Q., Sun, W., Javaid, A.Y., Alam, M.: A deep learning approach for network intrusion detection system. EAI Endorsed Trans. Secur. Saf. 16, 21–26 (2015)

    Google Scholar 

  10. Xu, Y., Shi, L., Ni, Y.: Deep-learning-based scenario generation strategy considering correlation between multiple wind farms. J. Eng. 2017, 2207–2210 (2017)

    Google Scholar 

  11. Wu, B.-F., Lin, C.-H.: Adaptive feature mapping for customizing deep learning based facial expression recognition model. IEEE Access 6, 12451–12461 (2018)

    Article  Google Scholar 

  12. Wang, T., Wen, C.-K., Wang, H., Gao, F., Jiang, T., Jin, S.: Deep learning for wireless physical layer: opportunities and challenges. China Commun. 14, 92–111 (2017)

    Article  Google Scholar 

  13. Yin, C., Zhu, Y., Fei, J., He, X.: A deep learning approach for intrusion detection using recurrent neural networks. IEEE Access 5, 21954–21961 (2017)

    Google Scholar 

  14. Hochreiter, S., Schmidhuber, J.: Long short-term memory. Neural Comput. 9, 1735–1780 (1997)

    Google Scholar 

  15. Kaushik, S.S., Deshmukh, P.R., Dr. Prof.: Detection of attacks in an intrusion detection system. Int. J. Comput. Sci. Inf. Technol. 2(3), 982–986 (2011)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jenq-Shiou Leu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Hsu, CM., Hsieh, HY., Prakosa, S.W., Azhari, M.Z., Leu, JS. (2019). Using Long-Short-Term Memory Based Convolutional Neural Networks for Network Intrusion Detection. In: Chen, JL., Pang, AC., Deng, DJ., Lin, CC. (eds) Wireless Internet. WICON 2018. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 264. Springer, Cham. https://doi.org/10.1007/978-3-030-06158-6_9

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-06158-6_9

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-06157-9

  • Online ISBN: 978-3-030-06158-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics