Abstract
In many applications the capability of Temporal Convolutional Networks (TCNs) on sequence modelling tasks has been confirmed to outperform classic approaches of recurrent neural networks (RNNs). Due to the lack of adequate network traffic flow analyses, anomaly-based approaches in intrusion detection systems are suffering from accurate deployment, analysis and evaluation. Accordingly, this study focused on network intrusion detection for DDoS threats using TCNs with network flow analyzer, CICFlowMeter-v4.0 to classify the network threats using behavior feature analyses. The experimental results reveal that that the prediction accuracy of intrusion detection goes up to 95.77% for model training with Nā=ā50,000 for sizing (N) of samples using the IDS dataset CIC-IDS-2017.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Firat, O., Oztekin, I.: Learning deep temporal representations for brain decoding. In: First International Workshop, (MLMMI 2015), France (2015)
Bai, S., Kolter, J.Z., Koltun, V.: An Empirical Evaluation of Generic Convolutional and Recurrent Networks for Sequence Modeling (2018). arXiv:1803.01271
Gupta, D.: Fundamentals of Deep Learning ā Introduction to Recurrent Neural Networks. Analytics Vidhya (2107)
Hochreiter, S.: Long-short term memory. Neural Comput. 9(8), 1735ā1780 (1997)
Cho, K., Merrienboer, B., Gulcehre, C., Bahdanau, D., Bougares, F., Schwenk, H., Bengio, Y.: Learning Phrase Representations using RNN Encoder-Decoder for Statistical Machine Translation (2014). arXiv:1406.1078
Yu, F., Koltun, V.: Multi-Scale Context Aggregation by Dilated Convolutions (2015). arXiv:1511.07122
Lea, C., Flynn, M.D., Vidal, R., Reiter, A., Hager, G.D.: Temporal convolutional networks for action segmentation and detection. In: Proceedings - 30th IEEE Conference on Computer Vision and Pattern Recognition, CVPR 2017, pp. 1003ā1012 (2017)
University of New Brunswick, CIC-IDS2017 on AWS (2017). https://www.unb.ca/cic/datasets/ids-2017.html
Sharafaldin, I., Lashkari, A., Ghorbani, A.: Toward generating a new intrusion detection dataset and intrusion traffic characterization. In: Proceedings of the 4th International Conference on Information Systems Security and Privacy (ICISSP 2018), pp. 108ā116 (2018)
Kotsiantis, S.B.: Supervised machine learning: a review of classification techniques. Informatica 31, 249ā268 (2007)
Cho, K., Merrienboer, B., Gulcehre, C., Bahdanau, D., Bougares, F., Schwenk, H., Bengio, Y.: Learning Phrase Representations using RNN Encoder-Decoder for Statistical Machine Translation (2014). arXiv:1406.1078I
Acknowledgement
This work was supported jointly by the Ministry of Science and Technology of Taiwan under Grant Nos. MOST 108-3114-E- 492-001 and MOST 108-2410āH -168-003.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
Ā© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Lin, WH., Wang, P., Wu, BH., Jhou, MS., Chao, KM., Lo, CC. (2020). Behaviorial-Based Network Flow Analyses for Anomaly Detection in Sequential Data Using Temporal Convolutional Networks. In: Chao, KM., Jiang, L., Hussain, O., Ma, SP., Fei, X. (eds) Advances in E-Business Engineering for Ubiquitous Computing. ICEBE 2019. Lecture Notes on Data Engineering and Communications Technologies, vol 41. Springer, Cham. https://doi.org/10.1007/978-3-030-34986-8_12
Download citation
DOI: https://doi.org/10.1007/978-3-030-34986-8_12
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-34985-1
Online ISBN: 978-3-030-34986-8
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)