Skip to main content

Anomaly Detection Using Bidirectional LSTM

  • Conference paper
  • First Online:
Intelligent Systems and Applications (IntelliSys 2020)

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 1250))

Included in the following conference series:

Abstract

This paper presents an anomaly detection approach based on deep learning techniques. A bidirectional long-short-term memory (Bi-LSTM) was applied on the UNSW-NB15 dataset to detect the anomalies. UNSW-NB15 represents raw network packets that contains both the normal activities and anomalies. The data was preprocessed through data normalization and reshaping, and then fed into the Bidirectional LSTM model for anomaly detection. The performance of the BLSTM was measured based on the accuracy, precision, F-Score, and recall. The Bi-LSTM model generated high detection results compared to other machine learning and deep learning models.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Yin, C., et al.: A deep learning approach for intrusion detection using recurrent neural networks. IEEE Access 5, 21954–21961 (2017)

    Article  Google Scholar 

  2. Manoj, P.: Deep learning approach for intrusion detection system (IDS) in the internet of things (IOT) network using gated recurrent neural networks (GRU) (2011)

    Google Scholar 

  3. Quamar, N., Weiqing, S., Ahmad, J., Mansoor, A.: A deep learning approach for network intrusion detection system

    Google Scholar 

  4. LeCun, Y., Bengio, Y., Hinton, G.: Deep learning. Nature 521(7553), 436–444 (2015)

    Article  Google Scholar 

  5. Diro, A., Chilamkurti, N.: Leveraging LSTM networks for attack detection in fog-to-things communications. IEEE Commun. Mag. 56(9), 124–130 (2018)

    Article  Google Scholar 

  6. Malhotra, P., et al.: Long short term memory networks for anomaly detection in time series. In: Proceedings of European Symposium on Artificial Neural Networks Computational Intelligence and Machine Learning, pp. 22–24 (2015)

    Google Scholar 

  7. Chung, J., Gulcehre, C., Cho, K., Bengio, Y.: Empirical evaluation of gated recurrent neural networks on sequence modeling. arXiv preprint arXiv:1412.3555v1 [cs.NE] (2014)

  8. Mohammad, M., Alfuqaha, A., Sorour, S.: Deep learning for IoT big data and streaming analytics: a survey (2017)

    Google Scholar 

  9. Liu, G., Guo, J.: Bidirectional LSTM with attention mechanism and convolutional layer for text classification (2019)

    Google Scholar 

  10. Kim, J., Kim, H: An effective intrusion detection classifier using long short-term memory with gradient descent optimization. In: International Conference on Platform Technology and Service (PlatCon), pp. 1–6. IEEE (2017)

    Google Scholar 

  11. Breiman, L.: Random forests. Mach. Learn. 45(1), 5–32 (2001)

    Article  Google Scholar 

  12. Belouch, M., Hadaj, S., IdHammad, M.: Performance evaluation of intrusion detection based on machine learning using apache spark. Proc. Comput. Sci. 127(C), 1–6 (2018)

    Article  Google Scholar 

  13. Sak, H., Senior, A.W., Beaufays, F.: Long short-term memory recurrent neural network architectures for large scale acoustic modeling. In: Proceedingsof Annual Conference on International Speech Communication Association (INTERSPEECH), pp. 338–342, September 2014

    Google Scholar 

  14. Moustafa, N., Slay, J:A hybrid feature selection for network intrusion detection systems: central points (2017)

    Google Scholar 

  15. Moustafa, N., Slay, J: The evaluation of network anomaly detection systems: statistical analysis of the UNSW-NB15 data set and the comparison with the KDD99 data set (2016)

    Google Scholar 

  16. Li, Z., Batta, P., Trajkovic, L.: Comparison of machine learning algorithms for detection of network intrusions (2018)

    Google Scholar 

  17. Williams, R.J.: Simple statistical gradient-following algorithms for connectionist reinforcement learning. Mach. Learn. 8(3), 229–256 (1992)

    MathSciNet  MATH  Google Scholar 

  18. Hochreiter, S., Schmidhuber, J.: Long short-term memory. Neural Comput. 9(8), 1735–1780 (1997)

    Article  Google Scholar 

  19. Moustafa, N., Slay, J.: The significant features of the UNSW-NB15 and the KDD99 data sets for network intrusion detection systems (2015)

    Google Scholar 

  20. Kim, J., Shin, N., Jo, S.Y., Kim, S.H.: Method of intrusion detection using deep neural network. In: IEEE International Conference on Big Data and Smart Computing (BigComp), Jeju, pp. 313–316 (2017)

    Google Scholar 

  21. Park, S.H., Goo, J.M., Jo, C.H.: Receiver operating characteristic (ROC) curve: practical review for radiologists (2004)

    Google Scholar 

  22. Zhou, X.H., Obuchowski, N.A., McClish, D.K.: Statistical Methods in Diagnostic Medicine, 1st edn, pp. 15–164. Wiley, New York (2002)

    Book  Google Scholar 

  23. Godoy, D.: Understanding binary cross-entropy/log loss: a visual explanation (2018)

    Google Scholar 

Download references

Acknowledgments

This research is based upon the work supported by the CISCO systems, Inc.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sarah Aljbali .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Aljbali, S., Roy, K. (2021). Anomaly Detection Using Bidirectional LSTM. In: Arai, K., Kapoor, S., Bhatia, R. (eds) Intelligent Systems and Applications. IntelliSys 2020. Advances in Intelligent Systems and Computing, vol 1250. Springer, Cham. https://doi.org/10.1007/978-3-030-55180-3_45

Download citation

Publish with us

Policies and ethics