Abstract
This paper presents an anomaly detection approach based on deep learning techniques. A bidirectional long-short-term memory (Bi-LSTM) was applied on the UNSW-NB15 dataset to detect the anomalies. UNSW-NB15 represents raw network packets that contains both the normal activities and anomalies. The data was preprocessed through data normalization and reshaping, and then fed into the Bidirectional LSTM model for anomaly detection. The performance of the BLSTM was measured based on the accuracy, precision, F-Score, and recall. The Bi-LSTM model generated high detection results compared to other machine learning and deep learning models.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Yin, C., et al.: A deep learning approach for intrusion detection using recurrent neural networks. IEEE Access 5, 21954–21961 (2017)
Manoj, P.: Deep learning approach for intrusion detection system (IDS) in the internet of things (IOT) network using gated recurrent neural networks (GRU) (2011)
Quamar, N., Weiqing, S., Ahmad, J., Mansoor, A.: A deep learning approach for network intrusion detection system
LeCun, Y., Bengio, Y., Hinton, G.: Deep learning. Nature 521(7553), 436–444 (2015)
Diro, A., Chilamkurti, N.: Leveraging LSTM networks for attack detection in fog-to-things communications. IEEE Commun. Mag. 56(9), 124–130 (2018)
Malhotra, P., et al.: Long short term memory networks for anomaly detection in time series. In: Proceedings of European Symposium on Artificial Neural Networks Computational Intelligence and Machine Learning, pp. 22–24 (2015)
Chung, J., Gulcehre, C., Cho, K., Bengio, Y.: Empirical evaluation of gated recurrent neural networks on sequence modeling. arXiv preprint arXiv:1412.3555v1 [cs.NE] (2014)
Mohammad, M., Alfuqaha, A., Sorour, S.: Deep learning for IoT big data and streaming analytics: a survey (2017)
Liu, G., Guo, J.: Bidirectional LSTM with attention mechanism and convolutional layer for text classification (2019)
Kim, J., Kim, H: An effective intrusion detection classifier using long short-term memory with gradient descent optimization. In: International Conference on Platform Technology and Service (PlatCon), pp. 1–6. IEEE (2017)
Breiman, L.: Random forests. Mach. Learn. 45(1), 5–32 (2001)
Belouch, M., Hadaj, S., IdHammad, M.: Performance evaluation of intrusion detection based on machine learning using apache spark. Proc. Comput. Sci. 127(C), 1–6 (2018)
Sak, H., Senior, A.W., Beaufays, F.: Long short-term memory recurrent neural network architectures for large scale acoustic modeling. In: Proceedingsof Annual Conference on International Speech Communication Association (INTERSPEECH), pp. 338–342, September 2014
Moustafa, N., Slay, J:A hybrid feature selection for network intrusion detection systems: central points (2017)
Moustafa, N., Slay, J: The evaluation of network anomaly detection systems: statistical analysis of the UNSW-NB15 data set and the comparison with the KDD99 data set (2016)
Li, Z., Batta, P., Trajkovic, L.: Comparison of machine learning algorithms for detection of network intrusions (2018)
Williams, R.J.: Simple statistical gradient-following algorithms for connectionist reinforcement learning. Mach. Learn. 8(3), 229–256 (1992)
Hochreiter, S., Schmidhuber, J.: Long short-term memory. Neural Comput. 9(8), 1735–1780 (1997)
Moustafa, N., Slay, J.: The significant features of the UNSW-NB15 and the KDD99 data sets for network intrusion detection systems (2015)
Kim, J., Shin, N., Jo, S.Y., Kim, S.H.: Method of intrusion detection using deep neural network. In: IEEE International Conference on Big Data and Smart Computing (BigComp), Jeju, pp. 313–316 (2017)
Park, S.H., Goo, J.M., Jo, C.H.: Receiver operating characteristic (ROC) curve: practical review for radiologists (2004)
Zhou, X.H., Obuchowski, N.A., McClish, D.K.: Statistical Methods in Diagnostic Medicine, 1st edn, pp. 15–164. Wiley, New York (2002)
Godoy, D.: Understanding binary cross-entropy/log loss: a visual explanation (2018)
Acknowledgments
This research is based upon the work supported by the CISCO systems, Inc.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 Springer Nature Switzerland AG
About this paper
Cite this paper
Aljbali, S., Roy, K. (2021). Anomaly Detection Using Bidirectional LSTM. In: Arai, K., Kapoor, S., Bhatia, R. (eds) Intelligent Systems and Applications. IntelliSys 2020. Advances in Intelligent Systems and Computing, vol 1250. Springer, Cham. https://doi.org/10.1007/978-3-030-55180-3_45
Download citation
DOI: https://doi.org/10.1007/978-3-030-55180-3_45
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-55179-7
Online ISBN: 978-3-030-55180-3
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)