Skip to main content

A Design of Network Attack Detection Using Causal and Non-causal Temporal Convolutional Network

  • Conference paper
  • First Online:
Science of Cyber Security (SciSec 2023)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 14299))

Included in the following conference series:

  • 277 Accesses

Abstract

Temporal Convolution Network(TCN) has recently been introduced in the cybersecurity field, where two types of TCNs that consider causal relationships are used: causal TCN and non-causal TCN. Previous researchers have utilized causal and non-causal TCNs separately. Causal TCN can predict real-time outcomes, but it ignores traffic data from the time when the detection is activated. Non-causal TCNs can forecast results more globally, but they are less real-time. Employing either causal TCN or non-causal TCN individually has its drawbacks, and overcoming these shortcomings has become an important topic.

In this research, we propose a method that combines causal and non-causal TCN in a contingent form to improve detection accuracy, maintain real-time performance, and prevent long detection time. Additionally, we use two datasets to evaluate the performance of the proposed method: NSL-KDD, a well-known dataset for evaluating network intrusion detection systems, and MQTT-IoT-2020, which simulates the MQTT protocol, a standard protocol for IoT machine-to-machine communication. The proposed method in this research increased the detection time by about 0.1ms compared to non-causal TCN when using NSL-KDD, but the accuracy improved by about 1.5%, and the recall improved by about 4%. For MQTT-IoT-2020, the accuracy improved by about 3%, and the recall improved by about 7% compared to causal TCN, but the accuracy decreased by about 1% compared to non-causal TCN. The required time was shortened by 30ms (around 30%), and the recall was improved by about 7%.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 69.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 89.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Cheng, P., Xu, K., Li, S., et al.: TCAN-IDS: intrusion detection system for internet of vehicle using temporal convolutional attention network. Symmetry 14(2), 310 (2022). https://doi.org/10.3390/sym14020310

    Article  Google Scholar 

  2. Bai, S., Kolter, J.Z., Koltun, V.: An empirical evaluation of generic convolutional and recurrent networks for sequence modeling. arXiv preprint arXiv:1803.01271 (2018)

  3. Ahmad, Z., Shahid Khan, A., Wai Shiang, C., et al.: Network intrusion detection system: a systematic study of machine learning and deep learning approaches. Trans. Emerg. Telecommun. Technol. 32(1), e4150 (2021). https://doi.org/10.1002/ett.4150

    Article  Google Scholar 

  4. Kim, A., Park, M., Lee, D.H.: AI-IDS: application of deep learning to real-time Web intrusion detection. IEEE Access 8, 70245–70261 (2020). https://doi.org/10.1109/ACCESS.2020.2986882

    Article  Google Scholar 

  5. Gopali, S., Abri, F., Siami-Namini, S., et al.: A comparative study of detecting anomalies in time series data using LSTM and TCN models. arXiv preprint arXiv:2112.09293 (2021)

  6. Thill, M., Konen, W., Bäck, T.: Time series encodings with temporal convolutional networks. In: Filipič, B., Minisci, E., Vasile, M. (eds.) BIOMA 2020. LNCS, vol. 12438, pp. 161–173. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-63710-1_13

    Chapter  Google Scholar 

  7. Derhab, A., Aldweesh, A., Emam, A.Z., et al.: Intrusion detection system for internet of things based on temporal convolution neural network and efficient feature engineering. Wirel. Commun. Mob. Comput. 2020, 1–16 (2020)

    Article  Google Scholar 

  8. Fu, N., Kamili, N., Huang, Y., et al.: A novel deep intrusion detection model based on a convolutional neural network. Aust. J. Intell. Inf. Process. Syst. 15(2), 52–59 (2019)

    Google Scholar 

  9. Ashoor, A.S., Gore, S.: Importance of intrusion detection system (IDS). Int. J. Sci. Eng. Res. 2(1), 1–4 (2011)

    Google Scholar 

  10. Liao, H.J., Lin, C.H.R., Lin, Y.C., et al.: Intrusion detection system: a comprehensive review. J. Netw. Comput. Appl. 36(1), 16–24 (2013)

    Article  Google Scholar 

  11. Liu, Y., Dong, H., Wang, X., et al.: Time series prediction based on temporal convolutional network. In: 2019 IEEE/ACIS 18th International Conference on Computer and Information Science (ICIS), pp 300–305. IEEE (2019)

    Google Scholar 

  12. Xu, B., Lu, C., Guo, Y., et al.: Discriminative multi-modality speech recognition. In: Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, pp. 14433–14442 (2020)

    Google Scholar 

  13. He, Y., Zhao, J.: Temporal convolutional networks for anomaly detection in time series. In: Journal of Physics: Conference Series, vol. 1213, no. 4, p. 042050. IOP Publishing (2019)

    Google Scholar 

  14. Ghulam Mohi-ud-Din, December 29, 2018, “NSL-KDD”, IEEE Dataport. https://doi.org/10.21227/425a-3e55

  15. Lea, C., Vidal, R., Reiter, A., Hager, G.D.: Temporal convolutional networks: a unified approach to action segmentation. In: Hua, G., Jégou, H. (eds.) ECCV 2016. LNCS, vol. 9915, pp. 47–54. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-49409-8_7

    Chapter  Google Scholar 

  16. Raiyn, J.: A survey of cyber attack detection strategies. Int. J. Secur. Appl. 8(1), 247–256 (2014)

    Google Scholar 

  17. Kaloudi, N., Li, J.: The AI-based cyber threat landscape: a survey. ACM Comput. Surv. (CSUR) 53(1), 1–34 (2020)

    Article  Google Scholar 

  18. Ding, Y., Zhai, Y.: Intrusion detection system for NSL-KDD dataset using convolutional neural networks. In: Proceedings of the 2018 2nd International Conference on Computer Science and Artificial Intelligence, pp. 81–85 (2018)

    Google Scholar 

  19. Belgrana, F.Z., Benamrane, N., Hamaida, M.A., et al.: Network intrusion detection system using neural network and condensed nearest neighbors with selection of NSL-KDD influencing features. In: 2020 IEEE International Conference on Internet of Things and Intelligence System (IoTaIS), pp. 23–29. IEEE (2021)

    Google Scholar 

  20. Chaibi, N., Atmani, B., Mokaddem, M.: Deep learning approaches to intrusion detection: a new performance of ANN and RNN on NSL-KDD. In: Proceedings of the 1st International Conference on Intelligent Systems and Pattern Recognition, pp. 45–49 (2020)

    Google Scholar 

  21. Muhuri, P.S., Chatterjee, P., Yuan, X., et al.: Using a long short-term memory recurrent neural network (LSTM-RNN) to classify network attacks. Information 11(5), 243 (2020)

    Article  Google Scholar 

  22. Tang, T.A., Mhamdi, L., McLernon, D., et al.: Deep recurrent neural network for intrusion detection in SDN-based networks. In: 2018 4th IEEE Conference on Network Softwarization and Workshops (NetSoft), pp. 202–206. IEEE (2018)

    Google Scholar 

  23. Xu, W., Jang-Jaccard, J., Singh, A., et al.: Improving performance of autoencoder-based network anomaly detection on NSL-KDD dataset. IEEE Access 9, 140136–140146 (2021)

    Article  Google Scholar 

  24. Chen, Z., Yeo, C.K., Lee, B.S., et al.: Autoencoder-based network anomaly detection. In: 2018 Wireless Telecommunications Symposium (WTS), pp. 1–5. IEEE (2018)

    Google Scholar 

  25. Yin, C., Zhu, Y., Fei, J., et al.: A deep learning approach for intrusion detection using recurrent neural networks. IEEE Access 5, 21954–21961 (2017)

    Article  Google Scholar 

  26. Althubiti, S.A., Jones, E.M., Roy, K.: LSTM for anomaly-based network intrusion detection. In: 2018 28th International Telecommunication Networks and Applications Conference (ITNAC), pp. 1–3. IEEE (2018)

    Google Scholar 

  27. Selvin, S., Vinayakumar, R., Gopalakrishnan, E.A., et al.: Stock price prediction using LSTM, RNN and CNN-sliding window model. In: 2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI), pp. 1643–1647. IEEE (2017)

    Google Scholar 

  28. Pawar, K., Jalem, R.S., Tiwari, V.: Stock market price prediction using LSTM RNN. In: Rathore, V.S., Worring, M., Mishra, D.K., Joshi, A., Maheshwari, S. (eds.) Emerging Trends in Expert Applications and Security. AISC, vol. 841, pp. 493–503. Springer, Singapore (2019). https://doi.org/10.1007/978-981-13-2285-3_58

    Chapter  Google Scholar 

  29. Hindy, H., Bayne, E., Bures, M., Atkinson, R., Tachtatzis, C., Bellekens, X.: Machine learning based IoT intrusion detection system: an MQTT case study (MQTT-IoT-IDS2020 dataset). In: Ghita, B., Shiaeles, S. (eds.) INC 2020. LNNS, vol. 180, pp. 73–84. Springer, Cham (2021). https://doi.org/10.1007/978-3-030-64758-2_6

    Chapter  Google Scholar 

  30. Yao, C., Yang, Y., Yang, J., et al.: A network security situation prediction method through the use of improved TCN and BiDLSTM. Math. Probl. Eng. 2022 (2022)

    Google Scholar 

Download references

Acknowledgement

This work is partially supported by JSPS international scientific exchanges between Japan and India (Bilateral Program DTS-JSPS).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Haibo Zhang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

He, P., Zhang, H., Feng, Y., Sakurai, K. (2023). A Design of Network Attack Detection Using Causal and Non-causal Temporal Convolutional Network. In: Yung, M., Chen, C., Meng, W. (eds) Science of Cyber Security . SciSec 2023. Lecture Notes in Computer Science, vol 14299. Springer, Cham. https://doi.org/10.1007/978-3-031-45933-7_30

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-45933-7_30

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-45932-0

  • Online ISBN: 978-3-031-45933-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics