Abstract
With the rapid development of the Internet, the methods of cyber attack have become more complex and the damage to the world has become increasingly greater. Therefore, timely detection of malicious behavior on the Internet has become an important security issue today. This paper proposes an intrusion detection system based on deep learning, applies bidirectional long short term memory architecture to the system, and uses the UNSW-NB15 data set for training and testing. Experimental tests show that the intrusion detection system can effectively detect the known or unknown malicious behavior of the network under the current network environment.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Rowland, C.H.: Intrusion Detection System. US, US6405318 (2002)
Hochreiter, S., Schmidhuber, J.: Long short-term memory. Neural Comput. 9(8), 1735–1780 (1997)
Staudemeyer, R.C.: Applying long short-term memory recurrent neural networks to intrusion detection. S. Afr. Comput. J. 56(1), 136–154 (2015)
Kim, J., et al.: Long short term memory recurrent neural network classifier for intrusion detection. In: International Conference on Platform Technology and Service IEEE, pp. 1–5 (2016)
Graves, A., Schmidhuber, J.: Framewise phoneme classification with bidirectional LSTM and other neural network architectures. Neural Netw. 18(5), 602–610 (2005)
Stolfo, S.J., Stolfo, S.J.: KDD Cup 1999 Dataset (1999)
Moustafa, N., Slay, J: UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set). In: Military Communications and Information Systems Conference (MilCIS), IEEE (2015)
Moustafa, N., Slay, J.: The evaluation of network anomaly detection systems: statistical analysis of the UNSW-NB15 data set and the comparison with the KDD99 data set. Inf. Secur. J. Glob. Perspect. 25, 1–14 (2016)
Olah, C.: Understanding LSTM Networks (2015). http://colah.github.io/posts/2015-08-Understanding-LSTMs/
Denning, D.E.: An Intrusion-Detection Model. IEEE Press, New York (1987)
Lee, W., Stolfo, S.J., Mok, K.W.: A data mining framework for building intrusion detection models. In: Proceedings of the 1999 IEEE Symposium on Security and Privacy, p. 0120 (1999)
Ryan, J., Lin, M.J., Miikkulainen, R.: Intrusion detection with neural networks. Adv. Neural. Inf. Process. Syst. 28(10), 915 (1998)
Gers, F., Schmidhuber, J., Cummins, F.: Learning to forget: continual prediction with LSTM. Neural Comput. 12(10), 2451–2471 (2000)
Acknowledgements
This work is supported by National Natural Science Foundation of China (Grant Nos. 61772550, 61572521, U1636114), National Cryptography Development Fund of China Under Grants No. MMJJ20170112, National Key Research and Development Program of China Under Grants No. 2017YFB0802000, the Natural Science Basic Research Plan in Shaanxi Province of china (Grant Nos. 2016JQ6037) and Guangxi Key Laboratory of Cryptography and Information Security (No. GCIS201610).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer International Publishing AG, part of Springer Nature
About this paper
Cite this paper
Chen, W., Yang, S., Wang, X.A., Zhang, W., Zhang, J. (2019). Network Malicious Behavior Detection Using Bidirectional LSTM. In: Barolli, L., Javaid, N., Ikeda, M., Takizawa, M. (eds) Complex, Intelligent, and Software Intensive Systems. CISIS 2018. Advances in Intelligent Systems and Computing, vol 772. Springer, Cham. https://doi.org/10.1007/978-3-319-93659-8_57
Download citation
DOI: https://doi.org/10.1007/978-3-319-93659-8_57
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-93658-1
Online ISBN: 978-3-319-93659-8
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)