Skip to main content

Deep Learning Based Network Intrusion Detection

  • Conference paper
  • First Online:
Computer Science and Education. Computer Science and Technology (ICCSE 2023)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 2023))

Included in the following conference series:

  • 166 Accesses

Abstract

With the advancement of the times, the network has become an important part of people’s daily life, and its connection with our daily life of clothing, food, housing, transportation, medical education has become increasingly close. However, while the network brings us a richer and faster life, the network security problem is also becoming more and more prominent. Network security risks are posing new challenges to the economy, politics, ecology, national security, science and technology development and other fields, and the network security problem has received wide attention, and network intrusion detection, as an important part of the network security field, needs more attention from us. To further improve the performance of feature extraction for network intrusion data, a combined model based on convolutional neural networks and long short-term memory units is proposed for the problems of gradient disappearance and gradient explosion of ordinary neural networks, and also the improved seagull optimization algorithm is applied to the optimization of the model parameters, and Batch Normalization and Adam optimizer, thus constructing an efficient model.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 79.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 99.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Ots, K.: Network Security Azure Security Handbook, pp. 59–76. Apress, Berkeley, CA (2021)

    Book  Google Scholar 

  2. Hochreiter, S., Schmidhuber, J.: Long short-term memory. Neural Comput. 9(8), 1735–1780 (1997)

    Article  Google Scholar 

  3. Xiong, G., Przystupa, K., Teng, Y., et al.: Online measurement error detection for the electronictransformer in a smart grid. Energies 14(12), 3551 (2021)

    Article  Google Scholar 

  4. Sommer, R., Paxson, V.: Outside the closed world: on using machine learning for network intrusion detection. In: 2010 IEEE Symposium on Security and Privacy, pp. 305–316. IEEE (2010)

    Google Scholar 

  5. Xu, H., Przystupa, K., Fang, C., Marciniak, A., et al.: A combination strategy of feature selection based on an integrated optimization algorithm and weighted k-nearest neighbor to improve the performance of network intrusion detection. Electronics 9(8), 1206 (2020)

    Article  Google Scholar 

  6. Song, W., Beshley, M., Przystupa, K., et al.: A software deep packet inspection system for network traffic analysis and anomaly detection. Sensors 20(6), 1637 (2020)

    Article  Google Scholar 

  7. Kayacik, H.G., Zincir-Heywood, A.N., Heywood, M.I.: Selecting features for intrusion detection: a feature relevance analysis on KDD 99 intrusion detection datasets. In: Proceedings of the Third Annual Conference on Privacy, Security and Trust, vol. 94, pp. 1723–1722 (2005)

    Google Scholar 

  8. Saleh, A.I., Talaat, F.M., Labib, L.M.: A hybrid intrusion detection system (HIDS) based on prioritized k-nearest neighbors and optimized SVM classifiers. Artif. Intell. Rev. 51(3), 403–443 (2019)

    Article  Google Scholar 

  9. Chen, S., Peng, M., Xiong, H., Yu, X.: SVM intrusion detection model based on compressed sampling. J. Electr. Comput. Eng. 2016, 1–6 (2016)

    Article  Google Scholar 

  10. De La Hoz, E., Ortiz, A., Ortega, J., Prieto, B.: PCA filtering and probabilistic SOM for network intrusion detection. Neurocomputing 164, 71–81 (2015)

    Article  Google Scholar 

  11. Al-Yaseen, W.L., Othman, Z.A., Nazri, M.Z.A.: Multi-level hybrid support vector machine and extreme learning machine based on modified K-means for intrusion detection system. Expert Syst. Appl. 67, 296–303 (2017)

    Article  Google Scholar 

  12. Xu, C., Shen, J., Du, X., Zhang, F.: An intrusion detection system using a deep neural network with gated recurrent units. IEEE Access 6, 48697–48707 (2018)

    Article  Google Scholar 

  13. Shen, Y., Zheng, K., Wu, C., et al.: An ensemble method based on selection using bat algorithm for intrusion detection. Comput. J. 61(4), 526–538 (2018)

    Article  Google Scholar 

  14. Kun-peng, Y.: An intrusion detection model based on deep belief networks. Mod. Comput. 02, 10–14 (2015)

    Google Scholar 

Download references

Acknowledgment

This work is funded by the National Natural Science Foundation of China under Grant No. 61772180, the Key R & D plan of Hubei Province(2020BHB004, 2020BAB012).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jun Yu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2024 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Yu, J., Hu, J., Zeng, Y. (2024). Deep Learning Based Network Intrusion Detection. In: Hong, W., Kanaparan, G. (eds) Computer Science and Education. Computer Science and Technology. ICCSE 2023. Communications in Computer and Information Science, vol 2023. Springer, Singapore. https://doi.org/10.1007/978-981-97-0730-0_12

Download citation

  • DOI: https://doi.org/10.1007/978-981-97-0730-0_12

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-97-0729-4

  • Online ISBN: 978-981-97-0730-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics