Skip to main content

An Improved Hybrid Sampling Model for Network Intrusion Detection Based on Data Imbalance

  • Conference paper
  • First Online:
Artificial Intelligence Security and Privacy (AIS&P 2023)

Abstract

Network intrusion detection constitutes a pivotal element in safeguarding computer networks against malicious attacks and unauthorized access. With the widespread proliferation of the internet and the rapid evolution of information technology, network intrusions have become increasingly commonplace and intricate, underscoring the growing significance of network intrusion detection. In order to enhance the performance of network intrusion detection, we propose a sampling method that combines ADASYN with GMM, denoted as AGM. Firstly, the dataset undergoes preprocessing to mitigate noise, inconsistencies, and incompleteness issues inherent in the UNSW-NB15 dataset. Subsequently, sampling processing is applied to the dataset to mitigate the bias towards predicting majority classes, thereby improving prediction accuracy for minority classes. In conclusion, the amalgamation of CNN, BiLSTM, and Channel-Attention in the refined network architecture, CNN-BiLSTM-ATT, capitalizes on the distinctive advantages of each component. The classification outcomes of our experiments demonstrate the notable efficacy of the enhanced sampling technique and network structure for the task of network intrusion detection.

This paper was supported by the National Natural Science Foundation of China.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 49.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 64.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Tesfahun, A., Bhaskari, D.L.: Intrusion detection using random forests classifier with smote and feature reduction. In: 2013 International Conference on Cloud & Ubiquitous Computing & Emerging Technologies, pp. 127–132. IEEE (2013)

    Google Scholar 

  2. Binbusayyis, A., Vaiyapuri, T.: Identifying and benchmarking key features for cyber intrusion detection: an ensemble approach. IEEE Access 7, 106495–106513 (2019)

    Article  Google Scholar 

  3. Koroniotis, N., Moustafa, N., Sitnikova, E., Slay, J.: Towards developing network forensic mechanism for botnet activities in the IoT based on machine learning techniques. In: Hu, J., Khalil, I., Tari, Z., Wen, S. (eds.) MONAMI 2017. LNICST, vol. 235, pp. 30–44. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-90775-8_3

    Chapter  Google Scholar 

  4. Yin, C., Zhu, Y., Fei, J., He, X.: A deep learning approach for intrusion detection using recurrent neural networks. IEEE Access 5, 21954–21961 (2017)

    Article  Google Scholar 

  5. Yong Zhang, X., Chen, D.G., Song, M., Teng, Y., Wang, X.: PCCN: parallel cross convolutional neural network for abnormal network traffic flows detection in multi-class imbalanced network traffic flows. IEEE Access 7, 119904–119916 (2019)

    Article  Google Scholar 

  6. Jiang, K., Wang, W., Wang, A., Haibin, W.: Network intrusion detection combined hybrid sampling with deep hierarchical network. IEEE access 8, 32464–32476 (2020)

    Article  Google Scholar 

  7. Lo, W.W., Layeghy, S., Sarhan, M., Gallagher, M., Portmann, M.: E-GraphSAGE: a graph neural network based intrusion detection system for IoT. In: NOMS 2022-2022 IEEE/IFIP Network Operations and Management Symposium, pp. 1–9. IEEE (2022)

    Google Scholar 

  8. Yanfang, F., Yishuai, D., Cao, Z., Li, Q., Xiang, W.: A deep learning model for network intrusion detection with imbalanced data. Electronics 11(6), 898 (2022)

    Article  Google Scholar 

  9. Moustafa, N., Slay, J.: UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set). In: 2015 Military Communications and Information Systems Conference (MilCIS), pp. 1–6. IEEE (2015)

    Google Scholar 

  10. Zhang, H., Wu, C.Q., Gao, S., Wang, Z., Xu, Y., Liu, Y.: An effective deep learning based scheme for network intrusion detection. In: 2018 24th International Conference on Pattern Recognition (ICPR), pp. 682–687. IEEE (2018)

    Google Scholar 

  11. Zhang, H., Huang, L., Wu, C.Q., Li, Z.: An effective convolutional neural network based on smote and gaussian mixture model for intrusion detection in imbalanced dataset. Comput. Netw. 177, 107315 (2020)

    Article  Google Scholar 

  12. Chawla, N.V., Bowyer, K.W., Hall, L.O., Kegelmeyer, W.P.: SMOTE: synthetic minority over-sampling technique. J. Artif. Intell. Res. 16, 321–357 (2002)

    Article  Google Scholar 

  13. He, H., Bai, Y., Garcia, E.A., Li, S.: ADASYN: adaptive synthetic sampling approach for imbalanced learning. In: 2008 IEEE International Joint Conference on Neural Networks (IEEE World Congress on Computational Intelligence), pp. 1322–1328. IEEE (2008)

    Google Scholar 

Download references

Acknowledgment

This paper was supported by the National Natural Science Foundation of China (No.92159102), the Natural Science Foundation of Jiangxi Province (No.20232ACB205001), Support Plan for Talents in Gan Poyang – Academic and Technical Leader Training Project in Major Disciplines (No.20232BCJ22025).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yuejin Zhang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2024 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Gong, Z., Jiang, J., Jiang, N., Zhang, Y. (2024). An Improved Hybrid Sampling Model for Network Intrusion Detection Based on Data Imbalance. In: Vaidya, J., Gabbouj, M., Li, J. (eds) Artificial Intelligence Security and Privacy. AIS&P 2023. Lecture Notes in Computer Science, vol 14510. Springer, Singapore. https://doi.org/10.1007/978-981-99-9788-6_14

Download citation

  • DOI: https://doi.org/10.1007/978-981-99-9788-6_14

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-99-9787-9

  • Online ISBN: 978-981-99-9788-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics