Abstract
With the enormous increase in the use of the Internet, secure transfer of data across networks has become a challenging task. Attackers are in continuous search of getting information from network traffic, and this is the main reason that efficient intrusion detection techniques are required to identify different kinds of network attacks. In past, various supervised and semi-supervised methods have been developed for intrusion detection. Most of these methods require a large amount of data to develop an efficient intrusion detection system. In the proposed deep neural network and adaptive self-taught-based transfer learning technique, we have exploited the concept of self-taught learning to train deep neural networks for reliable network intrusion detection. In the proposed method, a pre-trained network on regression-related task is used to extract features from NSL-KDD dataset. Original features along with extracted features from the pre-trained network are then provided as an input to the sparse auto-encoder. Self-taught learning-based extracted features, when concatenated with the original features of NSL-KDD dataset, enhance the performance of the sparse auto-encoder. Performance of self-taught learning-based approach is compared against several techniques using ten independent runs in terms of accuracy, false alarm and detection rate, area under the ROC, and PR curve. It is experimentally observed that the auto-encoder trained on the combined original and extracted features is stable and offers good generalization in comparison with the sparse auto-encoder trained on original features alone.




Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.References
Ashoor AS, Gore S (2011) Importance of intrusion detection system (ids). Int J Sci Eng Res 2:1–4
Scarfone K, Mell P (2007) Guide to intrusion detection and prevention systems (idps). NIST Spec Publ 800:94
Letou K, Devi D (2015) Host-based intrusion detection and prevention system (HIDPS). Int J Comput Appl 69:975–988. https://doi.org/10.5120/12136-8419
Mukherjee B, Heberlein LT (1994) Network intrusion detection. IEEE Netw 83:26–41
Masri W, Podgurski A (2008) Application-based anomaly intrusion detection with dynamic information flow analysis 5. Comput Secur 27:176–187. https://doi.org/10.1016/j.cose.2008.06.002
Dı J (2009) Anomaly-based network intrusion detection: techniques, systems and challenges. Comput Secur 28:18–28. https://doi.org/10.1016/j.cose.2008.08.003
Diaz-Gomez PA, Hougen DF (2007) Misuse detection: an iterative process vs. a genetic algorithm approach. In: ICEIS (2), pp 455–458
Malhotra S, Bali V, Paliwal KK (2017) Genetic programming and K-nearest neighbour classifier based intrusion detection model. In: 7th International conference on cloud computing data science and engineering 2017, IEEE, pp 42–46
Zhang C, Jiang J, Kamel M (2005) Intrusion detection using hierarchical neural networks. Pattern Recognit Lett 26:779–791. https://doi.org/10.1016/j.patrec.2004.09.045
Panda M, Patra MR (2007) Network intrusion detection using naive bayes. Int J Comput Sci Netw Secur 7:258–263
Zhang J, Zulkernine M (2005) Network intrusion detection using random forests. PST, Citeseer
Portnoy L, Eskin E, Stolfo S (2001) Intrusion detection with unlabeled data using clustering. In: Proceedings of the ACM CSS workshop on data mining applied to security (DMSA-2001, Citeseer)
Leung K, Leckie C (2005) Unsupervised anomaly detection in network intrusion detection using clusters. In: Proceedings of twenty-eighth Australasian computer science conference, vol 38, pp 333–342
Chizari BMARRM, Eslami AMM (2016) A hybrid method consisting of GA and SVM for intrusion detection system. Neural Comput Appl 27:1669–1676. https://doi.org/10.1007/s00521-015-1964-2
Devaraju SRS (2017) Attack’ s feature selection-based network intrusion detection system using fuzzy control language. Int J Fuzzy Syst 19:316–328. https://doi.org/10.1007/s40815-016-0160-6
Srinivasan T, Vijaykumar V, Chandrasekar R (2006) A self-organized agent-based architecture for power-aware intrusion detection in wireless ad-hoc networks. In: 2006 International conference on computing and informatics, 2006, pp 1–6. https://doi.org/10.1109/icoci.2006.5276609
Puri A, Sharma N (2017) A novel technique for intrusion detection system for network security using hybrid svm-cart. Int J Eng Dev Res 5:155–161
Mukkamala S, Janoski G, Sung A (2002) Intrusion detection using neural networks and support vector machines. In: Proceedings of the 2002 international joint conference on neural networks, IJCNN’02, 2002, pp 1702–1707
Aamir R, Ashfaq R, Wang X, Zhexue J, Abbas H, He Y (2017) Fuzziness based semi-supervised learning approach for intrusion detection system. Inf Sci 378:484–497. https://doi.org/10.1016/j.ins.2016.04.019
Kim J, Shin N, Jo SY, Kim SH. Method of intrusion detection using deep neural network. In: 2017 IEEE International conference on big data and smart computing (BigComp), IEEE; 2017, pp 313–316
Kevric J, Jukic S, Subasi A (2016) An effective combining classifier approach using tree algorithms for network intrusion detection. Neural Comput Appl. https://doi.org/10.1007/s00521-016-2418-1
Cup KDD (2007) Data: available on https://archive.ics.uci.edu/ml/datasets/kdd+cup+1999+data. Accessed 25 Mar 2019
Tavallaee M, Bagheri E, Lu W, Ghorbani AA (2009) A detailed analysis of the KDD CUP 99 data set. In: Computational intelligence in security and defence application, 2009, pp 1–6
Lu C, Min H, Gui J, Zhu L, Lei Y (2013) Face recognition via weighted sparse representation. J Vis Commun Image Represent 24:111–116. https://doi.org/10.1016/j.jvcir.2012.05.003
Mi J, Lei D, Gui J (2013) Optik a novel method for recognizing face with partial occlusion via sparse representation. Opt Int J Light Electron Opt 124:6786–6789. https://doi.org/10.1016/j.ijleo.2013.05.099
Gui J, Liu T, Tao D, Sun Z, Tan T (2016) Representative vector machines: a unified framework for classical classifiers. IEEE Trans Cybern 46:1877–1888
Gui J, Tao D, Sun Z, Luo Y, You X, Tang YY (2014) Group sparse multiview patch alignment framework with view consistency for image classification. IEEE Trans Image Process 23:3126–3137
Gui J, Sun Z, Hou G, Tan T. An optimal set of code words and correntropy for rotated least squares regression. In: IEEE international joint conference on biometrics (IJCB), 2014, pp 1–6
Qureshi AS, Khan A, Zameer A, Usman A (2017) Wind power prediction using deep neural network based meta regression and transfer learning. Appl Soft Comput J 58:742–755. https://doi.org/10.1016/j.asoc.2017.05.031
Gui J, Sun Z, Ji S, Member S, Tao D, Tan T (2017) Feature selection based on structured sparsity: a comprehensive study. IEEE Trans Neural Netw Learn Syst 28:1490–1507
Raina R, Battle A, Lee H, Packer B, Ng AY (2007) Self-taught learning: transfer learning from unlabeled data. In: Proceedings of the 24th international conference on machine learning, ACM, 2007, pp 759–66
Maurer A, Pontil M, Romera-Paredes B. Sparse coding for multitask and transfer learning. In: International conference on machine learning, 2013, pp 343–351
Lim JJ, Salakhutdinov RR, Torralba A (2011) Transfer learning by borrowing examples for multiclass object detection. In: Advances in neural information processing systems, 2011, pp 118–126
Hu Q, Zhang R, Zhou Y (2016) Transfer learning for short-term wind speed prediction with deep neural networks. Renew Energy 85:83–95. https://doi.org/10.1016/j.renene.2015.06.034
Du B, Zhang L, Tao D, Zhang D (2013) Neurocomputing unsupervised transfer learning for target detection from hyperspectral images. Neurocomput J 120:72–82. https://doi.org/10.1016/j.neucom.2012.08.056
Cao X (2013) A practical transfer learning algorithm for face verification. In: IEEE international conference on computer vision (ICCV), 2013, pp 3208–3215. https://doi.org/10.1109/iccv.2013.398
Yang S, Lin M, Hou C (2012) A general framework for transfer sparse subspace learning. Neural Comput Appl. https://doi.org/10.1007/s00521-012-1084-1
La L, Guo Q, Cao Q, Wang Y (2014) Transfer learning with reasonable boosting strategy. Neural Comput Appl 24:807–816. https://doi.org/10.1007/s00521-012-1297-3
Yang S, Hou C, Zhang C (2013) Robust non-negative matrix factorization via joint sparse and graph regularization for transfer learning. Neural Comput Appl. https://doi.org/10.1007/s00521-013-1371-5
Seera M, Peng C (2014) Transfer learning using the online fuzzy min–max neural network. Neural Comput Appl. https://doi.org/10.1007/s00521-013-1517-5
Silva M, Cardoso JS (2017) Multi-source deep transfer learning for cross-sensor biometrics. Neural Comput Appl. https://doi.org/10.1007/s00521-016-2325-5
Khan A, Sohail A, Ali A (2018) A new channel boosted convolution neural network using transfer learning. arXiv:180408528
Khan A et al (2019) A survey of the recent architectures of deep convolutional neural networks. arXiv:1901.06032
Acknowledgements
This work is supported by the Higher Education Commission of Pakistan under the Indigenous Ph.D. Scholarship (PIN#213-54573-2EG2-097) Program. We also acknowledge Pakistan Institute of Engineering and Applied Sciences (PIEAS) for healthy research environment which led to the research work presented in this article.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
The authors declare that they have no conflict of interest.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Qureshi, A.S., Khan, A., Shamim, N. et al. Intrusion detection using deep sparse auto-encoder and self-taught learning. Neural Comput & Applic 32, 3135–3147 (2020). https://doi.org/10.1007/s00521-019-04152-6
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s00521-019-04152-6