Skip to main content
Log in

A Network Intrusion Detection Method Based on Deep Multi-scale Convolutional Neural Network

  • Published:
International Journal of Wireless Information Networks Aims and scope Submit manuscript

Abstract

Network intrusion detection (NID) is an important method for network system administrators to detect various security holes. The performance of traditional NID methods can be affected when unknown or new attacks are detected. Compared with other machine learning methods, the intrusion detection method based on convolutional neural network (CNN) can significantly improve the accuracy of classification, but the convergence speed and generalization ability of CNN are not ideal in model training process resulting in a low true rate and a high false alarm rate. To solve the above problems, this paper proposes a deep multi-scale convolutional neural network (DMCNN) for network intrusion detection. Different levels of features in a large number of high-dimensional unlabeled original data are extracted by different scales convolution kernel. And the learning rate of network structure is optimized by batch normalization method to obtain the optimal feature representation of the raw data. We use NSL-KDD dataset as the benchmark thus we can compare the performance of our proposed method with other existing works. This dataset includes two testing sets which are the first one is KDDTest+ while the second one is \(\text {KDDTest}^{-21}\) which is more difficult to be classified. The experimental results reveal that the AC and TPR are higher through our DMCNN model. Especially, in terms of DOS, the AC appropriately reaches to 98%. DMCNN has a high intrusion detection accuracy and a low false alarm rate, which overcomes the limitations of using the traditional detection methods and makes the new approach an attractive one for practical intrusion detection.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

References

  1. P. Li, Z. Chen, T. Yang, et al., An Incremental Deep Convolutional Computation Model for Feature Learning on Industrial Big Data, IEEE Transactions on Industrial Informatics, Vol. 15, No. 3, pp. 1341–1349, 2019.

    Article  Google Scholar 

  2. J. Gao, J. Li and Y. Li, Approximate event detection over multi-modal sensing data, Journal of Combinatorial Optimization, Vol. 32, pp. 1002–1016, 2016.

    Article  MathSciNet  MATH  Google Scholar 

  3. L. Teng, H. Li. CSDK: A Chi-square Distribution-Kernel method for Image De-noising Under the IoT Big Data Environment, International Journal of Distributed Sensor Networks, Vol. 15, No. 5, 2019.

  4. C. Ioannou, V. Vassiliou, C. Sergiou. An Intrusion Detection System for Wireless Sensor Networks. In 2017 24th International Conference on Telecommunications (ICT), Limassol, pp. 1-5, 2017.

  5. E. Hodo, X. Bellekens, A. Hamilton, et al., Threat analysis of IoT networks Using Artificial Neural Network Intrusion Detection System, Tetrahedron Letters, Vol. 42, No. 39, pp. 6865–6867, 2017.

    Google Scholar 

  6. L. Al-Yaseen, A. Othman and A. Nazri, Multi-level hybrid support vector machine and extreme learning machine based on modified K-means for intrusion detection system, Expert Systems with Applications, Vol. 67, pp. 296–303, 2017.

    Article  Google Scholar 

  7. M. S. M. Pozi, M. N. Sulaiman, N. Mustapha, et al., Improving Anomalous Rare Attack Detection Rate for Intrusion Detection System Using Support Vector Machine and Genetic Programming, Neural Processing Letters, Vol. 44, No. 2, pp. 1–12, 2015.

    Google Scholar 

  8. S. Devaraju and S. Ramakrishnan, Performance comparison for intrusion detection system using neural network with KDD dataset, Ictact Journal on Soft Computing, Vol. 4, No. 3, pp. 743–752, 2014.

    Article  Google Scholar 

  9. S. Roy, A. Mallik, R. Gulati, et al. A Deep Learning Based Artificial Neural Network Approach for Intrusion Detection. In International Conference on Mathematics and Computing (ICMC), pp, 44-53, 2017.

  10. D. Yang, G. Chen, H. Wang, et al., Learning Vector Quantization Neural Network Method for Network Intrusion Detection, Wuhan University Journal of Natural Sciences, Vol. 12, No. 1, pp. 147–150, 2007.

    Article  Google Scholar 

  11. L. Teng, H. Li, and S. Karim. DMCNN: A Deep Multiscale Convolutional Neural Network Model for Medical Image Segmentation. Journal of Healthcare Engineering 2019.

  12. Nkiama Herve, Syed Zainudeen Mohd Said and Muhammad Saidu, A subset feature elimination mechanism for intrusion detection system, International Journal of Advanced Computer Science and Applications, Vol. 7, No. 4, pp. 148–157, 2016.

    Google Scholar 

  13. W. Wang, H. Man. Exploring social relations for the intrusion detection in ad hoc networks. In Proceedings of SPIE, Vol. 7344, 2009.

  14. H. Chen, G. Wan, Z. Xiao, et al., Intrusion detection method of deep belief network model based on optimization of data processing, Journal of Computer Applications, Vol. 37, No. 6, pp. 1636–1643, 2017.

    Google Scholar 

  15. X. Cheng, X. Gong. An Image Segmentation of Fuzzy C-Means Clustering Based on the Combination of Improved Ant Colony Algorithm and Genetic Algorithm[C]// International Workshop on International Workshop on Education Technology & Training, 2009.

  16. P. Jeatrakul, W. Wong and C. Fung, Classification of Imbalanced Data by Combining the Complementary Neural Network and SMOTE Algorithm, Neural Information Processing Models & Applications, Vol. 6444, pp. 152–159, 2010.

    Google Scholar 

  17. X. Niu, Z. Wang and Z. Pan, Extreme Learning Machine based Deep Model for Human Activity Recognition with Wearable Sensors, Computing in Science & Engineering, Vol. 21, No. 5, pp. 16–25, 2018.

    Article  Google Scholar 

  18. M. Alom, V. Bontupalli, T. Taha. Intrusion detection using deep belief networks. In Aerospace & Electronics Conference, 2016.

  19. Q. Tan, H. Wei, L. Qiang. An intrusion detection method based on DBN in ad hoc networks. In International Conference on Wireless Communication & Sensor Network, 2016.

  20. J. Kumar, R. Goomer and A. Singh, Long Short Term Memory Recurrent Neural Network (LSTM-RNN) Based Workload Forecasting Model For Cloud Datacenters, Procedia Computer Science, Vol. 125, pp. 676–682, 2018.

    Article  Google Scholar 

  21. R. Zemouri, R. Gouriveau and P. Patic, Combining a recurrent neural network and a PID controller for prognostic purpose: a way to improve the accuracy of predictions, Wseas Transactions on Systems & Control, Vol. 5, No. 5, pp. 353–371, 2010.

    Google Scholar 

  22. M. Bari, H. Taher, S. Sherazi, et al. Supervised Machine Learning for Signals Having RRC Shaped Pulses, 2017. arXiv:1705.06299.

  23. Taniguchi, Hidetaka, Sato, Hiroshi, Shirakawa, Tomohiro. A machine learning model with human cognitive biases capable of learning from small and biased datasets, Scientific Reports, Vol. 8, No. 1, 2018.

  24. R. Ayachi, M. Afif, Y. Said, et al. Traffic Signs Detection for Real-World Application of an Advanced Driving Assisting System Using Deep Learning, Neural Processing Letters, Vol. 51, pp. 837C851, 2020.

  25. Ivo Berger, Roland Rieke, Maxim Kolomeec, et al. Comparative Study of Machine Learning Methods for In-Vehicle Intrusion Detection[C]. International Workshop on Security and Privacy Requirements Engineering, pp. 85-101, 2018.

  26. Debar H, Becker M, Siboni D. A Neural Network Component for an Intrusion Detection System[C]// IEEE Symposium on Security & Privacy, 1992.

  27. Gaffer S M, Yahia M E, Ragab K. Genetic fuzzy system for intrusion detection: Analysis of improving of multiclass classification accuracy using KDDCup-99 imbalance dataset[C]// International Conference on Hybrid Intelligent Systems, 2013.

  28. D. Heider, C. Bartenhagen, J. N. Dybowski, et al., Unsupervised DimensionReduction Methods for Protein Sequence Classification[M]// DataAnalysis, Machine Learning and Knowledge Discovery, Springer International Publishing, New York; 2014.

    Google Scholar 

  29. Staudemeyer R C, Omlin C W. Evaluating performance of long short-term memory recurrent neural networks on intrusion detection data[C]// Proceedings of the South African Institute for Computer Scientists and Information Technologists Conference, pp. 218-224, 2013.

  30. Y. Zhang, X. Chen, L. Jin, et al., Network Intrusion Detection: Based on Deep Hierarchical Network and Original Flow Data, IEEE Access, Vol. 7, pp. 37004–37016, 2019.

    Article  Google Scholar 

  31. Agarap A F. A Neural Network Architecture Combining Gated Recurrent Unit (GRU) and Support Vector Machine (SVM) for Intrusion Detection in Network Traffic Data. In Proceedings of the 2018 10th International Conference on Machine Learning and ComputingFebruary, pp. 26C30, 2018.

  32. S. H. Song and D. K. Kim, Development of a Stress Classification Model Using Deep Belief Networks for Stress Monitoring, Healthcare Informatics Research, Vol. 23, No. 4, pp. 285–292, 2017.

    Article  Google Scholar 

  33. W. Wang, M. Zhu, X. Zeng, X. Ye and Y. Sheng. Malware traffic classification using convolutional neural network for representation learning. In 2017 International Conference on Information Networking (ICOIN), Da Nang, pp. 712-717, 2017.

  34. S. Yin, Y. Zhang and S. Karim. Region search based on hybrid convolutional neural network in optical remote sensing images, International Journal of Distributed Sensor Networks, Vol. 15, No. 5, 2019.

  35. P. Chang, J. Zhang, J. Wang, et al., ELMAENet: A Simple, Effective and Fast Deep Architecture for Image Classification, Neural Processing Letters, Vol. 51, pp. 129–146, 2020.

    Article  Google Scholar 

  36. Maissa Hamouda, Karim Saheb Ettabaa, Med Salim Bouhlel. Framework for Automatic Selection of Kernels based on Convolutional Neural Networks and CkMeans Clustering Algorithm, International Journal of Image and Graphics, Vol. 19, No. 4, 2019.

  37. P. Li, Z. Chen, L. Yang, et al., An Improved Stacked Auto-Encoder for Network Traffic Flow Classification, IEEE Network, Vol. 32, No. 6, pp. 22–27, 2018.

    Article  Google Scholar 

  38. S. Yin, Y. Zhang and S. Karim, Large Scale Remote Sensing Image Segmentation Based on Fuzzy Region Competition and Gaussian Mixture Model, IEEE Access., Vol. 6, pp. 26069–26080, 2018.

    Article  Google Scholar 

  39. Shafiee M J, Barshan E, Wong A. Evolution in Groups: A deeper look at synaptic cluster driven evolution of deep neural networks, arXiv:1609.01360, 2017.

  40. V. Golovko and L. Vaitsekhovich, Neural Networks approaches for Intrusion Detection and Recognition, Ndt & E International, Vol. 41, No. 4, pp. 252–257, 2014.

    Google Scholar 

  41. Hai-He T. Intrusion Detection Method Based on Improved Neural Network[C]// 2018 International Conference on Smart Grid and Electrical Automation (ICSGEA), 2018.

  42. S. Mohammadi and F. Amiri, An Efficient Hybrid Self-Learning Intrusion Detection System Based on Neural Networks, International Journal of Computational Intelligence and Applications, Vol. 18, No. 1, p. 1950001, 2019.

    Article  Google Scholar 

  43. Z. Yue and L. Jing, CMA: A Reconfigurable Complex Matching Accelerator for Wire-speed Network Intrusion Detection, IEEE Computer Architecture Letters, Vol. 17, No. 1, pp. 33–36, 2018.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Shoulin Yin or Hang Li.

Ethics declarations

Conflict of interest

The authors declare that they have no conflict of interest.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Wang, X., Yin, S., Li, H. et al. A Network Intrusion Detection Method Based on Deep Multi-scale Convolutional Neural Network. Int J Wireless Inf Networks 27, 503–517 (2020). https://doi.org/10.1007/s10776-020-00495-3

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10776-020-00495-3

Keywords

Navigation