skip to main content
10.1145/3426826.3426843acmotherconferencesArticle/Chapter ViewAbstractPublication PagesmlmiConference Proceedingsconference-collections
research-article

Bi-LSTM: Finding Network Anomaly Based on Feature Grouping Clustering

Authors Info & Claims
Published:17 December 2020Publication History

ABSTRACT

Intrusion detection is one of the key technologies to ensure the security of cyberspace. In this paper, a detection model of Bi-LSTM, whose powerful serialization modeling function can discover the time series characteristics from network data, combined with machine learning algorithm K-means is proposed. We know that the data collected by network sensor or audit log has many attributes. In order to achieve a successful classification with low computational cost, it is important to employing the most relevant and discriminating features. How to extract useful information from those attributes to improve detection rate and reduce false detection are challenging. First, we group attributes according to the conditions on which they are collected or more generally, evenly. Then we cluster attributes of each group with K-means. So, we got the same number of hyper-features as the number of the groups. On the one side data reduction is significant and the data volume was greatly declined up to 85%. On the other side, the extracted features, also called hyper features, are more concentrated and informative than the low-level attributes. Detection rate on the high-level features is better than that on original attributes, both with traditional machine learning classification of C4.5 or our hybrid model. The intrusion detection rate of the powerful serialization model, Bi-LSTM based on K-means, is as high as 99.93%, the accuracy rate as high as 98.84%, and the false detection rate is 0. Moreover, experiments show that our Bi-LSTM model plus K-means works well with new attacks only appeared in test data too, which is meaningful for intrusion detection.

References

  1. Bouzida Y, Cuppens F, Boulahia N C, et. Efficient intrusion detection using principal component analysis. In 3eme Conference sur la Securite et Architectures Reseaux (SAR), La Londe, France, 2004.Google ScholarGoogle Scholar
  2. Kayacik H G, Zincir-Heywood A N, Heywood M I. Selecting Features for Intrusion Detection: A Feature Relevance Analysis on KDD 99 Intrusion Detection Datasets. in Proc. 3rd Annual Conference Privacy, Security and Trust, 2005.Google ScholarGoogle Scholar
  3. Staudemeyer C. Applying long short-term memory recurrent neural networks to intrusion detection. South African Computer Journal. 2015, 56(1), pp. 136-154.Google ScholarGoogle Scholar
  4. Haq N F, Onik A R, Shah F M. An ensemble framework of anomaly detection using hybridized feature selection approach (HFSA). 2015 SAI Intelligent Systems Conference (IntelliSys), 2015, pp. 989-995.Google ScholarGoogle ScholarCross RefCross Ref
  5. Gharaee H, Hosseinvand H. A new feature selection IDS based on genetic algorithm and SVM. 2016 8th International Symposium on Telecommunications (IST), 2016, pp. 139-144.Google ScholarGoogle ScholarCross RefCross Ref
  6. Salman T, Bhamare D, Erbad A, et. Machine Learning for Anomaly Detection and Categorization in Multi-Cloud Environments. 2017 IEEE 4th International Conference on Cyber Security and Cloud Computing (CSCloud), 2017, pp. 97-103.Google ScholarGoogle Scholar
  7. Shone N, Ngoc T N, Phai V D, et. A deep learning approach to network intrusion detection. IEEE Transactions on Emerging Topics in Computational Intelligence, 2018, 2(1): 41-50.Google ScholarGoogle ScholarCross RefCross Ref
  8. Muda Z, Yassin W, Sulaiman MN, Intrusion detection based on K-means clustering and Naïve Bayes classification. International Conference on Information Technology in Asia, USA: IEEE, 2011, pp. 1-6.Google ScholarGoogle Scholar
  9. Yassin W, Udzir N, Muda Z, Anomaly-based intrusion detection through K-means clustering and naives bayes classification. Proceedings of the 4th International Conference on Computing and Informatics, Sarawak, Malaysia: University Utara Malaysia, 2013, pp. 298-303.Google ScholarGoogle Scholar
  10. LUO Min,WANG Li-na, ZHANG Huan-guo. An Unsupervised Clustering-Based Intrusion Detection Metho. Acta Electronica Sinica, 2003, 31(11), pp. 1713-1716.Google ScholarGoogle Scholar
  11. Wang Huaibin, Yang Hongliang, Xu Zhijian, A clustering algorithm use SOM and K-means in intrusion detection. Proceedings of the International Conference on E-Business and E-Government, USA: IEEE, 2010, pp. 1281-1284.Google ScholarGoogle Scholar
  12. Zhang Yuqing, Dong Ying, Liu Caiyun. Situation, Trends and Prospects of Deep Learning Applied to Cyberspace Security. Journal of computer research and development, 2018, 55(6), pp. 1117-1142.Google ScholarGoogle Scholar
  13. Roy S, Mallik A, Gulati R, A deep learning based artificial neural network approach for intrusion detection. Mathematics and Computing-3rd International Conference, Berlin: Springer Verlag , 2017, pp. 44-53.Google ScholarGoogle ScholarCross RefCross Ref
  14. Gao Ni, Gao Ling, Gao Quanli, An intrusion detection model based on deep belief networks. Int Conf on Advanced Cloud and Big Data. NJ: IEEE, 2014, pp. 247-252.Google ScholarGoogle ScholarCross RefCross Ref
  15. Staudemeyer C. Applying long short-term memory recurrent neural networks to intrusion detection. South African Computer Journal. 2015, 56(1), pp. 136-154.Google ScholarGoogle Scholar
  16. Maleki, Mina, Rueda, Luis. Classification via correlation-based feature grouping// Computational Intelligence in Bioinformatics & Computational Biology. IEEE, 2015.Google ScholarGoogle Scholar
  17. Kim J, Kim J, Thu H L T, Long Short Term Memory Recurrent Neural Network Classifier for Intrusion Detection. Int Conf on Platform Technology and Service. NJ: IEEE, 2016, pp. 1-5.Google ScholarGoogle Scholar
  18. Abebe Diro, Naveen Chilamkurti. Leveraging LSTM Networks for Attack Detection in Fog-to-Things Communications. IEEE Communications Magazine,2018,pp.124-130Google ScholarGoogle Scholar
  19. Althubiti S A , Jones E M , Roy K . LSTM for Anomaly-Based Network Intrusion Detection. 2018 28th International Telecommunication Networks and Applications Conference (ITNAC). 2018.Google ScholarGoogle Scholar
  20. Sahin C B , Diri B . Robust Feature Selection with LSTM Recurrent Neural Networks for Artificial Immune Recognition System. IEEE Access, 2019:24165-24178.Google ScholarGoogle Scholar
  21. Werbos P J. Back propagation through time: what it does and how to do it. Proceedings of the IEEE, 1990, 78(10), pp. 1550-1560.Google ScholarGoogle ScholarCross RefCross Ref
  22. Bengio Y, Simard P, Frasconi P. Learning long-term dependencies with gradient descent is difficult. IEEE Transactions on Neural Networks, 1994, 5(2), pp. 157-166.Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Hochreiter S, Schmidhuber J. Long short-term memory. Neural Computation, 1997, 9(8), pp. 1735-1780.Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Kim J, Kim J, Thu H L T, Long Short Term Memory Recurrent Neural Network Classifier for Intrusion Detection. Int Conf on Platform Technology and Service. NJ: IEEE, 2016, pp. 1-5.Google ScholarGoogle Scholar
  25. Li Songru. Research on Text Sentiment Analysis of Public Opinion based on Recurrent Neural Network. Huaqiao University, 2017.Google ScholarGoogle Scholar
  26. Kingma D, Ba J. Adam: amethod for stochastic optimization. International Conference for Learning Representations, 2015: 1-15.Google ScholarGoogle Scholar
  27. Hettich S, Bay S D. KDD cup 1999 data. 1999. http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html.Google ScholarGoogle Scholar

Recommendations

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in
  • Published in

    cover image ACM Other conferences
    MLMI '20: Proceedings of the 2020 3rd International Conference on Machine Learning and Machine Intelligence
    September 2020
    138 pages
    ISBN:9781450388344
    DOI:10.1145/3426826

    Copyright © 2020 ACM

    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    • Published: 17 December 2020

    Permissions

    Request permissions about this article.

    Request Permissions

    Check for updates

    Qualifiers

    • research-article
    • Research
    • Refereed limited

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format .

View HTML Format