Two-stage Deep Stacked Autoencoder with Shallow Learning for Network
Intrusion Detection System
- URL: http://arxiv.org/abs/2112.03704v1
- Date: Fri, 3 Dec 2021 07:59:02 GMT
- Title: Two-stage Deep Stacked Autoencoder with Shallow Learning for Network
Intrusion Detection System
- Authors: Nasreen Fathima, Akshara Pramod, Yash Srivastava, Anusha Maria Thomas,
Syed Ibrahim S P, Chandran K R
- Abstract summary: Sparse events, such as malign attacks in real-time network traffic, have caused big organisations an immense hike in revenue loss.
Standard methods used to detect intrusions are not promising and have significant failure to identify new malware.
Our proposed work overcomes these challenges by giving promising results using deep-stacked autoencoders in two stages.
- Score: 0.0
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: Sparse events, such as malign attacks in real-time network traffic, have
caused big organisations an immense hike in revenue loss. This is due to the
excessive growth of the network and its exposure to a plethora of people. The
standard methods used to detect intrusions are not promising and have
significant failure to identify new malware. Moreover, the challenges in
handling high volume data with sparsity, high false positives, fewer detection
rates in minor class, training time and feature engineering of the
dimensionality of data has promoted deep learning to take over the task with
less time and great results. The existing system needs improvement in solving
real-time network traffic issues along with feature engineering. Our proposed
work overcomes these challenges by giving promising results using deep-stacked
autoencoders in two stages. The two-stage deep learning combines with shallow
learning using the random forest for classification in the second stage. This
made the model get well with the latest Canadian Institute for Cybersecurity -
Intrusion Detection System 2017 (CICIDS-2017) dataset. Zero false positives
with admirable detection accuracy were achieved.
Related papers
- A Fresh Take on Stale Embeddings: Improving Dense Retriever Training with Corrector Networks [81.2624272756733]
In dense retrieval, deep encoders provide embeddings for both inputs and targets.
We train a small parametric corrector network that adjusts stale cached target embeddings.
Our approach matches state-of-the-art results even when no target embedding updates are made during training.
arXiv Detail & Related papers (2024-09-03T13:29:13Z) - Adversarial training with informed data selection [53.19381941131439]
Adrial training is the most efficient solution to defend the network against these malicious attacks.
This work proposes a data selection strategy to be applied in the mini-batch training.
The simulation results show that a good compromise can be obtained regarding robustness and standard accuracy.
arXiv Detail & Related papers (2023-01-07T12:09:50Z) - DOC-NAD: A Hybrid Deep One-class Classifier for Network Anomaly
Detection [0.0]
Machine Learning approaches have been used to enhance the detection capabilities of Network Intrusion Detection Systems (NIDSs)
Recent work has achieved near-perfect performance by following binary- and multi-class network anomaly detection tasks.
This paper proposes a Deep One-Class (DOC) classifier for network intrusion detection by only training on benign network data samples.
arXiv Detail & Related papers (2022-12-15T00:08:05Z) - Zero Day Threat Detection Using Metric Learning Autoencoders [3.1965908200266173]
The proliferation of zero-day threats (ZDTs) to companies' networks has been immensely costly.
Deep learning methods are an attractive option for their ability to capture highly-nonlinear behavior patterns.
The models presented here are also trained and evaluated with two more datasets, and continue to show promising results even when generalizing to new network topologies.
arXiv Detail & Related papers (2022-11-01T13:12:20Z) - NetSentry: A Deep Learning Approach to Detecting Incipient Large-scale
Network Attacks [9.194664029847019]
We show how to use Machine Learning for Network Intrusion Detection (NID) in a principled way.
We propose NetSentry, perhaps the first of its kind NIDS that builds on Bi-ALSTM, an original ensemble of sequential neural models.
We demonstrate F1 score gains above 33% over the state-of-the-art, as well as up to 3 times higher rates of detecting attacks such as XSS and web bruteforce.
arXiv Detail & Related papers (2022-02-20T17:41:02Z) - Recursive Least-Squares Estimator-Aided Online Learning for Visual
Tracking [58.14267480293575]
We propose a simple yet effective online learning approach for few-shot online adaptation without requiring offline training.
It allows an in-built memory retention mechanism for the model to remember the knowledge about the object seen before.
We evaluate our approach based on two networks in the online learning families for tracking, i.e., multi-layer perceptrons in RT-MDNet and convolutional neural networks in DiMP.
arXiv Detail & Related papers (2021-12-28T06:51:18Z) - Neural Pruning via Growing Regularization [82.9322109208353]
We extend regularization to tackle two central problems of pruning: pruning schedule and weight importance scoring.
Specifically, we propose an L2 regularization variant with rising penalty factors and show it can bring significant accuracy gains.
The proposed algorithms are easy to implement and scalable to large datasets and networks in both structured and unstructured pruning.
arXiv Detail & Related papers (2020-12-16T20:16:28Z) - Intrusion detection in computer systems by using artificial neural
networks with Deep Learning approaches [0.0]
Intrusion detection into computer networks has become one of the most important issues in cybersecurity.
This paper focuses on the design and implementation of an intrusion detection system based on Deep Learning architectures.
arXiv Detail & Related papers (2020-12-15T19:12:23Z) - DualNet: Locate Then Detect Effective Payload with Deep Attention
Network [3.502112118170715]
We propose a novel neural network based intrusion detection system, DualNet, which is constructed with a general feature extraction stage and a crucial feature learning stage.
Our experiment shows that DualNet outperforms classical ML based NIDSs and is more effective than existing DL methods for NID in terms of accuracy, detection rate and false alarm rate.
arXiv Detail & Related papers (2020-10-23T05:32:21Z) - Cassandra: Detecting Trojaned Networks from Adversarial Perturbations [92.43879594465422]
In many cases, pre-trained models are sourced from vendors who may have disrupted the training pipeline to insert Trojan behaviors into the models.
We propose a method to verify if a pre-trained model is Trojaned or benign.
Our method captures fingerprints of neural networks in the form of adversarial perturbations learned from the network gradients.
arXiv Detail & Related papers (2020-07-28T19:00:40Z) - Binary Neural Networks: A Survey [126.67799882857656]
The binary neural network serves as a promising technique for deploying deep models on resource-limited devices.
The binarization inevitably causes severe information loss, and even worse, its discontinuity brings difficulty to the optimization of the deep network.
We present a survey of these algorithms, mainly categorized into the native solutions directly conducting binarization, and the optimized ones using techniques like minimizing the quantization error, improving the network loss function, and reducing the gradient error.
arXiv Detail & Related papers (2020-03-31T16:47:20Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.