计算机科学 ›› 2019, Vol. 46 ›› Issue (10): 173-179.doi: 10.11896/jsjkx.180801429

• 信息安全 • 上一篇    下一篇

基于深度卷积神经网络的入侵检测研究

丁红卫, 万良, 周康, 龙廷艳, 辛壮   

  1. (贵州大学计算机科学与技术学院 贵阳550025)
    (贵州大学计算机软件与理论研究所 贵阳550025)
  • 收稿日期:2018-08-02 修回日期:2019-01-20 出版日期:2019-10-15 发布日期:2019-10-21
  • 通讯作者: 万良(1974-),男,博士,教授,主要研究方向为信息安全、计算机软件与理论,E-mail:wanliangtr@163.com。
  • 作者简介:丁红卫(1992-),男,硕士生,CCF会员,主要研究方向为信息安全和机器学习,E-mail:1760901417@qq.com;周康(1993-),男,硕士,主要研究方向为信息安全和深度学习;龙廷艳(1993-),女,硕士,主要研究方向为信息安全;辛壮(1994-),男,硕士,主要研究方向为信息安全和机器学习。
  • 基金资助:
    本文受贵州省科学基金黔科合J字(2328),贵州省科学基金黔科合LH字(7634)资助。

Study on Intrusion Detection Based on Deep Convolution Neural Network

DING Hong-wei, WAN Liang, ZHOU Kang, LONG Ting-yan, XIN Zhuang   

  1. (College of Computer Science and Technology,Guizhou University,Guiyang 550025,China)
    (Institute of Computer Software and Theory,Guizhou University,Guiyang 550025,China)
  • Received:2018-08-02 Revised:2019-01-20 Online:2019-10-15 Published:2019-10-21

摘要: 当今网络数据呈现出更为庞大、复杂和多维的特性。传统的基于机器学习的方法在面临高维数据特征时需要手动提取大量特征,特征提取过程复杂且计算量大,达不到入侵检测的准确性和实时性的要求。深度学习在处理复杂数据方面具有较好的优势,可以自动从数据中提取更好的表示特征。为此,文中创新性地提出了一种基于深度卷积神经网络的入侵检测方法。首先,提出了一种将网络数据转换为图像的方法;然后,针对转换之后的图像设计了一个深度卷积神经网络模型,该模型使用两层的卷积层和池化层对图像进行降维处理,并引入了Relu函数作为新的非线性激活来代替传统的神经网络中常用的Sigmoid或Tanh函数,以加快网络的收敛速度,且该模型引入了Dropout方法来防止网络模型发生过度拟合的现象;最后,通过构建完成的深度卷积神经网络模型对转换之后的图像进行训练和识别。实验结果表明,与已有方法相比,所提方法具有更好的检测准确率、更低的误报率和更快的检测速率。

关键词: 过度拟合, 卷积神经网络, 入侵检测, 深度学习, 特征提取

Abstract: Compared with the previous network data,network data shows more huge,complex and multidimensional characteristics nowadays.In face of the high dimensional data features, traditional machine learning methods need to extract a large number of features manually.Besides,feature extraction process is complex and computational,which is not conducive to the current network intrusion detection real-time and accuracy requirements.Deep learning methods have good advantages in dealing with complex data,which can automatically extract better representation features from the data.In this paper,an intrusion detection method based on deep convolution neural network was proposed.Firstly,a method of transforming network data into images was proposed.Then a deep convolution neural network model was designed for the transformed image,which uses the two-layer convolution layer and the pool layer to reduce the dimension of the image,and introduced the Relu function as a new nonlinear activation in place of the traditional neural network.The sigmoid or Tanh function was used to speed up the convergence of the network,and the Dropout method was introduced in the model to prevent the network model from over-fitting.Finally,the image was trained and identified by constructing the completed depth convolution neural network model.The experimental results show that the proposed method has better detection accuracy,lower false alarm rate and higher detection rate compared with the existing me-thods.

Key words: Convolution neural network, Deep learning, Feature extraction, Intrusion detection, Over-fitting

中图分类号: 

  • TP393
[1]ASHFAQ R A R,WANG X Z,HUANG Z X,et al.Fuzziness based semi-supervised learning approach forintrusion detection system[J].Information Sciences,2017,378(C):484-497.
[2]QING S H,JIANG J C,MA H T,et al.Research on intrusion detection technique:a survey[J].Journal on Communications,2004,25(7):19-29.(in Chinese)
卿斯汉,蒋建春,马恒太,等.入侵检测技术研究综述[J].通信学报,2004,25(7):19-29.
[3]ROY S S,MITTAL D,BASU A,et al.Stock market forecasting using LASSO linear regression model[C]//Afro-European Conference for Industrial Advancement.Cham:Springer,2015:371-381.
[4]BASU A,ROY S S,ABRAHAM A.A Novel Diagnostic Approach Based on SupportVector Machine with Linear Kernel for Classifying the Erythemato-Squamous Disease[C]//InternationalConference on Computing Communication Controland Automation.New York:IEEE Press,2015:343-347.
[5]ROY S S,VISWANATHAM V M.Classifying Spam Emails Using Artificial Intelligent Techniques[J].International Journal of Engineering Research in Africa,2016,22:152-161.
[6]TAN B,TAN Y,LI Y.Research on Intrusion Detection System Based on Improved PSO-SVM Algorithm[J].Chemical Engineering Transaction,2016,51:583-588.
[7]MITTAL D,GAURAV D,ROY S S.An effective hybridized-classifier for breast cancer diagnosis[C]//IEEE International Conference on Advanced Intelligent Mechatronics.New York:IEEE Press,2015:1026-1031.
[8]HINTON G E,SALAKHUTDINOV R R.Reducing the Dimen-sionality of Data with Neural Networks[J].Science,2006,313(5786):504-507.
[9]ROY S S,MALLIK A,GULATI R,et al.A deep learning based artificial neural network approach for intrusion detection[C]//International Conference on Mathematics and Computing.Singapore:Springer,2017:44-53.
[10]YIN C,ZHU Y,FEI J,et al.A Deep Learning Approach for Intrusion Detection Using Recurrent Neural Networks[J].IEEE Access,2017,5(99):21954-21961.
[11]ALOM M Z,BONTUPALLI V R,TAHA T M.Intrusion detection using deep belief networks[C]//Aerospace and Electronics Conference.New York:IEEE Press,2016:339-344.
[12]JAVAID A,NIYAZ Q,SUN W,et al.A Deep Learning Ap-proach for Network Intrusion Detection System[C]//Eai International Conference on Bio-Inspired Information and Communications Technologies.Pittsburgh:ICST,2016:21-26.
[13]POTLURI S,DIEDRICH C.Accelerated deep neural networks for enhanced Intrusion Detection System[C]//IEEE,International Conference on Emerging Technologies and Factory Automation.New York:IEEE Press,2016.
[14]YU Y,LONG J,CAI Z.Session-Based Network IntrusionDetection Using a Deep Learning Architecture[M]//Modeling Decisions for Artificial Intelligence.Berlin:Springer Netherlands,2017:144-155.
[15]KWON D,KIM H,KIM J,et al.A survey of deep learning-based network anomaly detection[J].Cluster Computing,2017(5):1-13.
[16]WANG M,LI J.Network Intrusion Detection Model Based on Convolutional Neural Network[J].Journal of Information Security Research,2017,3(11):990-994.(in Chinese)
王明,李剑.基于卷积神经网络的网络入侵检测系统[J].信息安全研究,2017,3(11):990-994.
[17]TAVALLAEE M,BAGHERI E,LU W,et al.A detailed analysis of the KDD CUP 99 data set[C]//IEEE International Conference on Computational Intelligence for Security & Defense Applications.New York:IEEE,2009:1-6.
[18]SZARVAS M,YOSHIZAWA A,YAMAMOTO M,et al.Pedestrian detection with convolutional neural networks[C]//Intelligent Vehicles Symposium.New York:IEEE Press,2005:224-229.
[19]KRIZHEVSKY A,SUTSKEVER I,HINTON G E.ImageNet classification with deep convolutional neural networks[C]//International Conference on Neural Information Processing Systems.New York:IEEE Press,2012:1097-1105.
[20]ZHANG Y L,ZHANG Z Q,WU H T,et al.Perimeter intrusion detection method based on improved convolution neural network[J].Computer Science,2017,44(3):182-186.(in Chinese)
张永良,张智勤,吴鸿韬,等.基于改进卷积神经网络的周界入侵检测方法[J].计算机科学,2017,44(3):182-186.
[21]CHEN L,QU H,ZHAO J,et al.Efficient and robust deep lear-ning with Correntropy-induced loss function[J].Neural Com-puting & Applications,2016,27(4):1019-1031.
[22]SADEK R A,SOLIMAN M S,ELSAYED H S.Effective Anoma-ly Intrusion Detection System based on Neural Network with Indicator Variable and Rough set Reduction[J].International Journal of Computer Science Issues,2013,10(6):227-233.
[23]KUANG F,XU W,ZHANG S.A novel hybrid KPCA and SVM with GA model for intrusion detection[J].Applied Soft Computing Journal,2014,18(C):178-184.
[24]YIN C,ZHU Y,FEI J,et al.A Deep Learning Approach for Intrusion Detection Using Recurrent Neural Networks[J].IEEE Access,2017,5(99):21954-21961.
[25]GAO N,GAO L,HE Y Y.Deep belief nets model oriented to intrusion detection system[J].Systems Engineering and Electro-nices,2016,38(9):2201-2207.(in Chinese)
高妮,高岭,贺毅岳.面向入侵检测系统的Deep Belief Nets模型[J].系统工程与电子技术,2016,38(9):2201-2207.
[1] 饶志双, 贾真, 张凡, 李天瑞.
基于Key-Value关联记忆网络的知识图谱问答方法
Key-Value Relational Memory Networks for Question Answering over Knowledge Graph
计算机科学, 2022, 49(9): 202-207. https://doi.org/10.11896/jsjkx.220300277
[2] 汤凌韬, 王迪, 张鲁飞, 刘盛云.
基于安全多方计算和差分隐私的联邦学习方案
Federated Learning Scheme Based on Secure Multi-party Computation and Differential Privacy
计算机科学, 2022, 49(9): 297-305. https://doi.org/10.11896/jsjkx.210800108
[3] 周乐员, 张剑华, 袁甜甜, 陈胜勇.
多层注意力机制融合的序列到序列中国连续手语识别和翻译
Sequence-to-Sequence Chinese Continuous Sign Language Recognition and Translation with Multi- layer Attention Mechanism Fusion
计算机科学, 2022, 49(9): 155-161. https://doi.org/10.11896/jsjkx.210800026
[4] 徐涌鑫, 赵俊峰, 王亚沙, 谢冰, 杨恺.
时序知识图谱表示学习
Temporal Knowledge Graph Representation Learning
计算机科学, 2022, 49(9): 162-171. https://doi.org/10.11896/jsjkx.220500204
[5] 李宗民, 张玉鹏, 刘玉杰, 李华.
基于可变形图卷积的点云表征学习
Deformable Graph Convolutional Networks Based Point Cloud Representation Learning
计算机科学, 2022, 49(8): 273-278. https://doi.org/10.11896/jsjkx.210900023
[6] 王剑, 彭雨琦, 赵宇斐, 杨健.
基于深度学习的社交网络舆情信息抽取方法综述
Survey of Social Network Public Opinion Information Extraction Based on Deep Learning
计算机科学, 2022, 49(8): 279-293. https://doi.org/10.11896/jsjkx.220300099
[7] 王馨彤, 王璇, 孙知信.
基于多尺度记忆残差网络的网络流量异常检测模型
Network Traffic Anomaly Detection Method Based on Multi-scale Memory Residual Network
计算机科学, 2022, 49(8): 314-322. https://doi.org/10.11896/jsjkx.220200011
[8] 郝志荣, 陈龙, 黄嘉成.
面向文本分类的类别区分式通用对抗攻击方法
Class Discriminative Universal Adversarial Attack for Text Classification
计算机科学, 2022, 49(8): 323-329. https://doi.org/10.11896/jsjkx.220200077
[9] 姜梦函, 李邵梅, 郑洪浩, 张建朋.
基于改进位置编码的谣言检测模型
Rumor Detection Model Based on Improved Position Embedding
计算机科学, 2022, 49(8): 330-335. https://doi.org/10.11896/jsjkx.210600046
[10] 陈泳全, 姜瑛.
基于卷积神经网络的APP用户行为分析方法
Analysis Method of APP User Behavior Based on Convolutional Neural Network
计算机科学, 2022, 49(8): 78-85. https://doi.org/10.11896/jsjkx.210700121
[11] 朱承璋, 黄嘉儿, 肖亚龙, 王晗, 邹北骥.
基于注意力机制的医学影像深度哈希检索算法
Deep Hash Retrieval Algorithm for Medical Images Based on Attention Mechanism
计算机科学, 2022, 49(8): 113-119. https://doi.org/10.11896/jsjkx.210700153
[12] 孙奇, 吉根林, 张杰.
基于非局部注意力生成对抗网络的视频异常事件检测方法
Non-local Attention Based Generative Adversarial Network for Video Abnormal Event Detection
计算机科学, 2022, 49(8): 172-177. https://doi.org/10.11896/jsjkx.210600061
[13] 檀莹莹, 王俊丽, 张超波.
基于图卷积神经网络的文本分类方法研究综述
Review of Text Classification Methods Based on Graph Convolutional Network
计算机科学, 2022, 49(8): 205-216. https://doi.org/10.11896/jsjkx.210800064
[14] 侯钰涛, 阿布都克力木·阿布力孜, 哈里旦木·阿布都克里木.
中文预训练模型研究进展
Advances in Chinese Pre-training Models
计算机科学, 2022, 49(7): 148-163. https://doi.org/10.11896/jsjkx.211200018
[15] 周慧, 施皓晨, 屠要峰, 黄圣君.
基于主动采样的深度鲁棒神经网络学习
Robust Deep Neural Network Learning Based on Active Sampling
计算机科学, 2022, 49(7): 164-169. https://doi.org/10.11896/jsjkx.210600044
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!