International Journal of Recent Technology and Engineering (IJRTE)
ISSN: 2277-3878, Volume-9 Issue-3, September 2020
Network Intrusion Detection using a Deep
Learning Approach
V. V. Mandhare, D. R Pede, P. S. Vikhe
by IDSs. However, performance of the task is not possible
using traditional firewall. The detection of Intrusion is on the
assumption of intruder‟s behavior and is different from a legal
user [3]. In general, IDSs can diverge into two categories: 1)
anomaly 2) signature detection, which are hinged on their
detection methods [4]. In Anomaly detection, system
classifies unknown behavior in traffic network studying
normal behavior structures in traffic network. The Network
traffic which is different in pattern from normal traffic is
classified as an intrusion. In Signature detection, signatures
attack is pre-installed in the IDS. The matching of pattern is
carried out for traffic versus installed signatures to identify an
intrusion which is present in network [5]. The current
situation has reached to a conclusion that such approaches
leads in false detection. In current years, the main focus within
IDS research have been the appliance of machine learning
methods like Decision Trees, Naive Bayes, Random
Forest(RF) and Support Vector Machines (SVM) and many
more [6]. The accuracy of detection have improved using
these approaches. However, these approaches have some
limitations, like expert knowledge is required to operate data;
Interaction of high level of human expert is needed. Similarly,
huge amount of data training is required for operation [7]. To
locate the mentioned drawbacks, area of research recently
switched towards deep learning. Deep learning is improved
learning approach where multiple information-processing
layers in hierarchical architectures which are utilized for
classifying patterns and for feature or representation learning
[8]. Today, deep learning has become a very important and
successful research trend in the ML community because of its
great success in these fields [9]. The deep learning method has
been utilized in this paper to activate NIDS operation within
modern networks.
Abstract: At present situation network communication is at
high risk for external and internal attacks due to large number of
applications in various fields. The network traffic can be
monitored to determine abnormality for software or hardware
security mechanism in the network using Intrusion Detection
System (IDS). As attackers always change their techniques of
attack and find alternative attack methods, IDS must also evolve
in response by adopting more sophisticated methods of detection
.The huge growth in the data and the significant advances in
computer hardware technologies resulted in the new studies
existence in the deep learning field, including ID. Deep Learning
(DL) is a subgroup of Machine Learning (ML) which is hinged on
data description. The new model based on deep learning is
presented in this research work to activate operation of IDS from
modern networks. Model depicts combination of deep learning
and machine learning, having capacity of wide range accurate
analysis of traffic network. The new approach proposes
non-symmetric deep auto encoder (NDAE) for learning the
features in unsupervised manner. Furthermore, classification
model is constructed using stacked NDAEs for classification. The
performance is evaluated using a network intrusion detection
analysis dataset, particularly the WSN Trace dataset. The
contribution work is to implement advanced deep learning
algorithm consists IDS use, which are efficient in taking instant
measures in order to stop or minimize the malicious actions.
Key Words: Intrusion Detection System (IDS), Non- Symmetric
Deep Auto-Encoder (NDAE), Deep Learning (DL), WSN Trace,
Machine Learning (ML).
I.
INTRODUCTION
Internets have a part in our daily life and is required weapon
today. Internet has risen to multiple vices along with its
boons, this lead in increased number of attacks. The
organizations and individuals may be affected due to attacks.
Therefore, the security of computer and network systems has
been in the focal point of research for a long time. All
organizations working in the field of information technology
have been agreed that the subject of information protection is
a very critical and important issue that cannot be ignored. It is
necessary to achieve the three basic principles that any
security system rests on its (confidentiality, integrity, and
availability) [1] [2]. IDS identify interloper‟s activities that
warn the integrity, availability, and confidentiality of
resources. The distinct types of malicious network
communications and computer systems usage can be detected
A. Motivation
A novel NDAE method based on unsupervised learning
feature, this is like auto-encoder technique gives
non-symmetric dimensionality reduced data. This leads
in better classification compare to Deep Belief Networks
(DBNs) approach results.
A new model classifier uses algorithms like stacked
NDAEs and RF for classification. The combination of
deep and machine learning methods allow to achieve
their strengths and minimize analytical overheads.
Revised Manuscript Received on August 10, 2020.
* Correspondence Author
V. V. Mandhare*, Associate Professor, Department of Computer
Engineering, Pravara Rural Engineering College, Loni, Rahata,
Ahmednagar, India.
D. R. Pede, Department of Computer Engineering, Pravara Rural
Engineering College, Loni, Rahata, Ahmednagar, India.
P. S. Vikhe, Associate Professor, Department of Instrumentation and
Control Engineering, Pravara Rural Engineering College, Loni, Rahata,
Ahmednagar, India.
Retrieval Number: 100.1/ijrte.B4086079220
DOI:10.35940/ijrte.B4086.099320
59
Published By:
Blue Eyes Intelligence Engineering
and Sciences Publication
Network Intrusion Detection using a Deep Learning Approach
II.
simulation test is organized utilizing DARPA 98 data-set.
Hybrid MLP/CNN neural network have taken result from
MLP as a chaotic neuron input. In a way chaotic neurons
number have to be identical to number of output nodes. The
result of distribution of input is tested using MLP, may be
delivered and received by CNN coupled to output node of
MLP. Since, hybrid NN have flexible time-delay criterion and
capability; it can accomplish high rates of intrusion detection
and low rate of false alarms. This method have high
scalability and ability, to verify new patterns of attacks
detection of BSM strings. K. Wu et al. [22] put forward NIDS
method using CNNs. CNN automatically selects traffic
features from raw dataset and apply cost function weight
coefficient of particular class hinged on numbers, to deal with
imbalanced dataset issue. The method not only minimize
FAR, but also enhances accuracy of class with less numbers.
To decrease computation cost raw traffic vector is converted
to image format. In this utilizing original KDDCup-99
data-set to evaluate efficiency of suggested CNN model.
Experimental results shows precision, FAR and
computational cost of presented model have better
performance compared to conventional standard algorithms.
More improvements of detection accuracy of this work are
possible, modifying CNN model structure for sake of
achieving goal. In addition, detection time is also crucial to
identify intrusion, it is essential to assure method is capable of
meeting time requirements of IDS, enhancing accuracy of
detection. J. Kim et al. [23] suggested DNN method for attack
detection. The popular KDDCup 1999 data-set have been
used for testing and training, to detect the intrusion. The
testing data is generated via data pre-processing and
extraction of samples, to meet aim of study. A DNN method,
comprise of four hidden layers and hundred hidden units are
used by suggested IDS of presented study as classification
algorithm and ReLU function is used as activation function
of hidden layers. In addition, they used adaptive moment
(Adam) optimizer, a stochastic method of optimization for
DNN learning. The results shows considerably high precision
and detection rate of 99% and FAR 0.08% approximately.
T. A. Tang et al. [24] suggested deep learning technique for
flow-based anomaly detection in an SDN environment. DNN
method was constructed for IDS and trained using NSLKDD
dataset. From experimentation, it has been discovered an
optimal hyper-parameter for DNN and confirmed detection
rates and false alarms. The method achieved efficiency with a
precision of 75.75% approximately.
REVIEW OF LITERATURE
F. Farahnakian et al. [11] presented Deep Auto Encoder
(DAE) model to train greedy layer-wise fashion, to avoid over
fitting and local optima. In [11] Deep Auto Encoder hinged
IDS (DAE-IDS) is suggested made up of four auto encoders,
results AE at existing layer is used as AE input in following
layer. Moreover, an AE at existing layer is trained prior the
AE at following layer. After the 4 auto-encoders are trained,
they have utilized a SoftMax layer for classifying the network
traffic into normal data and attacks. They have utilized the
KDDCUP 1999 data-set for evaluating the efficiency of
DAE-IDS because this data-set has been used largely for the
evaluation of the IDSs. The suggested method has reached a
detection precision equal to 94.71% on a total of 10%
KDD-CUP 1999 testing data-set. Ni GAO et al. [12] proposed
a methodology which is hinged on multilayer DBN technique
for identification of DoS attacks. DBN consists of large
RBMs. The training of RBM is carried in process of advance
learning. For learning RBM of next layer, trained features of
current RBM are provided as input. The performance of DBN
technique is tested using KDD CUP 1999 dataset. Detection
precision of DBN method is better than ANN and SVM
approach. S. Seo et al. [13] put forward comparison of
intrusion detection rates of NIDS that utilize classification
method and NIDS with trained data, noise and exception are
eliminated using RBM. Noise and exception in KDD Cup „99
Data set are eliminated by assigning data to RBM and
building new data. K. Alrawashdeh et al. [14, 15] suggested
an approach of deep learning, to detect anomalies using
RBM and deep belief network. One-hidden layer RBM is
used for performance of unsupervised feature reduction.
Resulting weights are passed from one RBM to other RBM
which produces DBN. Pre-trained weights are proceeded to
Logistic Regression (LR) classifier to classify the inputs into
normal data and attacks. This model has performed better
compare to previous methods of deep learning, performed by
Li and Salama [14, 15] in terms of accuracy and speed
detection. The detection rate achieved is 97.9% on total 10%
KDD-CUP 1999 testing data-set. [16]. J. Kim et al. [17]
developed the model for IDS using deep learning method.
In [17] Long Short Term Memory (LSTM) framework was
applied to an RNN and have trained IDS utilizing
KDDCup-99 data-set. For training stage, data-set have been
produced using extracted samples from KDDCup-99 data-set
by analyzing them with another IDS classifiers; discovered
attacks are efficiently detected via LSTM-RNN classifier.
Since, it have better accuracy and detection rate, although rate
of false alarms is little higher than others. The deep learning is
sufficient for IDS based on performance tests. Y. Chuan-Long
et al. [18, 19] design and implemented detection system
hinged on recurrent NNs. Moreover, they have studied
efficiency of model in binary and multi-class classifications.
Furthermore, efficiency of multi-layer perception, Naives
Bayes, SVMs and other methods of machine learning in
multi-class classification on the benchmark KDD-Cup 1999
dataset were investigated. Y. Yu et al [20] suggested intrusion
detection methodology which is hinged on Hybrid
MLP/CNN. A hybrid MLP/CNN neural network is generated,
to enhance the rate of detection in time-delayed attacks. A
Retrieval Number: 100.1/ijrte.B4086079220
DOI:10.35940/ijrte.B4086.099320
III.
SYSTEM OVERVIEW
N. Shone et al. [10] presented new deep learning framework
to allow NIDS operation in modern networks. This model is
combination of deep and machine learning, able to perfectly
inspect vast quantity of network traffic. Especially, combine
the ability of stacked suggested Non-symmetric Deep
Auto-Encoder (NDAE), which is the deep learning approach
and the speed and accuracy of Random Forest (RF), which is
machine learning method.
60
Published By:
Blue Eyes Intelligence Engineering
and Sciences Publication
International Journal of Recent Technology and Engineering (IJRTE)
ISSN: 2277-3878, Volume-9 Issue-3, September 2020
In this stage numeric normalized values of dataset are
converted into its optimal form.
2. Feature Selection: Auto encoder is an unsupervised neural
network-based feature extraction algorithm, applies back
propagation in setting target value to be equal to input. The
objective of auto encoder is to minimize reconstruction error
between input and output. The proposed NDAE, is an auto
encoder presenting asymmetric diverse hidden layers. The
reason is, to decrease time and computational expenses with
less effect on performance and accuracy. Stacking NDAEs
provide layer-wise unsupervised feature learning, which
allows proposed framework to study complicated
relationships among distinct features.
3. Random Forest Classifier: Classification power of stacked
auto encoder is poor in contrast to other discriminative
frameworks like random forest, support vector machine,
KNN, and many more. In this framework, RF classifier is
trained utilizing encoded representations studied by stacked
NDAEs, to distinguish network traffic into normal network
data and attacks.
This research work deals with NDAE, is an auto-encoder
presenting asymmetric diverse hidden layers. NDAE may use
as hierarchical unsupervised feature extractor scales properly,
to deal with excessive-dimensional inputs. It study‟s
significant features by applying similar training method as
compared to regular auto-encoder. Stacking NDAEs provide
a layer-wise unsupervised feature learning, which allow
suggested framework to study complicated relationships
among distinct features.
Fig. 1 depicts suggested system architecture of Network
Intrusion Detection. WSN trace dataset with 12 features are
provided as input data to this framework. Training dataset
contains data preprocessing which involve three steps: Data
preprocessing, data normalization and transformation. This
framework uses two NDAEs arranged in a stack, used, to
select number of features. Then apply Random Forest
Classifier for attack detection [25].
To prevent or reduce malicious behavior Intrusion Detection
System (IDS) contains IDS functionality capable of taking
immediate action. The IDS is implemented using Rule Status
Monitoring Algorithm [26]. There are 8 rule actions for attack
detected, system will take action using following list:
ALERT - Generate alert using selected ALERT
approach, and log packet.
LOG - Log packet.
PASS - Neglect packet.
ACTIVATE - Alert and then set on other dynamic
rule.
DYNAMIC – Inactive till operated by an activate
rule, then after appear as a log rule.
DROP - Block and log packet
REJECT - Block packet, log it, and if protocol is
TCP then send TCP reset or if protocol is UDP then
send an ICMP port unreachable message.
SDROP – Do not log the packet but only Block the
packet.
Fig. 1 Schematic representation of proposed system
architecture
B. Mathematical Model
1. Preprocessing:
A. Architecture
The proposed system consists three steps as below.
1. Data Pre-processing: In this phase preprocessing,
normalization and transformation is carried.
a) Preprocessing
Training and testing of neural network is carried out using
only numeric values for classification. WSN trace dataset
consist different data types. Hence, preprocessing stage is
required to transform non-numeric values present in dataset to
numeric values.
Two important work performed in pre-processing stage are:
1. Transforming non-numeric values of features, present in
dataset to numeric values.
2. Convert attack types into its numeric categories.
b) Normalization
The features of WSN trace dataset have discrete or
continuous values. The ranges value of feature is different and
this makes them incomparable. Min-max normalization
function is manipulated to plot all diverse values for each
feature to [0, 1] range. Thus, In order to bring numeric values
present in dataset in same range, normalization procedure is
done.
c) Transformation
Retrieval Number: 100.1/ijrte.B4086079220
DOI:10.35940/ijrte.B4086.099320
At this stage, data training source (F) is normalized, to
implement processing by applying following steps:
(1)
Where,
F has i samples with j column attributes; xmn is the nth column
attribute in mth sample, T and T are 1*j matrix which are
the training data mean and standard deviation respectively for
each of the j attributes. Test dataset (FS) which is used to
determine detection accuracy is normalized by applying the
same F and F as follows:
61
Published By:
Blue Eyes Intelligence Engineering
and Sciences Publication
Network Intrusion Detection using a Deep Learning Approach
Train DBN in unsupervised manner follows greedy
layer-wise procedure; each added layer is trained as an RBM
(e.g., Contrastive Divergence).
is the input training distribution for the network.
is a learning rate for the RBM training.
is the number of layers to train.
is the weight matrix for level f, for f from 1 to q
is the visible units offset vector for RBM at level f, for f
from 1 to q
is the hidden units offset vector for RBM at level f, for f
from 1 to q
Mean_field_computation is a Boolean that is true iff training
data at each additional level is obtained by a mean-field
approximation instead of stochastic sampling
--------------------------------------------------------------------------Step 1: for f = 1 to q do
Step 2: initialize
Step 3: while not stopping criterion do
Step 4: sample
from
Step 5: for j=1 to f −1 do
Step 6: if mean_field_computation then
for all elements i of
)
Step 7: assign
Step 8: else
Step9: assign
to
for all elements i of
)
Step 10: end if
Step 11: end for
Step 12: RBMupdate (
{Thus providing
for future use}
Step 13: end while
Step 14: end for
----------------------------------------------------------------
(2)
2. Feature Selection:
NDAE is an auto-encoder presenting asymmetric diverse
hidden layers. Suggested NDAE accepts input vector
and step-by-step plot it to latent representations
(Here a represents dimension of vector) applying a
deterministic function shown below in Eq. 3:
(3)
is an activation function (sigmoid function
Here,
and m is number of hidden layers.
In contrast to traditional auto-encoder and deep auto-encoder,
suggested NDAE does not contain a decoder, output vector is
estimated by applying similar formula as Eq. 4 as the latent
representation.
(4)
The estimator of model
is produced by
minimizing square reconstruction error over n training
, as given in Eq. 5.
samples
(5)
C. Algorithms
1. Restricted Boltzmann Machine Algorithm
l1 is a sample from the training distribution for the RBM.
is a learning rate for the stochastic gradient descent in
Contrastive Divergence.
𝑊 is the RBM weight matrix, of dimension (number of hidden
units, number of inputs).
d is the RBM offset vector for input units.
r is the RBM offset vector for hidden units.
is the vector with elements
Notation:
Step 1: for all hidden units j do
Step2:
compute
units,
(for
3. Random Forest Classifier
1. Assume number of variables in classifier be L and number
of training cases be K.
2. The number of input variables be n, which regulate
judgment of node of tree; n should be lesser than L.
3. Training set for this tree are chosen m times with
substitution from all K available training cases. Apply rest of
cases, to compute falsehood of tree, determine their classes.
4. For each node of tree, randomly choose n variables, on
which judgment of that node is hinged. Estimate best split
hinged on these n variables in training set.
5. Each tree is fully grown and not pruned (as may be done in
building a normal tree classifier).
For prevision a new sample is pushed down tree. It is assigned
label of training sample in terminal node it ends up in. This
process is repeated for all trees in concert, and average poll of
all trees is noted as random forest prevision.
binomial
)
from
Step 3: sample
Step 4: end for
Step 5: for all visible units i do
Step 6: compute
units,
)
from
Step 7: sample
Step 8: end for
Step 9: for all hidden units i do
Step 10: compute
(for
binomial
IV.
(for binomial units,
The evaluation were performed using windows 7 operating
system, Intel i5 processor, 4 GB RAM, 200GB Hard disk,
Eclipse Luna JDK 8 tool and Tomcat server. To perform
evaluations WSN-trace dataset is used. WSN-trace is wireless
dataset for researchers. WSN trace dataset contains total 19
attributes given below:
)
Step 11: end for
Step12:
Step 13:
Step 14:
RESULT AND DISCUSSIONS
)
2. Deep Belief Network Algorithm
Retrieval Number: 100.1/ijrte.B4086079220
DOI:10.35940/ijrte.B4086.099320
62
Published By:
Blue Eyes Intelligence Engineering
and Sciences Publication
International Journal of Recent Technology and Engineering (IJRTE)
ISSN: 2277-3878, Volume-9 Issue-3, September 2020
To find best performance different dataset are used to
evaluate, which dataset could have best accuracy. Accuracy is
chosen as essential interpretation standard. The results can be
notice in Fig. 3, shows accuracy for different dataset on
different network traffic. The fact have been determine from
WSN trace dataset nearly have same accuracy, classifying
normal traffic as well as detecting DoS attack and probing
attack. The WSN trace dataset have better accuracy,
classifying R2L attack and U2R attack as compared to NSL
-KDD dataset.
Table I WSN Trace Dataset Attributes
Total Attributes
id
SCH_R
time
Rank
Is_CH
DATA_S
who CH
DATA_R
Dist_To_CH
Data_Sent_To_BS
ADV_S
dist_CH_To_BS
ADV_R
send_code
JOIN_S
Consumed Energy
JOIN_R
Class
SCH_S
WSN trace dataset is real-time wireless dataset gets
information from router contains node details and packet
information. The network traffic includes normal and
different types of attacks like DoS, Probing, user-to-root
(U2R), remote-to-local (R2L).
Throughout this work metrics defined below are used:
1) True Positive (TP) - Attack precisely distinguished as
attack.
2) False Positive (FP) - Normal network data wrongly
distinguished as attack.
3) True Negative (TN) - Normal network data precisely
distinguished as normal data.
4) False Negative (FN) - Attack wrongly distinguished as
normal data.
The following measures are used to evaluate performance of
suggested solution:
Accuracy = TP + TN / TP + TN+ FP+ FN
The accuracy measures, fraction of total number of precise
division.
Precision = TP / TP + FP
The precision measures, number of precise division condemn
by number of wrong division.
Recall = TP / TP + FN
Recall measures, number of precise division condemn by
number of missed entries.
F-measure = 2.Precision Recall / Precision + Recall
F-measure, measures harmonic mean of precision and recall,
serves as derived effectiveness measurement.
Fig. 3 Accuracy of different dataset used to recognize
normal traffic and attacks.
V.
CONCLUSION
The obtained result depicts given approach which is
combination of stacked NDAE (deep learning) and RF
classifier (machine learning) using WSN trace dataset
provides high levels accuracy of 94.55 %, precision of
52.05% and recall of 91.66% along with moderate training
time. The suggested NIDS system has enhance 4% accuracy.
Since, still there is scope for more accuracy enhancement. In
future scope, the work will be extended to design a real-time
NIDS for real networks by manipulating deep advanced
approach. Moreover, on-the-go feature learning on raw
network trace headers rather than derived features utilizing
raw headers can be immense effect research in this area.
REFERENCES
1.
Performance of proposed system is combination of stacked
NDAE (deep learning) and RF classifier (machine learning)
using WSN trace dataset given in table below.
Proposed System
Precision
52.09 %
Recall
91.66 %
F-Measure
64 %
Accuracy
94.55 %
2.
3.
4.
5.
6.
7.
R. Bace and P. Mell, “NIST special publication on intrusion detection
systems,” BOOZ-ALLEN AND HAMILTON INC MCLEAN VA,
2001.
A. Lazarevic, V. Kumar, and J. Srivastava, “Intrusion detection: A
survey,” in Managing Cyber Threats, Springer, 2005, pp. 19–78.
W. Stallings, “Cryptography and network security principles and
practices,” USA: Prentice Hall, 2006.
M. H. Aghdam and P. Kabiri, “Feature Selection for Intrusion
Detection System Using Ant Colony Optimization,” IJ Netw. Secur,
vol. 18, no. 3, pp. 420–432, 2016.
C.-F. Tsai, Y.-F. Hsu, C.-Y. Lin, and W.-Y. Lin, “Intrusion detection
by machine learning: A review,” Expert Syst. Appl., vol. 36, no. 10, pp.
11994–12000, 2009.
B. Dong and X. Wang, “Comparison deep learning method to
traditional methods using for network intrusion detection,” in Proc. 8th
IEEE Int. Conf. Commun. Softw. Netw. Beijing, China, Jun. 2016, pp.
581–585.
R. Zhao, R. Yan, Z. Chen, K. Mao, P. Wang, and R. X. Gao, “Deep
learning and its applications to machine health monitoring: A survey,”
Submitted to IEEE Trans. Neural Netw. Learn. Syst., 2016. [Online].
Available: http://arxiv.org/abs/1612.07640.
Fig. 2 Performance graph of stacked NDAEs + RF
classifier using WSN Trace dataset
Retrieval Number: 100.1/ijrte.B4086079220
DOI:10.35940/ijrte.B4086.099320
63
Published By:
Blue Eyes Intelligence Engineering
and Sciences Publication
Network Intrusion Detection using a Deep Learning Approach
8.
9.
10.
11.
12.
13.
14.
15.
16.
17.
18.
19.
20.
21.
22.
23.
24.
25.
26.
S. Pouyanfar et al., “A Survey on Deep Learning: Algorithms,
Techniques, and Applications,” ACM Comput. Surv. vol. 51, no. 5, p.
92, 2018.
Y. LeCun, Y. Bengio, and G. Hinton, “Deep learning. nature 521
(7553): 436,” Google Sch., 2015.
N. Shone, T. N. Ngoc, V. D. Phai and Q. Shi, "A Deep Learning
Approach to Network Intrusion Detection," in IEEE Transactions on
Emerging Topics in Computational Intelligence, vol. 2, no. 1, pp.
41-50, Feb. 2018.
F. Farahnakian and J. Heikkonen, “A deep auto-encoder based
approach for intrusion detection system,” in Advanced
Communication Technology (ICACT), 2018 20th International
Conference on, 2018, pp. 178–183.
N. Gao, L. Gao, Q. Gao, and H. Wang, “An intrusion detection model
based on deep belief networks,” in Advanced Cloud and Big Data
(CBD), 2014 Second International Conference on, 2014, pp. 247– 252.
S. Seo, S. Park, and J. Kim, “Improvement of Network Intrusion
Detection Accuracy by Using Restricted Boltzmann Machine,” in
Computational Intelligence and Communication Networks (CICN),
2016 8th International Conference on, 2016, pp. 413–417
M. A. Salama, H. F. Eid, R. A. Ramadan, A. Darwish, and A.E.
Hassanien, “Hybrid intelligent intrusion detection scheme,” in Soft
computing in industrial applications, Springer, 2011, pp. 293–303.
Y. Li, R. Ma, and R. Jiao, “A hybrid malicious code detection method
based on deep learning,” methods, vol. 9, no. 5, 2015.
K. Alrawashdeh and C. Purdy, “Toward an online anomaly intrusion
detection system based on deep learning,” in Machine Learning and
Applications (ICMLA), 2016 15th IEEE International Conference on,
2016, pp. 195–200.
J. Kim, J. Kim, H. L. T. Thu, and H. Kim, “Long short term memory
recurrent neural network classifier for intrusion detection,” in Platform
Technology and Service (PlatCon), 2016 International Conference on,
2016, pp. 1–5.
C. Yin, Y. Zhu, J. Fei, and X. He, “A deep learning approach for
intrusion detection using recurrent neural networks,” IEEE Access,
vol. 5, pp. 21954–21961, 2017.
S. Althubiti, W. Nick, J. Mason, X. Yuan, and A. Esterline, “Applying
Long Short-Term Memory Recurrent Neural Network for Intrusion
Detection,” in SoutheastCon 2018, 2018, pp. 1–5.
T. A. Tang, S. Ali, R. Zaidi, D. Mclernon, L. Mhamdi, and M. Ghogho,
“Deep Recurrent Neural Network for Intrusion Detection in
SDN-based Networks,” in 2018 4th IEEE Conference on Network
Softwarization and Workshops (NetSoft), 2018, pp. 25–29.
Y. Yao, Y. Wei, F. Gao, and G. Yu, “Anomaly intrusion detection
approach using hybrid MLP/CNN neural network,” in Intelligent
Systems Design and Applications, 2006. ISDA‟06. Sixth International
Conference on, 2006, vol. 2, pp. 1095–1102.
K. Wu, Z. Chen, and W. Li, “A Novel Intrusion Detection Model for a
Massive Network Using Convolutional Neural Networks,” IEEE
Access, vol. 6, pp. 50850–50859, 2018.
J. Kim, N. Shin, S. Y. Jo, and S. H. Kim, “Method of intrusion
detection using deep neural network,” in Big Data and Smart
Computing (BigComp), 2017 IEEE International Conference on, 2017,
pp. 313–316.
T. A. Tang, L. Mhamdi, D. McLernon, S. A. R. Zaidi, and M. Ghogho,
“Deep learning approach for network intrusion detection in software
defined networking,” in Wireless Networks and Mobile
Communications (WINCOM), 2016 International Conference on,
2016, pp. 258–263.
Revathi, S & Malathi, A. (2013). A Detailed Analysis on NSL-KDD
Dataset Using Various Machine Learning Techniques for Intrusion
Detection. International Journal of Engineering Research &
Technology (IJERT). 2. 1848-1853.
Claude Turner*, Rolston Jeremiah, Dwight Richards, Anthony Joseph,
“A Rule Status Monitoring Algorithm for Rule-Based Intrusion
Detection and Detection Systems”, Procedia Computer Science, ISSN:
1877-0509, Vol: 95, Page: 361-368, 2016
Pravara Rural Engineering College, Loni, affiliated to Savitribai Phule Pune
University. Her research interests include issues related to Wireless
networking, Image processing Mobile Communication, Networking etc. She
has published paper in national, international conference and journals. She is
life member of ISTE and IAENG.
Deepika R. Pede, she have completed her B.E in
Computer Engineering from Bharati Vidyapeeth
College of Engineering for Women, Pune in 2013
affiliated to Savitribai Phule Pune University and
pursuing her M.E. in Computer Engineering from
Pravara Rural Engineering College , Loni , Tal:
Rahata , District Ahmednagar affiliated to Savitribai
Phule Pune University.
Pratap S. Vikhe received the M. Tech and Ph. D degree
in Instrumentation engineering from SGGS Institute of
Engineering and Technology Nanded affiliated to
University of Shri Ramanand Teerth Marathwada
University, Nanded in 2009 and 2018 respectively. He
has completed his Bachelor‟s degree in Instrumentation
engineering from PDVVP, Ahmednagar affiliated to
University of Pune in 2003. He works as an Associate Professor in the
Department of Instrumentation and Control Engineering, at Pravara Rural
Engineering College, Loni, Tal: Rahata, District Ahmednagar affiliated to
University of Pune. His research interests include biomedical signal and
image processing. He is author of few research papers published at national
and international journals, conference proceedings. He is life member of
ISTE, IAENG and IARA.
AUTHORS PROFILE
Vaishali V. Mandhare received the Ph. D in
Information Technology from S. G. G. S. Institute of
Engineering and Technology, affiliated to S. R. T.M
University, Nanded and had received her B.E and M.
Tech in Information Technology and Computer Science
Engineering from Shivaji University, Kolhapur and Dr.
B.A.T.U, Lonere in 2005 and 2009 respectively. She is
working as Associate Professor in Department of Computer Engineering at
Retrieval Number: 100.1/ijrte.B4086079220
DOI:10.35940/ijrte.B4086.099320
64
Published By:
Blue Eyes Intelligence Engineering
and Sciences Publication