Abstract
In recent years, cyber-attacks have many new forms with larger scale and much more complexity. This requires many network protection solutions and amplify the need for robust cybersecurity practices. One of the effective method to prevent network attacks is to use to Intrusion Detection Systems (IDSs), which can detect attacks never seen before. Many researchers have tried to produce anomaly - based IDSs, but they have not been able to detect malicious network traffic enough to ensure implementation in real networks. Clearly, it is still a challenge for the security community produce IDS suitable for implementation in real world. In this paper, we propose a new approach using a Deep Belief Network called Workflow-based Collaborative Learning with a combination of supervised and unsupervised machine learning methods for network attacks detection. Our proposed approach will be tested with network security datasets and compared with previously existing methods. The experimental evaluation shows that the valid of our approach.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Bou-Harb, E., Debbabi, M., Assi, C., Scanning, C.: A comprehensive survey. IEEE Commun. Surv. Tutorials 16(3), 1496–1519 (2014)
Gao, M., Tian, J., Xia, M.: Intrusion detection method based on classify support vector machine. In: Second International Conference on Intelligent Computation Technology and Automation, ICICTA 2009, vol. 2, pp. 391–394 (2009)
Vidhya, M.: Efficient classification of portscan attacks using support vector machine, green high performance computing (ICGHPC). In: 2013 IEEE International Conference (2013)
Lee, S.Y, Kim, Y.S., Lee, B.H., Kang, S.H., Youn, C.H.: A probe detection model using the analysis of the fuzzy cognitive maps. In: Computational Science and Its Applications ICCSA 2005, pp. 287–291 (2005)
Dr. Revathi, S., Malathi, A.: A detailed analysis on NSLKDD dataset using various machine learning techniques for intrusion detection. Int. J. Eng. Res. Technol. (IJERT), 2, 1848–1853 (2013)
Elleithy, K.M., Blagovic, D., Cheng, W.K., Sideleau, P.: Denial of service attack techniques: analysis, implementation and comparison, January 2006
Fatahi, M., Shahsavari, M., Ahmadi, M., Ahmadi, A., Boulet, P., Devienne, P.: Rate-coded DBN: an online strategy for spike-based deep belief networks. Biological. Inspired Cogn. Archit. 24, 59–69 (2018)
Bhuyan, M.H., Bhattacharyya, D.K., Kalita, J.K.: AOCD: an adaptive outlier based coordinated scan detection approach. IJ Netw. Secur. 14(6), 339–351 (2012)
Hinton, G.E.: Learning multiple layers of representation, Trends Cogn. Sci. 11, 428–434 (2007). https://doi.org/10.1016/j.tics.2007.09.004
Hinton, G.E., Osindero, S., Teh, Y.W.: A fast learning algorithm for deep belief nets. Neural Comput. 18, 1527–1554 (2016)
Moustafa, N., Slay, J.: UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set). In: Military Communications and Information Systems Conference (MilCIS). IEEE (2015)
Wei, P., Li, Y., Zhang, Z., Hu, T., Li, Z., Liu, D.: An optimization method for intrusion detection classification model based on deep belief network, IEEE Access, 7, 87593–87605 (2019). https://doi.org/10.1109/access.2019.2925828
Dr. Revathi, S., Malathi. A.: A detailed analysis on NSLKDD dataset using various machine learning techniques for intrusion detection. Int. J. Eng. Res. Technol. (IJERT), 2, 1848–1853 (2013)
Ambedkar, C., Kishore Babu, V.: Detection of probe attacks using machine learning techniques. Int. J. Res. Stud. Comput. Sci. Eng. (IJRSCSE) 2(3), 25–29 (2015)
Verma A., Mehta, S.: A comparative study of ensemble learning methods for classification in bioinformatics. In: 2017 7th International Conference on Cloud Computing, Data Science & Engineering - Confluence, pp. 155–158 (2017). https://doi.org/10.1109/confluence.2017.7943141
Xie, G., Zhao, Y., Jiang, M., Zhang, N.: A novel ensemble learning approach for corporate financial distress forecasting in fashion and textiles supply chains. Math. Probl. Eng. 2013, 1–9 (2013). https://doi.org/10.1155/2013/493931
Li, Y., Bai, C., Reddy, C.K.: A distributed ensemble approach for mining healthcare data under privacy constraints. Inf. Sci. (Ny) 330, 245–259 (2016). https://doi.org/10.1016/j.ins.2015.10.011
Tran, T.K., Phan, T.T.: A hybrid approach for building a Vietnamese sentiment dictionary. J. Intell. Fuzzy Syst. 35(1), 967–978 (2018). https://doi.org/10.3233/JIFS-172053
Tran, T.K., Phan, T.T.: Deep learning application to ensemble learning—the simple, but effective, approach to sentiment classifying. Appl. Sci. 9(13), 2760 (2019). https://doi.org/10.3390/app9132760
Tran, T.K., Phan, T.T.: Mining opinion targets and opinion words from online reviews. Int. J. Inf. Technol. 9(3), 239–249 (2017)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Thanh, C.T. (2020). A Novel Approach for Intrusion Detection Based on Deep Belief Network. In: Silhavy, R. (eds) Artificial Intelligence and Bioinspired Computational Methods. CSOC 2020. Advances in Intelligent Systems and Computing, vol 1225. Springer, Cham. https://doi.org/10.1007/978-3-030-51971-1_24
Download citation
DOI: https://doi.org/10.1007/978-3-030-51971-1_24
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-51970-4
Online ISBN: 978-3-030-51971-1
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)