Skip to main content

A Novel Approach for Intrusion Detection Based on Deep Belief Network

  • Conference paper
  • First Online:
Artificial Intelligence and Bioinspired Computational Methods (CSOC 2020)

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 1225))

Included in the following conference series:

Abstract

In recent years, cyber-attacks have many new forms with larger scale and much more complexity. This requires many network protection solutions and amplify the need for robust cybersecurity practices. One of the effective method to prevent network attacks is to use to Intrusion Detection Systems (IDSs), which can detect attacks never seen before. Many researchers have tried to produce anomaly - based IDSs, but they have not been able to detect malicious network traffic enough to ensure implementation in real networks. Clearly, it is still a challenge for the security community produce IDS suitable for implementation in real world. In this paper, we propose a new approach using a Deep Belief Network called Workflow-based Collaborative Learning with a combination of supervised and unsupervised machine learning methods for network attacks detection. Our proposed approach will be tested with network security datasets and compared with previously existing methods. The experimental evaluation shows that the valid of our approach.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Bou-Harb, E., Debbabi, M., Assi, C., Scanning, C.: A comprehensive survey. IEEE Commun. Surv. Tutorials 16(3), 1496–1519 (2014)

    Article  Google Scholar 

  2. Gao, M., Tian, J., Xia, M.: Intrusion detection method based on classify support vector machine. In: Second International Conference on Intelligent Computation Technology and Automation, ICICTA 2009, vol. 2, pp. 391–394 (2009)

    Google Scholar 

  3. Vidhya, M.: Efficient classification of portscan attacks using support vector machine, green high performance computing (ICGHPC). In: 2013 IEEE International Conference (2013)

    Google Scholar 

  4. Lee, S.Y, Kim, Y.S., Lee, B.H., Kang, S.H., Youn, C.H.: A probe detection model using the analysis of the fuzzy cognitive maps. In: Computational Science and Its Applications ICCSA 2005, pp. 287–291 (2005)

    Google Scholar 

  5. Dr. Revathi, S., Malathi, A.: A detailed analysis on NSLKDD dataset using various machine learning techniques for intrusion detection. Int. J. Eng. Res. Technol. (IJERT), 2, 1848–1853 (2013)

    Google Scholar 

  6. Elleithy, K.M., Blagovic, D., Cheng, W.K., Sideleau, P.: Denial of service attack techniques: analysis, implementation and comparison, January 2006

    Google Scholar 

  7. Fatahi, M., Shahsavari, M., Ahmadi, M., Ahmadi, A., Boulet, P., Devienne, P.: Rate-coded DBN: an online strategy for spike-based deep belief networks. Biological. Inspired Cogn. Archit. 24, 59–69 (2018)

    Article  Google Scholar 

  8. Bhuyan, M.H., Bhattacharyya, D.K., Kalita, J.K.: AOCD: an adaptive outlier based coordinated scan detection approach. IJ Netw. Secur. 14(6), 339–351 (2012)

    Google Scholar 

  9. Hinton, G.E.: Learning multiple layers of representation, Trends Cogn. Sci. 11, 428–434 (2007). https://doi.org/10.1016/j.tics.2007.09.004

  10. Hinton, G.E., Osindero, S., Teh, Y.W.: A fast learning algorithm for deep belief nets. Neural Comput. 18, 1527–1554 (2016)

    Article  MathSciNet  Google Scholar 

  11. Moustafa, N., Slay, J.: UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set). In: Military Communications and Information Systems Conference (MilCIS). IEEE (2015)

    Google Scholar 

  12. Wei, P., Li, Y., Zhang, Z., Hu, T., Li, Z., Liu, D.: An optimization method for intrusion detection classification model based on deep belief network, IEEE Access, 7, 87593–87605 (2019). https://doi.org/10.1109/access.2019.2925828

  13. Dr. Revathi, S., Malathi. A.: A detailed analysis on NSLKDD dataset using various machine learning techniques for intrusion detection. Int. J. Eng. Res. Technol. (IJERT), 2, 1848–1853 (2013)

    Google Scholar 

  14. Ambedkar, C., Kishore Babu, V.: Detection of probe attacks using machine learning techniques. Int. J. Res. Stud. Comput. Sci. Eng. (IJRSCSE) 2(3), 25–29 (2015)

    Google Scholar 

  15. Verma A., Mehta, S.: A comparative study of ensemble learning methods for classification in bioinformatics. In: 2017 7th International Conference on Cloud Computing, Data Science & Engineering - Confluence, pp. 155–158 (2017). https://doi.org/10.1109/confluence.2017.7943141

  16. Xie, G., Zhao, Y., Jiang, M., Zhang, N.: A novel ensemble learning approach for corporate financial distress forecasting in fashion and textiles supply chains. Math. Probl. Eng. 2013, 1–9 (2013). https://doi.org/10.1155/2013/493931

    Article  Google Scholar 

  17. Li, Y., Bai, C., Reddy, C.K.: A distributed ensemble approach for mining healthcare data under privacy constraints. Inf. Sci. (Ny) 330, 245–259 (2016). https://doi.org/10.1016/j.ins.2015.10.011

    Article  Google Scholar 

  18. Tran, T.K., Phan, T.T.: A hybrid approach for building a Vietnamese sentiment dictionary. J. Intell. Fuzzy Syst. 35(1), 967–978 (2018). https://doi.org/10.3233/JIFS-172053

    Article  Google Scholar 

  19. Tran, T.K., Phan, T.T.: Deep learning application to ensemble learning—the simple, but effective, approach to sentiment classifying. Appl. Sci. 9(13), 2760 (2019). https://doi.org/10.3390/app9132760

    Article  Google Scholar 

  20. Tran, T.K., Phan, T.T.: Mining opinion targets and opinion words from online reviews. Int. J. Inf. Technol. 9(3), 239–249 (2017)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Cao Tien Thanh .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Thanh, C.T. (2020). A Novel Approach for Intrusion Detection Based on Deep Belief Network. In: Silhavy, R. (eds) Artificial Intelligence and Bioinspired Computational Methods. CSOC 2020. Advances in Intelligent Systems and Computing, vol 1225. Springer, Cham. https://doi.org/10.1007/978-3-030-51971-1_24

Download citation

Publish with us

Policies and ethics