Deep Learning Approach for IDS

Using DNN for Network Anomaly Detection
  • Zhiqiang Liu
  • Mohi-Ud-Din GhulamEmail author
  • Ye Zhu
  • Xuanlin Yan
  • Lifang Wang
  • Zejun Jiang
  • Jianchao Luo
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 1041)


With the astonishing development of the Internet and its applications in the last decade, cyberattacks are changing quickly, and the necessity of protection for communication network has improved tremendously. As the primary defense, the intrusion detection system plays a crucial role in making sure the network security. Key to intrusion detection system is actually to determine a variety of attacks effectively as well as to adjust to a constantly changing threat scenario. DNN or Deep Neural Network on NSL-KDD dataset for effective detection of an attack. Firstly, the dataset was preprocessed and normalized and then fed to the DNN algorithm to create a model. For testing purpose, entire dataset of NSL-KDD was used. Finally, to analyze the accuracy and precision of the DNN model, we use accuracy and precision matrices. The proposed DNN-based strategy enhances network anomaly detection and opens new analysis gateway for intrusion detection systems.


Deep learning DNN Intrusion detection system Network security 


  1. 1.
    S. Chung, K. Kim, A heuristic approach to enhance the performance of intrusion detection system using machine learning algorithms, in Proceedings of the Korea Institutes of Information Security and Cryptology Conference (CISC-W’15) (2015)Google Scholar
  2. 2.
    N. Gao, L. Gao, Q. Gao, H. Wang, An intrusion detection model based on deep belief networks, in 2014 Second International Conference on Advanced Cloud and Big Data (CBD) (2014), pp. 247–252Google Scholar
  3. 3.
    D. Shin, K. Choi, S. Chune, H. Choi, Malicious traffic detection using K-means. J. Korean Inst. Commun. Inf. Sci. 41(2), 277–284 (2016)Google Scholar
  4. 4.
    S. Jo, H. Sung, B. Ahn, A comparative study on the performance of SVM and an artificial neural network in intrusion detection. J. Korea Acad.-Ind. Cooperation Soc. 17(2), 703–711 (2016)CrossRefGoogle Scholar
  5. 5.
    P. Laskov, P. Dssel, C. Schfer, K. Rieck, Learning intrusion detection: supervised or unsupervised?’ in Proceedings of the 13th International Conference on Image Analysis and Processing (ICIAP), Cagliari, Italy, ed. by F. Roli, S. Vitulano (Springer, Berlin, 2005), pp. 50–57CrossRefGoogle Scholar
  6. 6.
    A. Solanas, A. Martinez-Balleste, Advances in Artificial Intelligence for Privacy Protection and Security (Intelligent Information Systems) (World Scientific, Hackensack, NJ, 2010) (Online)Google Scholar
  7. 7.
    D.K. Bhattacharyya, J.K. Kalita, Network Anomaly Detection: A Machine Learning Perspective (CRC Press, Boca Raton, FL, 2013)CrossRefGoogle Scholar
  8. 8.
    M. Tahir, W. Hassan, A. Md Said, N. Zakaria, N. Katuk, N. Kabir, M. Omar, O. Ghazali, N. Yahya, Hybrid machine learning technique for intrusion detection system, in 5th International Conference on Computing and Informatics (ICOCI) (2015)Google Scholar
  9. 9.
    W. Wang et al., HAST-IDS: learning hierarchical spatial-temporal features using deep neural networks to improve intrusion detection. IEEE Access 6, 1792–1806 (2018)CrossRefGoogle Scholar
  10. 10.
    W. McCulloch, W. Pitts, A logical calculus of the ideas immanent in nervous activity. Bull. Math. Biophys. 5(4), 115–133 (1943)MathSciNetCrossRefGoogle Scholar
  11. 11.
    W. McCulloch, W. Pitts, Results of the KDD’99 classifier learning. ACM SIGKDD Explor. Newsl. 1(2), 63–64 (2000)CrossRefGoogle Scholar
  12. 12.
    O. AI-Jarrah, A. Arafat, Network intrusion detection system using neural network classification of attack behavior. J. Adv. Inf. Technol. 6(1) (2015)Google Scholar
  13. 13.
    G. Dahl, T. Sainath, G. Hinton, Improving deep neural networks for LVCSR using rectified linear units and dropout, in 2013 IEEE International Conference on Acoustics, Speech and Signal Processing (2013), pp. 8609–8613Google Scholar
  14. 14.
    D. Kingma, J. Ba Adam, A Method for Stochastic Optimization, arXiv preprint arXiv:1412.6980 (2014)

Copyright information

© Springer Nature Singapore Pte Ltd. 2020

Authors and Affiliations

  • Zhiqiang Liu
    • 1
  • Mohi-Ud-Din Ghulam
    • 1
    Email author
  • Ye Zhu
    • 1
  • Xuanlin Yan
    • 1
  • Lifang Wang
    • 1
  • Zejun Jiang
    • 1
  • Jianchao Luo
    • 1
  1. 1.Northwestern Polytechnical UniversityXi’anPeople’s Republic of China

Personalised recommendations