Skip to main content

Network Intrusion Detection Based on Hybrid Network Model and Federated Learning

  • Conference paper
  • First Online:
The 7th International Conference on Information Science, Communication and Computing (ISCC2023 2023)

Part of the book series: Smart Innovation, Systems and Technologies ((SIST,volume 350))

  • 167 Accesses

Abstract

Data is a valuable strategic resource for the development of modern society. However, with the increasingly complex network environment, privacy leaks and malicious attacks emerge in endlessly. For example, blockchain has also begun to become a new outlet for network black production, which poses a huge security threat to cryptocurrency. In this paper, we propose a hybrid network model (Cb Net), which uses Convolutional Neural Networks (CNN) and Bidirectional recurrent neural networks (BiGRU) to fully extract the space-time characteristics of network data traffic. Then, we propose an intrusion detection method (FLD), which introduces federated learning to collect traffic data from different network institutions, analyze network traffic and identify network attacks. We have fully evaluated the performance of the proposed model and method on the public dataset NSL-KDD. Experiments show that the proposed hybrid network model can achieve high detection accuracy, and the FLD method can effectively identify network attacks on the premise of ensuring the privacy of the local data of the users involved, and its performance is better than other methods.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 189.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 249.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Qiang, Y.: Federal learning: the last mile of ai. CAAI Trans. Intell. Syst. 15(1), 183–186 (2020)

    Google Scholar 

  2. Tavallaee, M., Bagheri, E., Lu, W., Ghorbani, A.A: A detailed analysis of the kdd cup 99 data set. In: IEEE International Conference on Computational Intelligence for Security Defense Applications (2009)

    Google Scholar 

  3. Khan, M.A., Karim, M.R., Kim, Y.: A scalable and hybrid intrusion detection system based on the convolutional-lstm network. Symmetry 11(4) (2019)

    Google Scholar 

  4. Kan, X., Fan, Y., Fang, Z., Cao, L., Li, X.: A novel iot network intrusion detection approach based on adaptive particle swarm optimization convolutional neural network. Inf. Sci. (2021)

    Google Scholar 

  5. Al-Turaiki, I., Altwaijry, N.: A convolutional neural network for improved anomaly-based network intrusion detection. Big Data 9(3), 233–252 (2021)

    Article  Google Scholar 

  6. Yu, L., Dong, J., Chen, L., Li, M., Xu, B., Li, Z., Qiao, L., Liu, L., Zhao, B., Zhang, C.: PBCNN: packet bytes-based convolutional neural network for network intrusion detection. Comput. Netw. 194, 108117 (2021). [Online]. Available: https://doi.org/10.1016/j.comnet.2021.108117

  7. Andresini, G., Appice, A., Rose, L.D., Malerba, D.: GAN augmentation to deal with imbalance in imaging-based intrusion detection. Future Gener. Comput. Syst. 123, 108–127 (2021). [Online]. Available: https://doi.org/10.1016/j.future.2021.04.017

  8. Alkahtani, H., Aldhyani, T.H.H.: Intrusion detection system to advance internet of things infrastructure-based deep learning algorithms. Complex 5 579 851:1–5 579 851:18 (2021). [Online]. Available: https://doi.org/10.1155/2021/5579851

  9. Khan, M.A., Kim, Y.: Deep learning-based hybrid intelligent intrusion detection system. Comput. Mater. Continua 7, 17 (2021)

    Google Scholar 

  10. Jothi, B., Pushpalatha, M.: Wils-trs—a novel optimized deep learning based intrusion detection framework for iot networks. In: Personal and Ubiquitous Computing, pp. 1–17

    Google Scholar 

  11. Yang, S., Tan, M., Xia, S., Liu, F.: A method of intrusion detection based on attention-lstm neural network. In: ICMLT 2020: 2020 5th International Conference on Machine Learning Technologies (2020)

    Google Scholar 

  12. Kurochkin, I.I., Volkov, S.S.: Using gru based deep neural network for intrusion detection in software-defined networks. IOP Conf. Ser. Mater. Sci. Eng. 927(1), 012035 (2020)

    Google Scholar 

  13. Singh, N.B., Singh, M.M., Sarkar, A., Mandal, J.K.: A novel wide deep transfer learning stacked gru framework for network intrusion detection. J. Inf. Secur. Appl. 61 (2021)

    Google Scholar 

  14. Cheng, K., Fan, T., Jin, Y., Liu, Y., Yang, Q.: Secureboost: a lossless federated learning framework. Intell. Syst. IEEE (99), 1 (2021)

    Google Scholar 

  15. Paulauskas, N., Auskalnis, J.: Analysis of data pre-processing influence on intrusion detection using nsl-kdd dataset. In: Electrical, Electronic Information Sciences, pp. 1–5 (2017)

    Google Scholar 

  16. Salem, F.M.: Gated RNN: The Gated Recurrent Unit (GRU) RNN. Springer International Publishing, pp. 85–100 (2022). https://doi.org/10.1007/978-3-030-89929-5_5

  17. Lin, T.Y., Goyal, P., Girshick, R., He, K., Dollar, P.: Focal loss for dense object detection. IEEE (2), (2020)

    Google Scholar 

  18. Karimireddy, S.P., Kale, S., Mohri, M., Reddi, S.J., Stich, S.U., Suresh, A.T.: Scaffold: stochastic controlled averaging for federated learning (2019)

    Google Scholar 

  19. Tavallaee, M., Bagheri, E., Lu, W., Ghorbani, A.A: A detailed analysis of the kdd cup 99 data set. In: IEEE International Conference on Computational Intelligence for Security Defense Applications (2009)

    Google Scholar 

  20. Li, J., Zhao, Z., Li, R., Zhang, H.: Ai-based two-stage intrusion detection for software defined iot networks. IEEE Internet Things J. 6(2), 2093–2102 (2019). [Online]. Available: https://doi.org/10.1109/JIOT.2018.2883344

  21. Diro, A.A., Chilamkurti, N.K.: Distributed attack detection scheme using deep learning approach for internet of things. Future Gener. Comput. Syst. 82, 761–768 (2018). [Online]. Available: https://doi.org/10.1016/j.future.2017.08.043

  22. Yang, Y., Zheng, K., Wu, C., Niu, X., Yang, Y.: Building an effective intrusion detection system using the modified density peak clustering algorithm and deep belief networks. Appl. Sci. 9(2) (2019)

    Google Scholar 

  23. Tian, Q., Han, D., Li, K., Liu, X., Duan, L., Castiglione, A.: An intrusion detection approach based on improved deep belief network. Appl. Intell. 50(10), 3162–3178 (2020). [Online]. Available: https://doi.org/10.1007/s10489-020-01694-4

  24. Kumar, G.: An improved ensemble approach for effective intrusion detection. J. Supercomput. 76(1), 275–291 (2020). [Online]. Available: https://doi.org/10.1007/s11227-019-03035-w

Download references

Acknowledgment

This work was supported by Hainan Provincial Natural Science Foundation of China(Grant No. 620MS021, 621QN211), the Key Research and Development Program of Hainan Province (Grant No. ZDYF2021GXJS003, ZDYF2020040), the Major science and technology project of Hainan Province (Grant No. ZDKJ2020012), National Natural Science Foundation of China (NSFC) (Grant No. 62162022, 62162024), Science and Technology Development Center of the Ministry of Education Industry-university-Research Innovation Fund (2021JQR017), Innovative research project for Graduate students in Hainan Province (Grant No.Qhyb2022-93).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yuqing Kou .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2024 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Kou, Y., Cheng, J., Yang, Y., Wu, H., Li, Y., Sheng, V.S. (2024). Network Intrusion Detection Based on Hybrid Network Model and Federated Learning. In: Qiu, X., Xiao, Y., Wu, Z., Zhang, Y., Tian, Y., Liu, B. (eds) The 7th International Conference on Information Science, Communication and Computing. ISCC2023 2023. Smart Innovation, Systems and Technologies, vol 350. Springer, Singapore. https://doi.org/10.1007/978-981-99-7161-9_12

Download citation

  • DOI: https://doi.org/10.1007/978-981-99-7161-9_12

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-99-7160-2

  • Online ISBN: 978-981-99-7161-9

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics