Network Intrusion Detection With Auto-Encoder and One-Class Support Vector Machine

Network Intrusion Detection With Auto-Encoder and One-Class Support Vector Machine

Mohammad H. Alshayeji, Mousa AlSulaimi, Sa'ed Abed, Reem Jaffal
Copyright: © 2022 |Pages: 18
DOI: 10.4018/IJISP.291703
OnDemand:
(Individual Articles)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

Recent advances in machine learning have shown promising results for detecting network intrusion through supervised machine learning. However, such techniques are ineffective for new types of attacks. In the preferred unsupervised and semi-supervised cases, these newer techniques suffer from lower accuracy and higher rates of false alarms. This work proposes a machine learning model that combines auto-encoder with one-class support vectors machine. In this model, the auto-encoders learn the representation of the input data in a latent space and reduces the dimensionality of the input data. The dimensionality-reduced input is then extracted from the auto-encoder and passed to a one-class support vectors machine to classify the network event as an attack or a normal event. The model is trained on normal network events only. The proposed model is then evaluated and compared with several existing models. It achieves high accuracy when tested on the NSL-KDD and KDD99 datasets, with total accuracies of 96.24% and 99.45%, respectively.
Article Preview
Top

1 Introduction

Detecting network intrusion is an old problem; however, the risk of network intrusion has continued to increase with advances in network technologies over the last decade. Network intruders have always found a way to bypass traditional network intrusion detection systems such as rule-based, expert, and statistical analysis-based systems.

Network intrusion detection systems have been divide into two categories, misuse detection and anomaly detection (Chen et al., 2005). In misuse detection, historical attack data are analyzed to identify attacks or intrusions in current network events. Several methods have been used to perform misuse detection. The most common techniques involved the analysis and profiling of network data, such as the work done in (Ghosh et al., 1999). However, this requires a great deal of manual labor. Techniques that require less manual work include fuzzy logic (Naik et al., 2018), k-nearest neighbors (Li et al., 2018), and supervised machine learning algorithms (Kabir et al., 2018; Resende & Drummond, 2018; Sakr et al., 2019). While misuse detection techniques have low false positives and high accuracies when detecting known attack types, they do not maintain these standards when confronting unseen attack types (Chen et al., 2005). This happens because misuse detection techniques depend on analyzing the patterns of known attacks (Chen et al., 2005).

Anomaly Network Intrusion Systems (ANIDS) attempt to address attack data dependency issue found in misuse detection (Agrawal & Agrawal, 2015). In ANIDS, the system analyzes normal transactions only. Any event that does not exhibit the same patterns as a normal transaction is considered an intrusion or anomaly. As with misuse detection, there are several techniques that implement ANIDS. These include, but are not limited to, rule-based systems and clustering (Agrawal & Agrawal, 2015), genetic algorithms (Agrawal & Agrawal, 2015) and other machine learning models such as One-Class Support Vectors Machine (OSVMs) (Ahmed et al., 2016; Kumar et al., 2011). Since ANIDS depends on normal network event data for intrusion detection, it can detect unseen or unknown attacks with high accuracy. However, ANIDS suffers from a high false positive rate (Chen et al., 2005) because of outliers in the normal event analyzed by the system.

Another difference in models is whether they are supervised or unsupervised. SVMs (Sakr et al., 2019), decision trees (Resende & Drummond, 2018) and k-nearest neighbors are supervised models, whereas OSVMs (Ahmed et al., 2016) and clustering (Agrawal & Agrawal, 2015) are unsupervised. Note that the system being supervised does not indicate whether misuse or anomaly detection is being used.

Recently, deep learning has been the focus of attention for network intrusion detection research (Gamage & Samarabandu, 2020; Gurung et al., 2019; KB, 2020; Man & Sun, 2021). Both supervised and unsupervised models have been under study. Examples include the work done in (Khan et al., 2019; Shone et al., 2018; Vikram, 2020; Wang et al., 2018), which showed higher accuracies when compared with previous work. Furthermore, to reduce false positives and increase systems accuracies, some researchers, such as in (Agarap, 2017) and (Erfani et al., 2016), have proposed combining deep and shallow learning to increase the accuracy of network intrusion detection. Meanwhile the work done in (Khan, 2021) and (Al & Dener, 2021) propose combining multiple deep learning models to enhance the accuracy of a network intrusion detection systems.

Complete Article List

Search this Journal:
Reset
Volume 18: 1 Issue (2024)
Volume 17: 1 Issue (2023)
Volume 16: 4 Issues (2022): 2 Released, 2 Forthcoming
Volume 15: 4 Issues (2021)
Volume 14: 4 Issues (2020)
Volume 13: 4 Issues (2019)
Volume 12: 4 Issues (2018)
Volume 11: 4 Issues (2017)
Volume 10: 4 Issues (2016)
Volume 9: 4 Issues (2015)
Volume 8: 4 Issues (2014)
Volume 7: 4 Issues (2013)
Volume 6: 4 Issues (2012)
Volume 5: 4 Issues (2011)
Volume 4: 4 Issues (2010)
Volume 3: 4 Issues (2009)
Volume 2: 4 Issues (2008)
Volume 1: 4 Issues (2007)
View Complete Journal Contents Listing