2020
DOI: 10.1109/access.2020.2972627
|View full text |Cite
|
Sign up to set email alerts
|

BAT: Deep Learning Methods on Network Intrusion Detection Using NSL-KDD Dataset

Abstract: Intrusion detection can identify unknown attacks from network traffics and has been an effective means of network security. Nowadays, existing methods for network anomaly detection are usually based on traditional machine learning models, such as KNN, SVM, etc. Although these methods can obtain some outstanding features, they get a relatively low accuracy and rely heavily on manual design of traffic features, which has been obsolete in the age of big data. To solve the problems of low accuracy and feature engi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
116
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
9

Relationship

0
9

Authors

Journals

citations
Cited by 276 publications
(147 citation statements)
references
References 46 publications
0
116
0
Order By: Relevance
“…To address the misclassification issues in IDS, Su et al [96] proposed BAT-MC, a novel methodology for IDS that integrates the Bat and DL algorithms. The Bat algorithm combines the bidirectional long-short-term memory (BLSTM) with the attention mechanism.…”
Section: Feature Engineering Issues In Datasetmentioning
confidence: 99%
“…To address the misclassification issues in IDS, Su et al [96] proposed BAT-MC, a novel methodology for IDS that integrates the Bat and DL algorithms. The Bat algorithm combines the bidirectional long-short-term memory (BLSTM) with the attention mechanism.…”
Section: Feature Engineering Issues In Datasetmentioning
confidence: 99%
“…An LSTM classifier with a gradient descent optimizer is used in IDS [30], which can effectively mine the association between features from the perspective of time. Su et al [31] combined an attention mechanism and BLSTM (bidirectional long short-term memory) to propose a network anomaly detection model BAT, which extracts coarse-grained features by connecting forward LSTM and backward LSTM. The BAT model uses an attention mechanism to filter the network flow vectors generated by the BLSTM model to obtain the key characteristics of network traffic classification.…”
Section: Related Workmentioning
confidence: 99%
“…The various attacks included in NSL-KDD dataset include: DoS (Denial of Services) attack, User-to-Root attack, Remote-to-local attack and Probes. In the literature, this dataset has been widely used to assess the performance of anomaly-based attack detection systems for IoT network [6,7,8].…”
Section: Introductionmentioning
confidence: 99%
“…dataset and data pre-processing. NSL-KDD is the latest version of KDD99 dataset and has been widely used by researchers to evaluate the performance of the attack detection system in IoT [6,7,8]. In NSL-KDD dataset, the training data is available in "KDDTrain+" file, consisting of 125973 data entries, out of which 67343 entries represent non-malicious and 58630 entries represent malicious.…”
Section: Introduction To Nsl-kddmentioning
confidence: 99%