2019
DOI: 10.1109/access.2019.2899721
|View full text |Cite
|
Sign up to set email alerts
|

TSDL: A Two-Stage Deep Learning Model for Efficient Network Intrusion Detection

Abstract: The network intrusion detection system is an important tool for protecting computer networks against threats and malicious attacks. Many techniques have recently been proposed; however, these face significant challenges due to the continuous emergence of new threats that are not recognized by existing systems. In this paper, we propose a novel two-stage deep learning (TSDL) model, based on a stacked auto-encoder with a soft-max classifier, for efficient network intrusion detection. The model comprises two deci… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
141
0
1

Year Published

2020
2020
2024
2024

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 289 publications
(166 citation statements)
references
References 55 publications
0
141
0
1
Order By: Relevance
“…For example, the "Protocol_type" feature of the NSL-KDD is a nominal feature with three values (UDP, TCP, and ICMP), by converting this attribute to a single numeric attribute using ordinal encoding, one is implicitly introducing an ordering over the nominal values which is a bad representation of the data, because it does not make sense to say TCP should be in between UDP and ICMP, and this may be misinterpreted by the algorithm and can have an unwanted effect on the IDS model. This mistake can be seen in some of the reviewed literature [14], [17], [18], [20]. A better solution to this is to use binary encoding or yet better, one-hot (dummy) encoding, that map each category to a vector that contains 1 and 0 denoting the presence or absence of the features' value.…”
Section: Data Encodingmentioning
confidence: 99%
See 1 more Smart Citation
“…For example, the "Protocol_type" feature of the NSL-KDD is a nominal feature with three values (UDP, TCP, and ICMP), by converting this attribute to a single numeric attribute using ordinal encoding, one is implicitly introducing an ordering over the nominal values which is a bad representation of the data, because it does not make sense to say TCP should be in between UDP and ICMP, and this may be misinterpreted by the algorithm and can have an unwanted effect on the IDS model. This mistake can be seen in some of the reviewed literature [14], [17], [18], [20]. A better solution to this is to use binary encoding or yet better, one-hot (dummy) encoding, that map each category to a vector that contains 1 and 0 denoting the presence or absence of the features' value.…”
Section: Data Encodingmentioning
confidence: 99%
“…BestFirst Forward search strategy is used in feature search with 5 consecutive non-improving nodes as the search stopping criteria, and accuracy as the evaluation measure. After performing the feature selection, twenty (20) and nineteen (19) features were the best optimal feature for UNSW-NB15 and NSL-KDD respectively and WEKA's supervised attribute Remove filter is used to collect the features subsets. Thus, two more datasets are derived bringing our total datasets to four: 2 complete datasets and 2 feature selected versions of UNSW-NB15 and NSL-KDD, description of the full datasets is available in [28] and [45] respectively, Table 4.3 below shows the selected optimal features of the datasets.…”
Section: Figure 41 -Dt Wrapper-based Fsmentioning
confidence: 99%
“…We have applied the evaluation metrics used in the majority of the current state-of-art. Khan et al [31] introduced accuracy, precision, recall, F-measure, and false-positive rate(FPR) as the most common metrics used in intrusion-detection systems. These metrics can be defined as follows:…”
Section: Evaluation Metrics For Idsmentioning
confidence: 99%
“…Its advantage of automatically extracting highlevel abstract features helps to complete the classification of large-scale and complex network data. The application of deep learning in network intrusion detection has made some remarkable research results [17][18][19][20][21][22]. Li et al [17] proposed a network intrusion detection method based on deep learning.…”
Section: A Related Research On Deep Learning In Nidsmentioning
confidence: 99%