Inicio  /  Information  /  Vol: 14 Par: 2 (2023)  /  Artículo
ARTÍCULO
TITULO

CSK-CNN: Network Intrusion Detection Model Based on Two-Layer Convolution Neural Network for Handling Imbalanced Dataset

Jiaming Song    
Xiaojuan Wang    
Mingshu He and Lei Jin    

Resumen

In computer networks, Network Intrusion Detection System (NIDS) plays a very important role in identifying intrusion behaviors. NIDS can identify abnormal behaviors by analyzing network traffic. However, the performance of classifier is not very good in identifying abnormal traffic for minority classes. In order to improve the detection rate on class imbalanced dataset, we propose a network intrusion detection model based on two-layer CNN and Cluster-SMOTE + K-means algorithm (CSK-CNN) to process imbalanced dataset. CSK combines the cluster based Synthetic Minority Over Sampling Technique (Cluster-SMOTE) and K-means based under sampling algorithm. Through the two-layer network, abnormal traffic can not only be identified, but also be classified into specific attack types. This paper has been verified on UNSW-NB15 dataset and CICIDS2017 dataset, and the performance of the proposed model has been evaluated using such indicators as accuracy, recall, precision, F1-score, ROC curve, AUC value, training time and testing time. The experiment shows that the proposed CSK-CNN in this paper is obviously superior to other comparison algorithms in terms of network intrusion detection performance, and is suitable for deployment in the real network environment.

 Artículos similares

       
 
Yussuf Ahmed, Muhammad Ajmal Azad and Taufiq Asyhari    
In recent years, there has been a notable surge in both the complexity and volume of targeted cyber attacks, largely due to heightened vulnerabilities in widely adopted technologies. The Prediction and detection of early attacks are vital to mitigating p... ver más
Revista: Information

 
Ted H. Szymanski    
The next-generation ?Industrial Internet of Things? (IIoT) will support ?Machine-to-Machine? (M2M) communications for smart Cyber-Physical-Systems and Industry 4.0, and require guaranteed cyber-security. This paper explores hardware-enforced cyber-securi... ver más
Revista: Information

 
Abhishek Phadke, F. Antonio Medrano, Tianxing Chu, Chandra N. Sekharan and Michael J. Starek    
UAV swarms have multiple real-world applications but operate in a dynamic environment where disruptions can impede performance or stop mission progress. Ideally, a UAV swarm should be resilient to disruptions to maintain the desired performance and produ... ver más
Revista: Aerospace

 
Gianmarco Baldini    
Cybersecurity in modern vehicles has received increased attention from the research community in recent years. Intrusion Detection Systems (IDSs) are one of the techniques used to detect and mitigate cybersecurity risks. This paper proposes a novel imple... ver más
Revista: Information

 
Hongpo Zhang, Bo Zhang, Lulu Huang, Zhaozhe Zhang and Haizhaoyang Huang    
Internet of Things (IoT) devices and services provide convenience but face serious security threats. The network intrusion detection system is vital in ensuring the security of the IoT environment. In the IoT environment, we propose a novel two-stage int... ver más
Revista: Information