Study on Construction of IOT Network Intrusion Detection Classification Model and Optimization Based on Combination of ResNet and Bidirectional LSTM Network

CHEN Hongsong, CHEN Jingjiu

Abstract

 In order to improve the performance of the Internet of Things (IOT) network intrusion detection model, Residual Networks (ResNet) and bidirectional Long-Short Term Memory (LSTM) networks were combined,and an IOT intrusion detection classification model was constructed. For the rapid and batch processing problem of large-scale IOT traffic, multiple traffic samples were converted into grayscale images. Then,the grayscale images were used to construct IOT intrusion detection and classification model which combined with ResNet and bidirectional LSTM network. The network structure and re-usability of the classification model were optimized experimentally,so the optimization model was obtained finally. The classification accuracy of the optimization model is 96.77%, and the running time after the model reuse optimization is 39.85 s. Compared with other machine learning algorithms, the proposed approach achieves good results in both classification accuracy and efficiency. The performance of the proposed model is better than that of traditional intrusion detection model.

 

 

Keywords:  intrusion detection,  Residual Networks(ResNet),  bidirectional Long-Short Term Memory(LSTM) networks  image classification,  IOT(Internet of Things)


Full Text:

PDF


References


SHARAFALDIN I,LASHKARI A H,GHORBANI A A. Toward generating a new intrusion detection dataset and intrusion traffic characterization [C]// International Conference on Information Systems Security and Privacy. Berlin:Springer,2018:108—116.

GHARIB A,SHARAFALDIN I,LASHKARI A H,et al. An evaluation framework for intrusion detection dataset [C]// International Conference on Information Science and Security. Washington D C: GoogLeNet 95.52 8 794.45 IEEE Computer Society,2016:1—6

KONG L S. Research on intrusion detection based on deep learning and transfer learning [D]. Qingdao:School of Information Science and Engineering,Shandong University,2018:1—10.(In Chinese)

XU W Y. Research on network intrusion detection based on machine learning [D]. Beijing:School of Computer and Information Technology,Beijing Jiao Tong University,2018:2—16.(In Chinese)

VINAYAKUMAR R,SOMANK P,POORNACHANDRAN P. Applying convolutional neural network for network intrusion detection[C]// International Conference on Advances in Computing,Communications and Informatics. Washington D C:IEEE Computer Society, 2017:1107—1110.

ZHANG Y,CHEN X,JIN L,et al. Network Intrusion detection:based on deep hierarchical network and original flow data [J]. IEEE Access,2019,7(1):37004—37016.

USTEBAY S,TURGUT Z,AYDIN M A. Intrusion detection system with recursive feature elimination by using random forest and deep learning classifier [C]// International Congress on Big Data,Deep Learning and Fighting Cyber Terrorism. Washington D C:IEEE Computer Society,2018:71—76.

DUTTA K,KRISHNAN P,MATHEW M,et al. Improving CNN- RNN hybrid networks for handwriting recognition[C]// International Conference on Frontiers in Handwriting Recognition. Washington D C:IEEE Computer Society,2018:80—85.

JAIN M,MATHEW M,JAWAHAR C V. Unconstrained OCR for Urdu using deep CNN -RNN hybrid networks [C]// IAPR Asian Conference on Pattern Recognition. Washington D C:IEEE Computer Society,2017:747—752.

SZEGEDY C,IOFFE S,VANHOUCKE V. Inception-v4,inception- ResNet and the impact of residual connections on learning[C]// AAAI Conference on Artificial Intelligence. Palo Alto:AAAI Press, 2016:4278—4284.

HE K M,ZHANG X Y,REN S Q,et al. Deep residual learning for image recognition [C]// IEEE Conference on Computer Vision and Pattern Recognition. Washington D C:IEEE Computer Society, 2016:770—778.

KIM J,KIM J,THU H L T,et al. Long short term memory recurrent neural network classifier for intrusion detection [C]// IEEE International Conference on Platform Technology and Service. Washington D C:IEEE Computer Society,2016:1—5.


Refbacks

  • There are currently no refbacks.