4.7 Article

Nearest cluster-based intrusion detection through convolutional neural networks

Journal

KNOWLEDGE-BASED SYSTEMS
Volume 216, Issue -, Pages -

Publisher

ELSEVIER
DOI: 10.1016/j.knosys.2021.106798

Keywords

Intrusion detection; Deep learning; Convolutional neural network; Clustering; Nearest neighbour search

Funding

  1. MIUR-Ministero dell'Istruzione dell'Universita e della Ricerca, Italy [ARS01_01116]
  2. project Modelli e tecniche di data science per la analisi di dati strutturati - University of Bari Aldo Moro, Italy

Ask authors/readers for more resources

The paper introduces a novel deep learning methodology using convolutional neural networks for network intrusion detection, where network flows are represented as 2D images to analyze potential data patterns and achieve better predictive accuracy compared to competitive architectures.
The recent boom in deep learning has revealed that the application of deep neural networks is a valuable way to address network intrusion detection problems. This paper presents a novel deep learning methodology that uses convolutional neural networks (CNNs) to equip a computer network with an effective means to analyse traffic on the network for signs of malicious activity. The basic idea is to represent network flows as 2D images and use this imagery representation of the flows to train a 2D CNN architecture. The novelty consists in deriving an imagery representation of the network flows through performing a combination of the nearest neighbour search and the clustering process. The advantage is that the proposed data mapping method allows us to build imagery data that express potential data patterns arising at neighbouring flows. The proposed methodology leads to better predictive accuracy when compared to competitive intrusion detection architectures on three benchmark datasets. (C) 2021 Elsevier B.V. All rights reserved.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.7
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available