Open Access
Open access
volume 11 issue 6 pages 898

A Deep Learning Model for Network Intrusion Detection with Imbalanced Data

Publication typeJournal Article
Publication date2022-03-14
scimago Q2
wos Q2
SJR0.615
CiteScore6.1
Impact factor2.6
ISSN20799292
Electrical and Electronic Engineering
Hardware and Architecture
Computer Networks and Communications
Control and Systems Engineering
Signal Processing
Abstract

With an increase in the number and types of network attacks, traditional firewalls and data encryption methods can no longer meet the needs of current network security. As a result, intrusion detection systems have been proposed to deal with network threats. The current mainstream intrusion detection algorithms are aided with machine learning but have problems of low detection rates and the need for extensive feature engineering. To address the issue of low detection accuracy, this paper proposes a model for traffic anomaly detection named a deep learning model for network intrusion detection (DLNID), which combines an attention mechanism and the bidirectional long short-term memory (Bi-LSTM) network, first extracting sequence features of data traffic through a convolutional neural network (CNN) network, then reassigning the weights of each channel through the attention mechanism, and finally using Bi-LSTM to learn the network of sequence features. In intrusion detection public data sets, there are serious imbalance data generally. To address data imbalance issues, this paper employs the method of adaptive synthetic sampling (ADASYN) for sample expansion of minority class samples, to eventually form a relatively symmetric dataset, and uses a modified stacked autoencoder for data dimensionality reduction with the objective of enhancing information fusion. DLNID is an end-to-end model, so it does not need to undergo the process of manual feature extraction. After being tested on the public benchmark dataset on network intrusion detection NSL-KDD, experimental results show that the accuracy and F1 score of this model are better than those of other comparison methods, reaching 90.73% and 89.65%, respectively.

Found 
Found 

Top-30

Journals

1
2
3
4
5
6
7
8
9
Computers and Security
9 publications, 5.33%
IEEE Access
8 publications, 4.73%
Lecture Notes in Networks and Systems
8 publications, 4.73%
Electronics (Switzerland)
7 publications, 4.14%
Applied Sciences (Switzerland)
5 publications, 2.96%
Sensors
5 publications, 2.96%
Procedia Computer Science
4 publications, 2.37%
Lecture Notes in Computer Science
4 publications, 2.37%
International Journal of Information Security
3 publications, 1.78%
Knowledge and Information Systems
3 publications, 1.78%
Computers and Electrical Engineering
3 publications, 1.78%
Cluster Computing
3 publications, 1.78%
Algorithms
2 publications, 1.18%
Computers, Materials and Continua
2 publications, 1.18%
Information (Switzerland)
2 publications, 1.18%
Measurement Sensors
2 publications, 1.18%
Artificial Intelligence in Data and Big Data Processing
2 publications, 1.18%
Concurrency Computation Practice and Experience
2 publications, 1.18%
Technologies
2 publications, 1.18%
PeerJ Computer Science
2 publications, 1.18%
Expert Systems with Applications
2 publications, 1.18%
Future Generation Computer Systems
2 publications, 1.18%
Scientific Reports
2 publications, 1.18%
PLoS ONE
2 publications, 1.18%
Computer Networks
1 publication, 0.59%
International Journal of Approximate Reasoning
1 publication, 0.59%
Internet of Things
1 publication, 0.59%
Wireless Communications and Mobile Computing
1 publication, 0.59%
Scientific Programming
1 publication, 0.59%
1
2
3
4
5
6
7
8
9

Publishers

10
20
30
40
50
60
Institute of Electrical and Electronics Engineers (IEEE)
52 publications, 30.77%
Springer Nature
39 publications, 23.08%
MDPI
31 publications, 18.34%
Elsevier
27 publications, 15.98%
Wiley
4 publications, 2.37%
Taylor & Francis
3 publications, 1.78%
Tech Science Press
2 publications, 1.18%
Hindawi Limited
2 publications, 1.18%
PeerJ
2 publications, 1.18%
Public Library of Science (PLoS)
2 publications, 1.18%
SAGE
1 publication, 0.59%
Association for Computing Machinery (ACM)
1 publication, 0.59%
Walter de Gruyter
1 publication, 0.59%
10
20
30
40
50
60
  • We do not take into account publications without a DOI.
  • Statistics recalculated weekly.

Are you a researcher?

Create a profile to get free access to personal recommendations for colleagues and new articles.
Metrics
169
Share
Cite this
GOST |
Cite this
GOST Copy
Fu Y. et al. A Deep Learning Model for Network Intrusion Detection with Imbalanced Data // Electronics (Switzerland). 2022. Vol. 11. No. 6. p. 898.
GOST all authors (up to 50) Copy
Fu Y., Du Y., Cao Z., Li Q., Xiang W. A Deep Learning Model for Network Intrusion Detection with Imbalanced Data // Electronics (Switzerland). 2022. Vol. 11. No. 6. p. 898.
RIS |
Cite this
RIS Copy
TY - JOUR
DO - 10.3390/electronics11060898
UR - https://doi.org/10.3390/electronics11060898
TI - A Deep Learning Model for Network Intrusion Detection with Imbalanced Data
T2 - Electronics (Switzerland)
AU - Fu, Yanfang
AU - Du, Yishuai
AU - Cao, Zijian
AU - Li, Qiang
AU - Xiang, Wei
PY - 2022
DA - 2022/03/14
PB - MDPI
SP - 898
IS - 6
VL - 11
SN - 2079-9292
ER -
BibTex |
Cite this
BibTex (up to 50 authors) Copy
@article{2022_Fu,
author = {Yanfang Fu and Yishuai Du and Zijian Cao and Qiang Li and Wei Xiang},
title = {A Deep Learning Model for Network Intrusion Detection with Imbalanced Data},
journal = {Electronics (Switzerland)},
year = {2022},
volume = {11},
publisher = {MDPI},
month = {mar},
url = {https://doi.org/10.3390/electronics11060898},
number = {6},
pages = {898},
doi = {10.3390/electronics11060898}
}
MLA
Cite this
MLA Copy
Fu, Yanfang, et al. “A Deep Learning Model for Network Intrusion Detection with Imbalanced Data.” Electronics (Switzerland), vol. 11, no. 6, Mar. 2022, p. 898. https://doi.org/10.3390/electronics11060898.