HCRNNIDS: Hybrid Convolutional Recurrent Neural Network-Based Network Intrusion Detection System
Abstract
:1. Introduction
- We developed the HCRNNIDS, which combines both deep and shallow models to reduce analytical overheads and maximize benefits. The proposed HCRNNIDS focuses on identifying whether network traffic behavior is normal or malicious because attacks can be classified into the corresponding intrusion class.
- We address the problem of class imbalance that is common in ID data.
- We equate the proposed method with popular ML approaches. The empirical outcomes express that the HCRNNIDS very appropriate for attack detection and can accurately identify the misuses in 97.75% of incidents with 10-fold cross-validation.
- The output of the hybrid convolutional recurrent neural network-based network intrusion detection system is higher than that of traditional classification techniques when conducting experiments on the well-known and contemporary real-life CSE-CIC-IDS2018 dataset; it improves the accuracy of ID, thus providing a novel research method for ID.
2. Related Work
3. Proposed Approach
3.1. Overview of the HCRNNIDS
3.2. Datasets
Explanation of the ID Data
- Brute-force DOS attacks;
- DDOS attacks;
- Brute-force SSH;
- Infiltration;
- Heartbleed;
- Web attacks; and
- Botnet.
3.3. Experimental Details
4. Experimental Results
4.1. Evaluation Metrics
- True Positive (TP): this indicates that the model is accurate and normal and predicts positive outcomes.
- False negative (FN) is characterized by incorrect prediction. It recognizes instances that are malicious with certainty as natural, and the model predicts negative outcomes incorrectly.
- False positive (FP): the model predicts a positive outcome when, in fact, the number of observed attacks is normal.
- True negative (TN): denotes instances that are properly monitored as an attack and predicts negative results. The overview of the overview of the confusion matrix is given in Table 4.
4.2. Evaluation of the Proposed HCRNNIDS
4.3. Overall Evaluation
5. Conclusions and Future Work
Supplementary Materials
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Acknowledgments
Conflicts of Interest
Abbreviations
ML | Machine Learning |
DL | Deep learning |
HCRNNIDS | Hybrid Convolutional Recurrent Neural Network Based Network Intrusion Detection System |
CNN | Convolutional neural network |
RNN | Recurrent neural network |
CSE-CIC | A collaborative project between the Communications Security Establishment (CSE) & the Canadian Institute for Cybersecurity (CIC) |
ICT | Information and communication technology |
ID | Intrusion Detection |
IDS | Intrusion Detection System |
DR | Detection Rate |
FAR | False Alarm Rate |
CV | Computer vision |
NLP | Natural Language Processing |
FPR | False-positive rate |
NID | Network Intrusion Detection |
K-NN | K nearest neighbors |
SVM | Support vector machine |
ANN | Artificial neural network |
RF | Random Forest |
DN | Deep network’s |
LSTM | Long Short-Term-Memory |
AE | Auto-encoder |
FL | Feature learning |
RBMs | Restricted Boltzmann Machines |
LR | Logistic Regression |
XGB | Extreme Gradient Boosting |
DT | Decision Tree |
AIDS | Anomaly intrusion detection system |
SMOTE | Synthetic Minority Oversampling Technique |
AWS platform | Amazon Web Services |
DoS | Denial of Service |
DDoS | Distributed Denial of Service |
FN | False Negative |
FP | False Positive |
TP | True Positive |
TN | True negative |
AB | Anomaly-based |
SB | Signature-based |
References
- Anderson, J.P. Technical Report. In Computer Security Threat Monitoring and Surveillance; James P. Anderson Company: Washington, DC, USA, 1980. [Google Scholar]
- Asharf, J.; Moustafa, N.; Khurshid, H.; Debie, E.; Haider, W.; Wahab, A. A Review of Intrusion Detection Systems Using Machine and Deep Learning in Internet of Things: Challenges, Solutions and Future Directions. Electronics 2020, 9, 1177. [Google Scholar] [CrossRef]
- Xu, C.; Shen, J.; Du, X.; Zhang, F. An Intrusion Detection System Using a Deep Neural Network with Gated Recurrent Units. IEEE Access 2018, 6, 48697–48707. [Google Scholar] [CrossRef]
- Vinayakumar, R.; Soman, K.P.; Poornachandran, P. Applying convolutional neural network for network intrusion detection. In Proceedings of the 2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI), Udupi, India, 13–16 September 2017; Institute of Electrical and Electronics Engineers (IEEE): Piscataway, NJ, USA, 2017; pp. 1222–1228. [Google Scholar]
- Khan, M.A.; Kim, Y. Deep Learning-Based Hybrid Intelligent Intrusion Detection System. Comput. Mater. Contin. 2021, 68, 671–687. [Google Scholar] [CrossRef]
- Devi, B.T.; Thirumaleshwari, S.S.; Jabbar, M.A. An Appraisal over Intrusion Detection Systems in Cloud Computing Security Attacks. In Proceedings of the 2020 2nd International Conference on Innovative Mechanisms for Industry Applications (ICIMIA), Bangalore, India, 5–7 March 2020; Institute of Electrical and Electronics Engineers (IEEE): Piscataway, NJ, USA, 2020; pp. 722–727. [Google Scholar]
- Thaseen, I.S.; Poorva, B.; Ushasree, P.S. Network Intrusion Detection using Machine Learning Techniques. In Proceedings of the 2020 International Conference on Emerging Trends in Information Technology and Engineering (ic-ETITE), Tamil Nadu, India, 24–25 February 2020; Institute of Electrical and Electronics Engineers (IEEE): Piscataway, NJ, USA, 2020; pp. 1–7. [Google Scholar]
- Yin, C.; Zhu, Y.; Fei, J.; He, X. A Deep Learning Approach for Intrusion Detection Using Recurrent Neural Networks. IEEE Access 2017, 5, 21954–21961. [Google Scholar] [CrossRef]
- Yong, B.; Wei, W.; Li, K.C.; Shen, J.; Zhou, Q.; Wozniak, M.; Połap, D.; Damaševičius, R. Ensemble machine learning approaches for web shell detection in Internet of things environments. In Transactions on Emerging Telecommunications Technologies; John Wiley & Sons, Ltd.: New Jersey, USA, 2020. [Google Scholar]
- Folino, F.; Folino, G.; Guarascio, M.; Pisani, F.; Pontieri, L. On learning effective ensembles of deep neural networks for intrusion detection. Inf. Fusion 2021, 72, 48–69. [Google Scholar] [CrossRef]
- Tama, B.A.; Lim, S. Ensemble learning for intrusion detection systems: A systematic mapping study and cross-benchmark evaluation. Comput. Sci. Rev. 2021, 39, 100357. [Google Scholar] [CrossRef]
- Kim, K.; Aminanto, M.E.; Tanuwidjaja, H.C. Network Intrusion Detection Using Deep Learning: A Feature Learning Approach; Springer: Berlin/Heidelberg, Germany, 2018. [Google Scholar]
- Avci, O.; Abdeljaber, O.; Kiranyaz, S.; Hussein, M.; Gabbouj, M.; Inman, D.J. A review of vibration-based damage detection in civil structures: From traditional methods to Machine Learning and Deep Learning applications. Mech. Syst. Signal Process. 2021, 147, 107077. [Google Scholar] [CrossRef]
- Kumar, K.P.M.; Saravanan, M.; Thenmozhi, M.; Vijayakumar, K. Intrusion detection system based on GA-fuzzy classifier for detecting malicious attacks. Concurr. Comput. Pr. Exp. 2021, 33, 5242. [Google Scholar] [CrossRef]
- Zhang, H.; Huang, L.; Wu, C.Q.; Li, Z. An effective convolutional neural network based on SMOTE and Gaussian mixture model for intrusion detection in imbalanced dataset. Comput. Netw. 2020, 177, 107315. [Google Scholar] [CrossRef]
- Binbusayyis, A.; Vaiyapuri, T. Identifying and Benchmarking Key Features for Cyber Intrusion Detection: An Ensemble Approach. IEEE Access 2019, 7, 106495–106513. [Google Scholar] [CrossRef]
- Bhavani, T.T.; Rao, M.K.; Reddy, A.M. Network Intrusion Detection System Using Random Forest and Decision Tree Machine Learning Techniques. In Proceedings of the Distributed Computing and Artificial Intelligence, 13th International Conference, Sevilla, Spain, 1–3 June 2016; Springer: Berlin/Heidelberg, Germany, 2019; pp. 637–643. [Google Scholar]
- Karatas, G.; Demir, O.; Sahingoz, O.K. Increasing the Performance of Machine Learning-Based IDSs on an Imbalanced and Up-to-Date Dataset. IEEE Access 2020, 8, 32150–32162. [Google Scholar] [CrossRef]
- Xu, H.; Przystupa, K.; Fang, C.; Marciniak, A.; Kochan, O.; Beshley, M. A Combination Strategy of Feature Selection Based on an Integrated Optimization Algorithm and Weighted K-Nearest Neighbor to Improve the Performance of Network Intrusion Detection. Electronics 2020, 9, 1206. [Google Scholar] [CrossRef]
- Bhati, B.S.; Rai, C.S. Analysis of Support Vector Machine-based Intrusion Detection Techniques. Arab. J. Sci. Eng. 2019, 45, 2371–2383. [Google Scholar] [CrossRef]
- Thaseen, I.S.; Banu, J.S.; Lavanya, K.; Ghalib, M.R.; Abhishek, K. An integrated intrusion detection system using correlation-based attribute selection and artificial neural network. Trans. Emerg. Telecommun. Technol. 2021, 32, 4014. [Google Scholar] [CrossRef]
- Waskle, S.; Parashar, L.; Singh, U. Intrusion Detection System Using PCA with Random Forest Approach. In Proceedings of the 2020 International Conference on Electronics and Sustainable Communication Systems (ICESC), Coimbatore, India, 2–4 July 2020; Institute of Electrical and Electronics Engineers (IEEE): Piscataway, NJ, USA, 2020; pp. 803–808. [Google Scholar]
- Alqahtani, H.; Sarker, I.H.; Kalim, A.; Hossain, S.M.M.; Ikhlaq, S.; Hossain, S. Cyber Intrusion Detection Using Machine Learning Classification Techniques. In Communications in Computer and Information Science; Springer Science and Business Media LLC: Berlin/Heidelberg, Germany, 2020; Volume 1235, pp. 121–131. [Google Scholar]
- Ahmad, Z.; Khan, A.S.; Shiang, C.W.; Abdullah, J.; Ahmad, F. Network intrusion detection system: A systematic study of machine learning and deep learning approaches. Trans. Emerg. Telecommun. Technol. 2021, 32, 4150. [Google Scholar] [CrossRef]
- Girdler, T.; Vassilakis, V.G. Implementing an intrusion detection and prevention system using Software-Defined Networking: Defending against ARP spoofing attacks and Blacklisted MAC Addresses. Comput. Electr. Eng. 2021, 90, 106990. [Google Scholar] [CrossRef]
- Aldweesh, A.; Derhab, A.; Emam, A.Z. Deep learning approaches for anomaly-based intrusion detection systems: A survey, taxonomy, and open issues. Knowl. Based Syst. 2020, 189, 105124. [Google Scholar] [CrossRef]
- Jihyun, K.; Jaehyun, K.; Huong, L.T.T.; Howon, K. Long short-term memory recurrent neural network classifier for intrusion detection. In Proceedings of the 2016 International Conference on Platform Technology and Service (PlatCon), Jeju, Korea, 15–17 February 2016; IEEE: Piscataway, NJ, USA, 2016; pp. 1–5. [Google Scholar]
- Vinayakumar, R.; Soman, K.P.; Poornachandran, P. Deep android malware detection and classification. In Proceedings of the 2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI), Udupi, India, 13–16 September 2017; Institute of Electrical and Electronics Engineers (IEEE): Piscataway, NJ, USA, 2017; pp. 1677–1683. [Google Scholar]
- Adebowale, M.A.; Lwin, K.T.; Hossain, M.A. Intelligent phishing detection scheme using deep learning algorithms. J. Enterp. Inf. Manag. 2020, 1–20. [Google Scholar] [CrossRef]
- Tran, D.; Mac, H.; Tong, V.; Tran, H.A.; Nguyen, L.G. A LSTM based framework for handling multiclass imbalance in DGA botnet detection. Neurocomputing 2018, 275, 2401–2413. [Google Scholar] [CrossRef]
- Oliveira, N.; Praça, I.; Maia, E.; Sousa, O. Intelligent Cyber Attack Detection and Classification for Network-Based Intrusion Detection Systems. Appl. Sci. 2021, 11, 1674. [Google Scholar] [CrossRef]
- Ahmad, R.; Alsmadi, I. Machine learning approaches to IoT security: A systematic literature review. Internet Things 2021, 14, 100365. [Google Scholar] [CrossRef]
- Makuvaza, A.; Jat, D.S.; Gamundani, A.M. Deep Neural Network (DNN) Solution for Real-time Detection of Distributed Denial of Service (DDoS) Attacks in Software Defined Networks (SDNs). SN Comput. Sci. 2021, 2, 1–10. [Google Scholar] [CrossRef]
- Millar, S.; McLaughlin, N.; del Rincon, J.M.; Miller, P. Multi-view deep learning for zero-day Android malware detection. J. Inf. Secur. Appl. 2021, 58, 102718. [Google Scholar] [CrossRef]
- Guijuan, Z.; Yang, L.; Xiaoning, J. A survey of autoencoder-based recommender systems. Front. Comput Sci. 2020, 14, 430–450. [Google Scholar]
- Liu, J.; Song, K.; Feng, M.; Yan, Y.; Tu, Z.; Zhu, L. Semi-supervised anomaly detection with dual prototypes autoencoder for industrial surface inspection. Opt. Lasers Eng. 2021, 136, 106324. [Google Scholar] [CrossRef]
- Yousefi-Azar, M.; Varadharajan, V.; Hamey, L.; Tupakula, U. Autoencoder-based feature learning for cybersecurity applications. In Proceedings of the 2017 International Joint Conference on Neural Networks (IJCNN), Anchorage, AK, USA, 14–19 May 2017; IEEE: Piscataway, NJ, USA, 2017; pp. 3854–3861. [Google Scholar]
- Khan, M.A.; Kim, J. Toward Developing Efficient Conv-AE-Based Intrusion Detection System Using Heterogeneous Dataset. Electronics 2020, 9, 1771. [Google Scholar] [CrossRef]
- Yadigar, I.; Fargana, A. Deep learning method for denial-of-service attack detection based on restricted Boltzmann machine. Big Data 2018, 6, 159–169. [Google Scholar]
- Tan, Z.; Jamdagni, A.; He, X.; Nanda, P.; Liu, R.P.; Hu, J. Detection of Denial-of-Service Attacks Based on Computer Vision Techniques. IEEE Trans. Comput. 2014, 64, 2519–2533. [Google Scholar] [CrossRef]
- Ingre, B.; Yadav, A. Performance analysis of NSL-KDD dataset using ANN. In Proceedings of the 2015 International Conference on Signal Processing and Communication Engineering Systems, Guntur, India, 2–3 January 2015; pp. 92–96. [Google Scholar]
- Casas, P.; Mazel, J.; Owezarski, P. Unsupervised Network Intrusion Detection Systems: Detecting the Unknown without Knowledge. Comput. Commun. 2012, 35, 772–783. [Google Scholar] [CrossRef] [Green Version]
- Ludwig, S.A. Intrusion detection of multiple attack classes using a deep neural net ensemble. In Proceedings of the 2017 IEEE Symposium Series on Computational Intelligence (SSCI), Honolulu, HI, USA, 27 November–1 December 2017; Institute of Electrical and Electronics Engineers (IEEE): Piscataway, NJ, USA, 2017; pp. 1–7. [Google Scholar]
- Shone, N.; Ngoc, T.N.; Phai, V.D.; Shi, Q. A Deep Learning Approach to Network Intrusion Detection. IEEE Trans. Emerg. Top. Comput. Intell. 2018, 2, 41–50. [Google Scholar] [CrossRef] [Green Version]
- Kakavand, M.; Mustapha, N.; Mustapha, A.; Abdullah, M.T. Effective Dimensionality Reduction of Payload-Based Anomaly Detection in TMAD Model for HTTP Payload. KSII Trans. Internet Inf. Syst. 2016, 10, 3884–3910. [Google Scholar] [CrossRef] [Green Version]
- Yu, Y.; Long, J.; Cai, Z. Network Intrusion Detection through Stacking Dilated Convolutional Autoencoders. Secur. Commun. Netw. 2017, 2017, 1–10. [Google Scholar] [CrossRef]
- Kumar, G.; Kumar, K. Design of an Evolutionary Approach for Intrusion Detection. Sci. World J. 2013, 2013, 1–14. [Google Scholar] [CrossRef] [PubMed] [Green Version]
- Akyol, A.; Hacibeyoğlu, M.; Karlik, B. Design of Multilevel Hybrid Classifier with Variant Feature Sets for Intrusion Detection System. IEICE Trans. Inf. Syst. 2016, E99, 1810–1821. [Google Scholar] [CrossRef] [Green Version]
- Almomani, O. A Feature Selection Model for Network Intrusion Detection System Based on PSO, GWO, FFA and GA Algorithms. Symmetry 2020, 12, 1046. [Google Scholar] [CrossRef]
- Monshizadeh, M.; Khatri, V.; Atli, B.G.; Kantola, R.; Yan, Z. Performance Evaluation of a Combined Anomaly Detection Platform. IEEE Access 2019, 7, 100964–100978. [Google Scholar] [CrossRef]
- Wang, W.; Sheng, Y.; Wang, J.; Zeng, X.; Ye, X.; Huang, Y.; Zhu, M. HAST-IDS: Learning Hierarchical Spatial-Temporal Features Using Deep Neural Networks to Improve Intrusion Detection. IEEE Access 2017, 6, 1792–1806. [Google Scholar] [CrossRef]
- Bhati, N.S.; Khari, M. A Survey on Hybrid Intrusion Detection Techniques. In Advances in Human Factors, Business Management, Training and Education; Springer: Berlin/Heidelberg, Germany, 2021; pp. 815–825. [Google Scholar]
- Ma, C.; Du, X.; Cao, L. Analysis of Multi-Types of Flow Features Based on Hybrid Neural Network for Improving Network Anomaly Detection. IEEE Access 2019, 7, 148363–148380. [Google Scholar] [CrossRef]
- Zeng, Y.; Gu, H.; Wei, W.; Guo, Y. Deep-Full-Range: A Deep Learning Based Network Encrypted Traffic Classification and Intrusion Detection Framework. IEEE Access 2019, 7, 45182–45190. [Google Scholar] [CrossRef]
- Hosseini, S.; Zade, B.M.H. New hybrid method for attack detection using combination of evolutionary algorithms, SVM, and ANN. Comput. Netw. 2020, 173, 107168. [Google Scholar] [CrossRef]
- Erhan, D.; Anarım, E. Boğaziçi University distributed denial of service dataset. Data Brief 2020, 32, 106187. [Google Scholar] [CrossRef] [PubMed]
- Damasevicius, R.; Venckauskas, A.; Grigaliunas, S.; Toldinas, J.; Morkevicius, N.; Aleliunas, T.; Smuikys, P. LITNET-2020: An Annotated Real-World Network Flow Dataset for Network Intrusion Detection. Electronics 2020, 9, 800. [Google Scholar] [CrossRef]
- Gogoi, P.; Bhuyan, M.H.; Bhattacharyya, D.K.; Kalita, J.K. Packet and flow-based network intrusion dataset. In International Conference on Contemporary Computing; Springer: Berlin/Heidelberg, Germany, 2012; pp. 322–334. [Google Scholar]
- Bedi, P.; Gupta, N.; Jindal, V. I-SiamIDS: An improved Siam-IDS for handling class imbalance in network-based intrusion detection systems. Appl. Intell. 2021, 51, 1133–1151. [Google Scholar] [CrossRef]
- Thabtah, F.; Hammoud, S.; Kamalov, F.; Gonsalves, A. Data imbalance in classification: Experimental evaluation. Inf. Sci. 2020, 513, 429–441. [Google Scholar] [CrossRef]
- A Collaborative Project between the Communications Security Establishment (CSE) & the Canadian Institute for Cybersecurity (CIC). Available online: https://www.unb.ca/cic/datasets/ids-2018.html (accessed on 31 March 2021).
- Drhooge, L.; Wauters, T.; Volckaert, B.; de Turck, F. Classification Hardness for Supervised Learners on 20 Years of Intrusion Detection Data. IEEE Access 2019, 7, 167455–167469. [Google Scholar] [CrossRef]
- Jaganathan, V.; Cherurveettil, P.; Sivashanmugam, P.M. Using a Prediction Model to Manage Cyber Security Threats. Sci. World J. 2015, 2015, 1–5. [Google Scholar] [CrossRef] [PubMed] [Green Version]
- Wei, P.; Li, Y.; Zhang, Z.; Hu, T.; Li, Z.; Liu, D. An Optimization Method for Intrusion Detection Classification Model Based on Deep Belief Network. IEEE Access 2019, 7, 87593–87605. [Google Scholar] [CrossRef]
- Farhan, R.I.; Abeer, T.M.; Nidaa, F.H. Optimized Deep Learning with Binary PSO for Intrusion Detection on CSE-CIC-IDS2018 Dataset. J. Al Qadisiyah Comput. Sci. Math. 2020, 12, 16. [Google Scholar]
- Farhan, R.I.; Abeer, T.M.; Nidaa, F.H. Performance Analysis of Flow-Based Attacks Detection on CSE-CIC-IDS2018 Dataset Using Deep Learning. Indones. J. Electr. Eng. Comput. Sci. 2020, 20, 16–27. [Google Scholar] [CrossRef]
- Lin, P.; Ye, K.; Xu, C.-Z. Dynamic Network Anomaly Detection System by Using Deep Learning Techniques. In Lecture Notes in Computer Science; Springer Science and Business Media LLC: Cham, Switzerland, 2019; pp. 161–176. [Google Scholar]
- Zhou, Q.; Pezaros, D. Evaluation of Machine Learning Classifiers for Zero-Day Intrusion Detection—An Analysis on CIC-AWS-2018 dataset. arXiv 2019, arXiv:1905.03685v1, 1–18. [Google Scholar]
- Kim, J.; Shin, Y.; Choi, E. An Intrusion Detection Model based on a Convolutional Neural Network. J. Multimed. Inf. Syst. 2019, 6, 165–172. [Google Scholar] [CrossRef]
Reference | Dataset | ID Technique | Performance |
---|---|---|---|
Tanet et al. [40] | KDD’99 | MCA + EMD | 99.95% |
Tanet et al. [40] | ISCX 2012 | MCA + EMD | 90.12% |
B. Inger et al. [41] | NSL-KDD | ANN | 99.67% |
Casas et al. [42] | KDD’99 | Clustering-based IDS | 92.0% |
Ludwig et al. [43] | NSL-KDD | Deep learning ensemble | 92.49% |
Shone et al. [44] | KDD’99 | Non-symmetric deep AE | 97.90% |
Kakavand et al. [45] | ISCX 2012 | Ada boost+ DT | 97.2% |
Yu et al. [46] | CTU-UNB | Stacking dilated CAE | 87.14% |
Kumar et al. [47] | ISCX 2012 | PCA | 94.05% |
Akyol et al. [48] | ISCX 2012 | MHCVF | 68.2% |
Omar et al. [49] | ISCX 2012 | HADM-IDS | 87.2% |
Monshizadeh et al. [50] | UNSW-N15 | SVM, J48 | 89.01% |
Wang et al. [51] | ISCX 2012 | HAST-IDS | 96.9 |
Features | Explanation |
---|---|
Fl-dur | Flow interval |
Fl-iat-max | Maximum time between two flows |
Tot-fw-pk | Aggregate data packets in a forward way |
Tot-l-fw-pkt | Overall size of the packet in an up way |
Tot-bw-pk | Overall data packets in a back way |
Fw-pkt-l-min | The lowest volume of the packet in a further way |
Fw-pkt-l-avg | The average amount of data in the packet in an up way |
Fw-iat-min | Smallest time between two packets delivered in an onward way |
Bw-iat-tot | Overall time between two packets delivered in a back way |
Bw-iat-avg | Mean period between two packets delivered in a back way |
Bw-iat-std | Average period between two packets forwarded in a back way |
Bw-iat-max | Highest period between two packets forwarded in a back way |
Bw-iat-min | Least time between two packets delivered in a forward way |
Bw-iat-min | Lowest time between two packets forwarded in a reverse way |
Dataset | Normal | DDoS | Dos | Botnet | Brute Force | Infiltration | Web Attacks | Port Scan |
---|---|---|---|---|---|---|---|---|
CICIDS-2017 | 1,743,179 | 128,027 | 252,661 | 1966 | 13,835 | 36 | 2180 | 158,930 |
CSE-CICIDS2018 | 6,112,151 | 687,742 | 654,301 | 286,191 | 380,949 | 161,934 | 928 | - |
Predicated Value | |||
---|---|---|---|
Actual value | Normal | TP | FN |
Anomaly | FP | TN |
Classifier | Precision | Recall | F1-Score | DR | FAR |
---|---|---|---|---|---|
LR | 0.781 | 0.801 | 0.791 | 0.80 | 11.50 |
XGB | 0.845 | 0.834 | 0.839 | 0.83 | 9.13 |
DT | 0.8733 | 0.885 | 0.879 | 0.88 | 7.8 |
HCRNN | 0.9633 | 0.9712 | 0.976 | 0.97 | 2.5 |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2021 by the author. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Khan, M.A. HCRNNIDS: Hybrid Convolutional Recurrent Neural Network-Based Network Intrusion Detection System. Processes 2021, 9, 834. https://doi.org/10.3390/pr9050834
Khan MA. HCRNNIDS: Hybrid Convolutional Recurrent Neural Network-Based Network Intrusion Detection System. Processes. 2021; 9(5):834. https://doi.org/10.3390/pr9050834
Chicago/Turabian StyleKhan, Muhammad Ashfaq. 2021. "HCRNNIDS: Hybrid Convolutional Recurrent Neural Network-Based Network Intrusion Detection System" Processes 9, no. 5: 834. https://doi.org/10.3390/pr9050834
APA StyleKhan, M. A. (2021). HCRNNIDS: Hybrid Convolutional Recurrent Neural Network-Based Network Intrusion Detection System. Processes, 9(5), 834. https://doi.org/10.3390/pr9050834