Using Convolutional Neural Networks to Network Intrusion Detection for Cyber Threats
Title | Using Convolutional Neural Networks to Network Intrusion Detection for Cyber Threats |
Publication Type | Conference Paper |
Year of Publication | 2018 |
Authors | Lin, W., Lin, H., Wang, P., Wu, B., Tsai, J. |
Conference Name | 2018 IEEE International Conference on Applied System Invention (ICASI) |
ISBN Number | 978-1-5386-4342-6 |
Keywords | Behavior features, composability, Conferences, convolution, convolutional neural networks, cyber threats, Deep Learning, feature extraction, feedforward neural nets, Intrusion detection, learning (artificial intelligence), LeNet-5, Metrics, network behavioural features, network intrusion detection, network threat classification, pattern classification, privacy, pubcrawl, Resiliency, security of data, Support vector machines, threat detection classification, threat vectors, Training |
Abstract | In practice, Defenders need a more efficient network detection approach which has the advantages of quick-responding learning capability of new network behavioural features for network intrusion detection purpose. In many applications the capability of Deep Learning techniques has been confirmed to outperform classic approaches. Accordingly, this study focused on network intrusion detection using convolutional neural networks (CNNs) based on LeNet-5 to classify the network threats. The experiment results show that the prediction accuracy of intrusion detection goes up to 99.65% with samples more than 10,000. The overall accuracy rate is 97.53%. |
URL | https://ieeexplore.ieee.org/document/8394474 |
DOI | 10.1109/ICASI.2018.8394474 |
Citation Key | lin_using_2018 |
- Metrics
- Training
- threat vectors
- threat detection classification
- Support vector machines
- security of data
- Resiliency
- pubcrawl
- privacy
- pattern classification
- network threat classification
- network intrusion detection
- network behavioural features
- Behavior features
- LeNet-5
- learning (artificial intelligence)
- Intrusion Detection
- feedforward neural nets
- feature extraction
- deep learning
- cyber threats
- convolutional neural networks
- convolution
- Conferences
- composability