Network Anomaly Detection Using LSTMBased Autoencoder
Network Anomaly Detection Using LSTMBased Autoencoder
net/publication/346006810
CITATIONS READS
74 1,849
4 authors, including:
Anca D Jurcut
University College Dublin
110 PUBLICATIONS 1,723 CITATIONS
SEE PROFILE
All content following this page was uploaded by Mahmoud Said Elsayed on 18 November 2020.
We illustrate the efficacy of the proposed approach by reporting We also check the efficacy of our proposed method in terms of
different threshold values and represent their impact on precision, computational time. The computational time is very important to
recall, F-score, and accuracy. Table 2 summarizes the performance evaluate a classifier’s performance, especially with the era of big
of different threshold values in terms of evaluation metrics. The best data since massive amount of data is needed for the classification
performance is obtained at a threshold value 0.07. Then the evalua- in real-time. The table 4 represents the training and testing times
tion metrics drop dramatically with the increase in the threshold of the OC-SVM algorithm and hybrid approach. We observe the
value. consumed time by the OC-SVM algorithm is significantly high
However, using the reconstruction error as an anomaly threshold compared to the hybrid approach for both training and testing.
cannot significantly separate the normal and malicious data. The
high degree of similarity in some malicious and legitimate traffic 4.5 Receiver Operating Characteristic (ROC)
makes the reconstruction error rates for both traffic are relatively Further, we use the receiver operating characteristic (ROC) curve
close to each other i.e. are not linearly separated. To overcome this for checking the performance of the proposed approach. The ROC
Algorithm Training Time (s) Testing Time (s) conducted with COST Action 17124 DigForAsp, supported by COST
OC-SVM 479.748 38.355
(European Cooperation in Science and Technology) www.cost.eu".
LSTM-Autoencoder-OC-SVM 147.548 13.546
Table 4: The Training and Testing Time for Both Algorithms REFERENCES
[1] Mohammed Abbass, Ki-Chul Kwon, Nam Kim, Safey A Abdelwahab, Nehad
Haggag, Fatma Ibrahim, Yasser Mahrous, Ahmad Seddik, Ali Khalil, Zeinab
Elsherbeeny, et al. 2020. Anomaly Detection from Medical Signals and Images
curve represents the relation between false positive and true pos- Using Advanced Convolutional Neural Network. (2020).
itive rates. The area under the curve indicates the efficacy of the [2] L. Bontemps, V.L. Cao, J. McDermott, and Nhien-An Le-Khac. 2016. Collec-
binary classifier. The binary classifier gives perfect measures when tive Anomaly Detection Based on Long Short-Term Memory Recurrent Neural
Networks. In: Dang T., Wagner R., Küng J., Thoai N., Takizawa M., Neuhold E.
the area under curve (AUC) is near to the 1. In contrast, the model (eds) Future Data and Security Engineering. FDSE 2016. Lecture Notes in Computer
has the worst measures during AUC near to the 0. The AUC value of Science, vol 10018. Springer, Cham (2016).
[3] Raghavendra Chalapathy and Sanjay Chawla. 2019. Deep learning for anomaly
the presented model are shown in Figure 6. We obtained the value detection: A survey. arXiv preprint arXiv:1901.03407 (2019).
of 0.906, which indicates that our model can successfully separate [4] Varun Chandola, Arindam Banerjee, and Vipin Kumar. 2009. Anomaly detection:
90.6% of positive and negative rates. A survey. ACM computing surveys (CSUR) 41, 3 (2009), 1–58.
[5] Elisa Costante, Davide Fauri, Sandro Etalle, Jerry Den Hartog, and Nicola Zannone.
2016. A hybrid framework for data loss prevention and detection. In 2016 IEEE
Security and Privacy Workshops (SPW). IEEE, 324–333.
[6] Mahmoud Said Elsayed, Nhien-An Le-Khac, Soumyabrata Dev, and Anca Delia
Jurcut. [n. d.]. Ddosnet: A deep-learning model for detecting network attacks. In
21ST IEEE INTERNATIONAL SYMPOSIUM ON A WORLD OF WIRELESS, MOBILE
AND MULTIMEDIA NETWORKS (IEEE WOWMOM 2020), Ireland. IEEE.
[7] Mahmoud Said Elsayed, Nhien-An Le-Khac, Soumyabrata Dev, and Anca Delia
Jurcut. 2019. Machine-Learning Techniques for Detecting Attacks in SDN. In 2019
IEEE 7th International Conference on Computer Science and Network Technology
(ICCSNT). IEEE, 277–281.
[8] Mahmoud Said Elsayed, Nhien-An Le-Khac, Soumyabrata Dev, and Anca Delia
Jurcut. 2020. Detecting Abnormal Traffic in Large-Scale Networks. In 2020 IEEE
International Symposium on Networks, Computers and Communications (ISNCC’20).
IEEE.
[9] Mahmoud Said Elsayed, Nhien-An Le-Khac, and Anca D Jurcut. 2020. InSDN: A
Novel SDN Intrusion Dataset. IEEE Access 8 (2020), 165263–165284.
[10] S. Garg and S. Batra. 2017. A novel ensembled technique for anomaly detection.
International Journal of Communication Systems 30, 11 (2017), e3248.
[11] Felix A Gers, Jürgen Schmidhuber, and Fred Cummins. 1999. Learning to forget:
Continual prediction with LSTM. (1999).
[12] Simon Hawkins, Hongxing He, Graham Williams, and Rohan Baxter. 2002. Outlier
detection using replicator neural networks. In International Conference on Data
Warehousing and Knowledge Discovery. Springer, 170–180.
[13] Geoffrey E Hinton and Ruslan R Salakhutdinov. 2006. Reducing the dimensional-
ity of data with neural networks. science 313, 5786 (2006), 504–507.
Figure 6: Receiver Operating Curve (ROC) of our proposed [14] F. Jiang, Y. Fu, B. B. Gupta, F. Lou, S. Rho, F. Meng, and Z. Tian. 2018. Deep
approach. learning based multi-channel intelligent attack detection for data security. IEEE
transactions on Sustainable Computing (2018).
[15] J. Kim, J. Kim, H. L. T. Thu, and H. Kim. 2016. Long short term memory recurrent
neural network classifier for intrusion detection. In Proc. International Conference
5 CONCLUSION AND FUTURE WORK on Platform Technology and Service (PlatCon). IEEE, 1–5.
[16] F. Kuang, W. Xu, and S. Zhang. 2014. A novel hybrid KPCA and SVM with GA
Network data can often be compromised because of malicious at- model for intrusion detection. Applied Soft Computing 18 (2014), 178–184.
tacks initiated by intruders. A good practice to protect against these [17] Donghwoon Kwon, Hyunjoo Kim, Jinoh Kim, Sang C Suh, Ikkyun Kim, and
Kuinam J Kim. 2019. A survey of deep learning-based network anomaly detection.
attacks is to deploy machine learning based frameworks to detect Cluster Computing (2019), 1–13.
anomalies caused during the attacks. In this paper, we highlighted [18] D. Larson. 2016. Distributed denial of service attacks–holding back the flood.
the existing problems in exiting techniques and proposed solutions Network Security 2016, 3 (2016), 5–7.
[19] M. Latah and L. Toker. 2018. An Efficient Flow-based Multi-level Hybrid Intrusion
to address them. We proposed a deep learning framework based Detection System for Software-Defined Networks. arXiv preprint arXiv:1806.03875
on LSTM-autoencoder and OC-SVM that can model the normal (2018).
[20] Rashmika Nawaratne, Damminda Alahakoon, Daswin De Silva, and Xinghuo Yu.
traffic data efficiently. Our experiments shows that our proposed 2019. Spatiotemporal anomaly detection using deep learning for real-time video
model can efficiently detect the anomalies presented in network surveillance. IEEE Transactions on Industrial Informatics 16, 1 (2019), 393–402.
traffic data. In our future work, we plan to apply the proposed IDS [21] N. Nguyen Thi, V.L. Cao, and Nhien-An Le-Khac. 2017. One-Class Collective
Anomaly Detection Based on LSTM-RNNs. In: Hameurlain A., Küng J., Wagner R.,
framework in one or more realistic network settings to evaluate its Dang T., Thoai N. (eds) Transactions on Large-Scale Data- and Knowledge-Centered
performance in real-world scenarios and test its impact with regard Systems XXXVI. Lecture Notes in Computer Science, vol 10720. Springer, Berlin,
to latency. We also plan to extend the binary classification problem Heidelberg (2017).
[22] M. K. Prasath and B. Perumal. 2019. A meta-heuristic Bayesian network classifi-
into a multi-class classification problem, in order to identify the cation for intrusion detection. International Journal of Network Management 29,
type of network attacks. 3 (2019), e2047.
[23] Saina Ramyar, Abdollah Homaifar, Ali Karimoddini, and Edward Tunstel. 2016.
Identification of anomalies in lane change behavior using one-class SVM. In
6 ACKNOWLEDGMENTS 2016 IEEE International Conference on Systems, Man, and Cybernetics (SMC). IEEE,
004405–004410.
This research is funded by the School of Computer Science, Univer-
sity College Dublin, Ireland. Dr. Anca Jurcut is involved in the work
[24] Mayu Sakurada and Takehisa Yairi. 2014. Anomaly detection using autoencoders [28] T. A. Tang, L. Mhamdi, D. McLernon, S. A. R. Zaidi, and M. Ghogho. 2016. Deep
with nonlinear dimensionality reduction. In Proceedings of the MLSDA 2014 2nd learning approach for network intrusion detection in software defined network-
Workshop on Machine Learning for Sensory Data Analysis. 4–11. ing. In Proc. International Conference on Wireless Networks and Mobile Communi-
[25] Bernhard Schölkopf, Robert C Williamson, Alex J Smola, John Shawe-Taylor, and cations (WINCOM). IEEE, 258–263.
John C Platt. 2000. Support vector method for novelty detection. In Advances in [29] T. A. Tang, L. Mhamdi, D. McLernon, S. A. R. Zaidi, and M. Ghogho. 2018. Deep
neural information processing systems. 582–588. recurrent neural network for intrusion detection in SDN-based networks. In Proc.
[26] N. Sultana, N. Chilamkurti, W. Peng, and R. Alhadad. 2019. Survey on SDN 4th IEEE Conference on Network Softwarization and Workshops (NetSoft). IEEE,
based network intrusion detection system using machine learning approaches. 202–206.
Peer-to-Peer Networking and Applications 12, 2 (2019), 493–501. [30] Pascal Vincent, Hugo Larochelle, Isabelle Lajoie, Yoshua Bengio, and Pierre-
[27] T Tang, L Mhamdi, S Zaidi, F El-moussa, D McLernon, and M Ghogho. 2019. Antoine Manzagol. 2010. Stacked denoising autoencoders: Learning useful repre-
A Deep Learning Approach Combining Auto-encoder with One-class SVM for sentations in a deep network with a local denoising criterion. Journal of machine
DDoS Attack Detection in SDNs. In Proceedings of the International Conference learning research 11, Dec (2010), 3371–3408.
on Communications and Networking. IEEE. [31] C. Yin, Y. Zhu, J. Fei, and X. He. 2017. A deep learning approach for intrusion
detection using recurrent neural networks. IEEE Access 5 (2017), 21954–21961.
[32] Junyi Zou, Jinliang Zhang, and Ping Jiang. 2019. Credit Card Fraud Detection
Using Autoencoder Neural Network. arXiv preprint arXiv:1908.11553 (2019).