Network Anomaly Detection With Temporal Convolutional Network and U-Net Model
نویسندگان
چکیده
Anomaly detection in network traffic is one of the key techniques to ensure security future networks. Today, importance this topic even higher, since growing and there a need have smart algorithms, which can automatically adapt new conditions, detect threats recognize type possible attack. Nowadays, are lot different approaches, some them reached relatively sufficient accuracy. However, majority works being tested on old datasets, do not reflect current conditions it leads overfitted results. This caused by high redundancy data because they fail performance latest methods real-world anomaly applications. In work, we applied couple based convolutional neural networks: U-Net Temporal for attack classification. We trained evaluated dataset KDD99 modern large-scale CSE-CIC-IDS2018. According results, with LSTM has achieved accuracy 92% 97% CSE-CIC-IDS2018 respectively, model 93% 94% respectively. Additionally, utilized focal loss function Long Short-Term Memory model, positive effect class imbalance time-series data. showed, that combination give higher compared other architectures work also proved, easily overfit during training achieve good results testing set, but at same time, these so successful more complex actual
منابع مشابه
Recurrent Residual Convolutional Neural Network based on U-Net (R2U-Net) for Medical Image Segmentation
Deep learning (DL) based semantic segmentation methods have been providing state-of-the-art performance in the last few years. More specifically, these techniques have been successfully applied to medical image classification, segmentation, and detection tasks. One deep learning technique, U-Net, has become one of the most popular for these applications. In this paper, we propose a Recurrent Co...
متن کاملDouble-Star Detection Using Convolutional Neural Network in Atmospheric Turbulence
In this paper, we investigate the usage of machine learning in the detection and recognition of double stars. To do this, numerous images including one star and double stars are simulated. Then, 100 terms of Zernike expansion with random coefficients are considered as aberrations to impose on the aforementioned images. Also, a telescope with a specific aperture is simulated. In this work, two k...
متن کاملModel-Based Anomaly Detection on Network Services
The key hypothesis to anomaly detection assumes anomalous behaviors are suspicious from a normality point of view. This work provides a new perspective, network service, to model network activity for detecting anomalies. Past models often suffer from lacking of model normality verification, only including particular behavior aspect, and focusing on individual model. To confront them, we propose...
متن کاملNetwork Anomaly Detection Using Unsupervised Model
Most existing network intrusion detection systems use signature-based methods which depend on labeled training data. This training data is usually expensive to produce due to cost of laboratory set up, experienced or knowledge person and non availability of ready software tool. Above all, these methods have difficulty in detecting new or unknown types of attacks. Using unsupervised anomaly dete...
متن کاملNetwork Traffic Anomaly Detection
This paper presents a tutorial for network anomaly detection, focusing on non-signature-based approaches. Network traffic anomalies are unusual and significant changes in the traffic of a network. Networks play an important role in today’s social and economic infrastructures. The security of the network becomes crucial, and network traffic anomaly detection constitutes an important part of netw...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Access
سال: 2021
ISSN: ['2169-3536']
DOI: https://doi.org/10.1109/access.2021.3121998