2,874
Views
9
CrossRef citations to date
0
Altmetric
Articles

A Hybrid parallel deep learning model for efficient intrusion detection based on metric learning

ORCID Icon, , , &
Pages 551-577 | Received 05 Aug 2021, Accepted 26 Dec 2021, Published online: 16 Jan 2022

References

  • Abdulhammed, R., Musafer, H., Alessa, A., Faezipour, M., & Abuzneid, A. (2019). Features dimensionality reduction approaches for machine learning based network intrusion detection. Electronics, 8(3), 322. https://doi.org/10.3390/electronics8030322
  • Alrawashdeh, K., & Purdy, C. (2016, December). Toward an online anomaly intrusion detection system based on deep learning. In 2016 15th IEEE International Conference on Machine Learning and Applications (ICMLA) (pp. 195–200).IEEE.
  • Anderson, B., & McGrew, D. (2016, October). Identifying encrypted malware traffic with contextual flow data. In Proceedings of the 2016 ACM Workshop on Artificial Intelligence and Security (pp. 35–46).Association for Computing Machinery.
  • Bi, K., Han, D., Zhang, G., Li, K. C., & Castiglione, A. (2020). K maximum probability attack paths generation algorithm for target nodes in networked systems. International Journal of Information Security, 20(4), 535–551. https://doi.org/10.1007/s10207-020-00517-4
  • Chadza, T., Kyriakopoulos, K. G., & Lambotharan, S. (2020). Analysis of hidden Markov model learning algorithms for the detection and prediction of multi-stage network attacks. Future Generation Computer Systems, 108(1), 636–649. https://doi.org/10.1016/j.future.2020.03.014.
  • Cisco (2020). Cisco annual internet report (2018–2023) white paper. https://www.cisco.com/c/en/us/solutions/collateral/service-provider/visual-networking-index-vni/white-paper-c11-741490.html.
  • Co, J. P. A. (1980). Computer security threat monitoring and surveillance. National Institute of Standards and Technology. ISBN 0-8493-7375-1 https://books.google.com.tw/books?id=mluHHAAACAAJ.
  • Cui, M., Han, D., Wang, J., Li, K. C., & Chang, C. C. (2020). ARFV: an efficient shared data auditing scheme supporting revocation for fog-assisted vehicular ad-hoc networks. IEEE Transactions on Vehicular Technology, 69(12), 15815–15827. https://doi.org/10.1109/TVT.25
  • Deng, J., Guo, J., Xue, N., & Zafeiriou, S. (2019, June). Arcface: Additive angular margin loss for deep face recognition. In Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition (pp. 4690–4699).IEEE.
  • Fuqun, Z. (2015). Detection method of LSSVM network intrusion based on hybrid kernel function. Modern Electronics Technique, 38(21), 027. https://doi.org/10.16652/j.issn.1004-373x.2015.21.026
  • Han, D., Pan, N., & Li, K. C. (2020). A traceable and revocable ciphertext-policy attribute-based encryption scheme based on privacy protection. IEEE Transactions on Dependable and Secure Computing, 1(99), 1–1. https://doi.org/10.1109/TDSC.2020.2977646
  • He, D., Zhang, D., Li, Y., Liang, W., & Hsieh, M. Y. (2021). An efficient and DoS-resilient name lookup for NDN interest forwarding. Connection Science, 33(3), 1–18. https://doi.org/10.1080/09540091.2021.1875988
  • He, J., Han, D., & Li, K. C. (2020). On one-time cookies protocol based on one-time password. Soft Computing, 24(8), 5657–5670. https://doi.org/10.1007/s00500-019-04138-5
  • Hochreiter, S., & Schmidhuber, J. (1997). Long short-term memory. Neural Computation, 9(8), 1735–1780. https://doi.org/10.1162/neco.1997.9.8.1735
  • Jiang, K., Wang, W., Wang, A., & Wu, H. (2020). Network intrusion detection combined hybrid sampling with deep hierarchical network. IEEE Access, 8(1), 32464–32476. https://doi.org/10.1109/Access.6287639.
  • Li, A., Tian, G., Miao, M., & Gong, J. (2021). Blockchain-based cross-user data shared auditing. Connection Science, 1–21. https://doi.org/10.1080/09540091.2021.1956879
  • Li, D., Han, D., Weng, T. H., Zheng, Z., Li, H., Liu, H., Castiglione, A., & Li, K. C. (2021). Blockchain for federated learning toward secure distributed machine learning systems: A systemic survey. Soft Computing, 1–18. https://doi.org/10.1007/s00500-021-06496-5
  • Li, D., Han, D., Zhang, X., & Zhang, L. (2019). Panoramic image mosaic technology based on SIFT algorithm in power monitoring. In 2019 6th International Conference on Systems and Informatics (ICSAI) (pp. 1329–1333).IEEE.
  • Li, D., Han, D., Zheng, Z., Weng, T. H., Li, H., Liu, H., Castiglione, A., & K. C. Li (2022). MOOCsChain: A blockchain-based secure storage and sharing scheme for MOOCs learning. Computer Standards & Interfaces, 81, 103597. https://doi.org/10.1016/j.csi.2021.103597
  • Li, M., Han, D., Li, D., Liu, H., & Chang, C. C. (2021). MFVT: An anomaly traffic detection method merging feature fusion network and vision transformer architecture.
  • Li, M., Han, D., Yin, X., Liu, H., & Li, D. (2021). Design and implementation of an anomaly network traffic detection model integrating temporal and spatial features. Security and Communication Networks, 2021, 1–15. https://doi.org/10.1155/2021/7045823
  • Lin, T. Y., Dollár, P., Girshick, R., He, K., Hariharan, B., & Belongie, S. (2017, June). Feature pyramid networks for object detection. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (pp. 2117–2125).IEEE.
  • Liu, G., & Zhang, J. (2020). CNID: research of network intrusion detection based on convolutional neural network. Discrete Dynamics in Nature and Society, 2020, 1–11. https://doi.org/10.1155/2020/4705982
  • Liu, W., Wang, Z., Liu, X., Zeng, N., Liu, Y., & Alsaadi, F. E. (2017). A survey of deep neural network architectures and their applications. Neurocomputing, 234, 11–26. https://doi.org/10.1016/j.neucom.2016.12.038.
  • Liu, W., Wen, Y., Yu, Z., Li, M., Raj, B., & Song, L. (2017, June). Sphereface: Deep hypersphere embedding for face recognition. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (pp. 212–220).IEEE.
  • Liu, Z., Japkowicz, N., Wang, R., & Tang, D. (2019). Adaptive learning on mobile network traffic data. Connection Science, 31(2), 185–214. https://doi.org/10.1080/09540091.2018.1512557
  • Long, J., Shelhamer, E., & Darrell, T. (2015, June). Fully convolutional networks for semantic segmentation. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (pp. 3431–3440).IEEE.
  • Lopez-Martin, M., Carro, B., Sanchez-Esguevillas, A., & Lloret, J. (2017). Network traffic classifier with convolutional and recurrent neural networks for internet of things. IEEE Access, 5, 18042–18050. https://doi.org/10.1109/Access.6287639
  • Malialis, K., Devlin, S., & Kudenko, D. (2015). Distributed reinforcement learning for adaptive and robust network intrusion response. Connection Science, 27(3), 234–252. https://doi.org/10.1080/09540091.2015.1031082
  • Manimurugan, S., Manimegalai, P., Valsalan, P., Krishnadas, J., & Narmatha, C. (n.d.). Intrusion detection in cloud environment using hybrid genetic algorithm and back propagation neural network. International Journal of Communication Systems, e4667. https://doi.org/10.1002/dac.4667
  • Mohamad Tahir, H., Hasan, W., Md Said, A., Zakaria, N. H., Katuk, N., Kabir, N. F., Omar, M. H., Ghazali, O., & Yahya, N. I. (2015). Hybrid machine learning technique for intrusion detection system, 464–472.
  • Ni, G., Ling, G., Yi-Yue, H., & Hai, W. (2017). A lightweight intrusion detection model based on autoencoder network with feature reduction. ACTA Electonica Sinica, 45(3), 730. 10.3969/j.issn.0372-2112.2017.03.033
  • Ning, Z., Shi, W., Xiao, L., Liang, W., & Weng, T. H. (2021). A novel approach for anti-pollution attacks in network coding. Connection Science, 33(3), 1–16. https://doi.org/10.1080/09540091.2020.1841109
  • Pan, X., Luo, Y., & Xu, Y. (2015). K-nearest neighbor based structural twin support vector machine. Knowledge-Based Systems, 88, 34–44. https://doi.org/10.1016/j.knosys.2015.08.009
  • Roy, B., & Cheung, H. (2018). A deep learning approach for intrusion detection in internet of things using bi-directional long short-term memory recurrent neural network. In 2018 28th International Telecommunication Networks and Applications Conference (ITNAC) (pp. 1–6).IEEE.
  • Rudd, E. M., Rozsa, A., Günther, M., & Boult, T. E. (2016). A survey of stealth malware attacks, mitigation measures, and steps toward autonomous open world solutions. IEEE Communications Surveys & Tutorials, 19(2), 1145–1172. https://doi.org/10.1109/COMST.2016.2636078
  • Sharafaldin, I., Lashkari, A. H., & Ghorbani, A. A. (2018, January). Toward generating a new intrusion detection dataset and intrusion traffic characterization. In Icissp (pp. 108–116).CIC.
  • Shiravi, A., Shiravi, H., Tavallaee, M., & Ghorbani, A. A. (2012). Toward developing a systematic approach to generate benchmark datasets for intrusion detection. Computers & Security, 31(3), 357–374. https://doi.org/10.1016/j.cose.2011.12.012
  • Shone, N., Ngoc, T. N., Phai, V. D., & Shi, Q. (2018). A deep learning approach to network intrusion detection. IEEE Transactions on Emerging Topics in Computational Intelligence, 2(1), 41–50. https://doi.org/10.1109/TETCI.2017.2772792
  • Tian, Q., Han, D., Li, K. C., Liu, X., Duan, L., & Castiglione, A. (2020). An intrusion detection approach based on improved deep belief network. Applied Intelligence, 50(10), 3162–3178. https://doi.org/10.1007/s10489-020-01694-4
  • Uhm, Y., & Pak, W. (2021). Service-aware two-level partitioning for machine learning-based network intrusion detection with high performance and high scalability. IEEE Access, 9, 6608–6622. https://doi.org/10.1109/Access.6287639
  • Wang, H., Wang, Y., Zhou, Z., Ji, X., Gong, D., Zhou, J., Li, Z., & Liu, W. (2018, June). Cosface: Large margin cosine loss for deep face recognition. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (pp. 5265–5274).IEEE.
  • Wei, G., & Wang, Z. (2021). Adoption and realization of deep learning in network traffic anomaly detection device design. Soft Computing, 25(2), 1147–1158. https://doi.org/10.1007/s00500-020-05210-1
  • Wu, K., Chen, Z., & Li, W. (2018). A novel intrusion detection model for a massive network using convolutional neural networks. IEEE Access, 6, 50850–50859. https://doi.org/10.1109/ACCESS.2018.2868993
  • Wu, X., Hong, D., Ghamisi, P., Li, W., & Tao, R. (2018). MsRi-CCF: Multi-scale and rotation-insensitive convolutional channel features for geospatial object detection. Remote Sensing, 10(12), 1990. https://doi.org/10.3390/rs10121990
  • Xiao, L., Xie, S., Han, D., Liang, W., Guo, J., & Chou, W. K. (2021). A lightweight authentication scheme for telecare medical information system. Connection Science, 33(3), 1–17. https://doi.org/10.1080/09540091.2021.2017853.
  • Xiao, T., Han, D., He, J., Li, K. C., & Mello, R. (2020). Multi-Keyword ranked search based on mapping set matching in cloud ciphertext storage system. Connection Science, 33(1), 1–18. https://doi.org/10.1080/09540091.2020.1753175
  • Xiao, Y., Xing, C., Zhang, T., & Zhao, Z. (2019). An intrusion detection model based on feature reduction and convolutional neural networks. IEEE Access, 7, 42210–42219. https://doi.org/10.1109/Access.6287639
  • Xie, Y. X., Ji, L. X., Li, L. S., Guo, Z., & Baker, T. (2021). An adaptive defense mechanism to prevent advanced persistent threats. Connection Science, 33(2), 359–379. https://doi.org/10.1080/09540091.2020.1832960
  • Yin, C., Zhu, Y., Fei, J., & He, X. (2017). A deep learning approach for intrusion detection using recurrent neural networks. IEEE Access, 5, 21954–21961. https://doi.org/10.1109/ACCESS.2017.2762418
  • Zeng, Y., Gu, H., Wei, W., & Guo, Y. (2019). Deep−full−range: A deep learning based network encrypted traffic classification and intrusion detection framework. IEEE Access, 7, 45182–45190. https://doi.org/10.1109/Access.6287639
  • Zhang, J., Qin, Z., Yin, H., Ou, L., & Hu, Y. (2016, December). Irmd: Malware variant detection using opcode image recognition. In 2016 IEEE 22nd International Conference on Parallel and Distributed Systems (ICPADS) (pp. 1175–1180).IEEE.
  • Zhang, R., Li, W., & Mo, T. (2018). Review of deep learning. Application Research of Computers, 35(07), 385–397. https://doi.org/10.3969/j.issn.1001-3695.2018.07.001
  • Zhang, S., Yao, T., Arthur Sandor, V. K., Weng, T. H., Liang, W., & Su, J. (2021). A novel blockchain-based privacy-preserving framework for online social networks. Connection Science, 33(3), 555–575. https://doi.org/10.1080/09540091.2020.1854181
  • Zhang, W., Han, D., Li, K. C., & Massetto, F. I. (2020). Wireless sensor network intrusion detection system based on MK-ELM. Soft Computing, 24, 12361–12374. https://doi.org/10.1007/s00500-020-04678-1
  • Zhang, Y., Chen, X., Guo, D., Song, M., Teng, Y., & Wang, X. (2019). PCCN: parallel cross convolutional neural network for abnormal network traffic flows detection in multi-class imbalanced network traffic flows. IEEE Access, 7, 119904–119916. https://doi.org/10.1109/Access.6287639
  • Zhao, G., Xu, K., Xu, L., & Wu, B. (2015). Detecting APT malware infections based on malicious DNS and traffic analysis. IEEE Access, 3, 1132–1142. https://doi.org/10.1109/ACCESS.2015.2458581