SlideShare a Scribd company logo
1 of 24
Deep Learning Approach for
Network Intrusion Detection System
Name - Avinash Kumar
IRN No.- N18023
Exam No. T150953005
Intrusion Detection System (IDS)
A system that identifies, in real time attacks on a
network and takes corrective action to prevent those
attacks.
Classes of intruder
● Masquerader – illegitimate user penetrates the system using a
legitimate user’s account
● Misfeasor – legitimate user misuses his/her privileges, accessing
resources that is not authorized
● Clandestine user - privileged user uses supervisory control to
suppress audit control
Types of Intrusions
● Denial of Service (DoS)
● Remote to User Attacks (R2L)
● User to Root Attacks (U2R)
● Probing
Intrusion Detection Methods
● lMisuse detection
- matches the activities occurring on an information
system to the signatures of known intrusions
● Anomaly detection
- compares activities on the information system to the
norm behaviour
Basics Structure of IDS Detections
Motivation for using AI for Intrusion Detection
● lDrawbacks of conventional techniques
- constant update of database with new signatures
- false alarm
● Advantages of AI based techniques
- Flexibility
- Adaptability
- Pattern recognition and possibly detection of new
patterns
- Learning abilities
Existing AI techniques used for Intrusion Detection
● Support Vector Machines (SVMs)
● Artificial Neural Networks (ANNs)
● Naive-Bayesian (NB)
● Random Forests (RF)
● Principal component analysis (PCA)
Neural Network Fundamentals
● Neuron is fundamental information
processing unit of brain
● Information exchange between neurons
is via pulses of electrical activitiy
● Axons act as transmission lines
● Syntaptic interconnections impose
excitation or inhibition of receptive
nerons
AI techniques we used for IDS
● Self-taught learning(STL)
● Sparse autoencoder
● Soft-max regression
● Deep Belief Network (DBN)
SELF-TAUGHT LEARNING(STL)
Self-taught Learning (STL) is two stages classification.
● Unsupervised Feature Learning (UFL)
- Sparse Autoencoder
- Restricted Boltzmann Machine(RBM)
- K-Means Clustering
- Gaussian Mixtures
● Classification of Labeled and Unlabeled data
- Soft-max regression
NSL-KDD Dataset
● Improved and reduced version of
the KDD Cup 99 dataset.
● The KDD Cup dataset was
prepared using the network traffic
captured by 1998 DARPA IDS
evaluation program.
● It was observed that almost 78%
and 75% records are redundant in
the training and test dataset
● Consists of 41 features
Various steps involved in our NIDS implementation
NIDS Implementation
● Nominal attributes are converted into discrete attributes using 1-to-n
encoding.
● Output layer is computed by the sigmoid function that gives values between 0 and
1.
● Normalization values at the input layer in the range of [0, 1].
● The training data without labels for feature learning using sparse autoencoder
for the first stage of self-taught learning.
● In second stage, we applied classification on training data using soft-max
regression.
RESULTS
Two approaches applied for the evaluation of NIDSs.
● Training data is used for both training and testing either using n-fold cross-validation or splitting the
training data into training, cross-validation, and test sets.
● Training and test data separately for the training and testing. Since the training and test data were
collected in different environments, the accuracy obtained using the second approach is not as high
as in the first approach.
● NIDSs based on this approach achieved very high accuracy and less false-alarm rates.
Performance Evaluation
NIDS is implemented for three different types of classification:
1. Normal and anomaly (2-class)
2. Normal and four different attack categories (5-class)
3. Normal and 22 different attacks (23-class).
Evaluation based on Training data
● Applied 10-fold cross-validation on the training
data to evaluate the classification accuracy of
self-taught learning (STL) for 2-class, 5-class,
and 23-class.
● Compared its performance with the soft-max
regression (SMR) when applied directly to the
dataset without feature learning.
● STL achieved a classification accuracy rate more
than 98% for all types of classification.
Evaluation based on Training and Test Data
● STL performs very well as compared to SMR.
● For the 2-class classification, STL achieved 88.39%
accuracy rate, whereas SM achieved 78.06%.
● In the best accuracy rate achieved was 82% with
NB-Tree.
● For the 5-class classification, STL achieved an
accuracy of 79.10% whereas SMR achieved 75.23%.
CONCLUSION
● NIDS performed very well compared to previously implemented NIDSs
for the normal/anomaly detection when evaluated on the test data.
● Further enhanced by applying techniques such as Stacked Autoencoder,
an extension of sparse autoencoder in deep belief nets,
● For unsupervised feature learning, and NB-Tree, Random Tree, or J48 for
further classification.
FUTURE WORK
● We plan to implement a real-time NIDS for actual networks using
deep learning technique.
● Additionally, on-the-go feature learning on raw network traffic
headers instead of derived features can be another high impact
research in this area.
Deep learning approach for network intrusion detection system

More Related Content

What's hot

Intrusion detection
Intrusion detectionIntrusion detection
Intrusion detection
Umesh Dhital
 
AN INTRUSION DETECTION SYSTEM
AN INTRUSION DETECTION SYSTEMAN INTRUSION DETECTION SYSTEM
AN INTRUSION DETECTION SYSTEM
Apoorv Pandey
 

What's hot (20)

Intrusion detection system
Intrusion detection systemIntrusion detection system
Intrusion detection system
 
Intrusion Detection
Intrusion DetectionIntrusion Detection
Intrusion Detection
 
Five Major Types of Intrusion Detection System (IDS)
Five Major Types of Intrusion Detection System (IDS)Five Major Types of Intrusion Detection System (IDS)
Five Major Types of Intrusion Detection System (IDS)
 
Basics of Denial of Service Attacks
Basics of Denial of Service AttacksBasics of Denial of Service Attacks
Basics of Denial of Service Attacks
 
Intrusion detection
Intrusion detectionIntrusion detection
Intrusion detection
 
Threat Intelligence
Threat IntelligenceThreat Intelligence
Threat Intelligence
 
Machine learning in Cyber Security
Machine learning in Cyber SecurityMachine learning in Cyber Security
Machine learning in Cyber Security
 
Malware Detection Approaches using Data Mining Techniques.pptx
Malware Detection Approaches using Data Mining Techniques.pptxMalware Detection Approaches using Data Mining Techniques.pptx
Malware Detection Approaches using Data Mining Techniques.pptx
 
Intrusion Prevention System
Intrusion Prevention SystemIntrusion Prevention System
Intrusion Prevention System
 
Intrusion prevention system(ips)
Intrusion prevention system(ips)Intrusion prevention system(ips)
Intrusion prevention system(ips)
 
Malware detection-using-machine-learning
Malware detection-using-machine-learningMalware detection-using-machine-learning
Malware detection-using-machine-learning
 
Anomaly detection
Anomaly detectionAnomaly detection
Anomaly detection
 
AN INTRUSION DETECTION SYSTEM
AN INTRUSION DETECTION SYSTEMAN INTRUSION DETECTION SYSTEM
AN INTRUSION DETECTION SYSTEM
 
Computer Security and Intrusion Detection(IDS/IPS)
Computer Security and Intrusion Detection(IDS/IPS)Computer Security and Intrusion Detection(IDS/IPS)
Computer Security and Intrusion Detection(IDS/IPS)
 
Artificial Intelligence and Cybersecurity
Artificial Intelligence and CybersecurityArtificial Intelligence and Cybersecurity
Artificial Intelligence and Cybersecurity
 
Network Security ppt
Network Security pptNetwork Security ppt
Network Security ppt
 
intrusion detection system (IDS)
intrusion detection system (IDS)intrusion detection system (IDS)
intrusion detection system (IDS)
 
Intrusion detection and prevention system
Intrusion detection and prevention systemIntrusion detection and prevention system
Intrusion detection and prevention system
 
Intrusion Detection Presentation
Intrusion Detection PresentationIntrusion Detection Presentation
Intrusion Detection Presentation
 
Footprinting and reconnaissance
Footprinting and reconnaissanceFootprinting and reconnaissance
Footprinting and reconnaissance
 

Similar to Deep learning approach for network intrusion detection system

Using a Long Short-Term Memory Recurrent Neural Network (LSTM-RNN) to Classif...
Using a Long Short-Term Memory Recurrent Neural Network (LSTM-RNN) to Classif...Using a Long Short-Term Memory Recurrent Neural Network (LSTM-RNN) to Classif...
Using a Long Short-Term Memory Recurrent Neural Network (LSTM-RNN) to Classif...
BASMAJUMAASALEHALMOH
 
Cyb 5675 class project final
Cyb 5675   class project finalCyb 5675   class project final
Cyb 5675 class project final
Craig Cannon
 

Similar to Deep learning approach for network intrusion detection system (20)

IRJET- Review on Intrusion Detection System using Recurrent Neural Network wi...
IRJET- Review on Intrusion Detection System using Recurrent Neural Network wi...IRJET- Review on Intrusion Detection System using Recurrent Neural Network wi...
IRJET- Review on Intrusion Detection System using Recurrent Neural Network wi...
 
International Journal of Computer Science, Engineering and Information Techno...
International Journal of Computer Science, Engineering and Information Techno...International Journal of Computer Science, Engineering and Information Techno...
International Journal of Computer Science, Engineering and Information Techno...
 
SURVEY OF NETWORK ANOMALY DETECTION USING MARKOV CHAIN
SURVEY OF NETWORK ANOMALY DETECTION USING MARKOV CHAINSURVEY OF NETWORK ANOMALY DETECTION USING MARKOV CHAIN
SURVEY OF NETWORK ANOMALY DETECTION USING MARKOV CHAIN
 
Survey of network anomaly detection using markov chain
Survey of network anomaly detection using markov chainSurvey of network anomaly detection using markov chain
Survey of network anomaly detection using markov chain
 
AN EFFICIENT DEEP LEARNING APPROACH FOR NETWORK INTRUSION DETECTION SYSTEM ON...
AN EFFICIENT DEEP LEARNING APPROACH FOR NETWORK INTRUSION DETECTION SYSTEM ON...AN EFFICIENT DEEP LEARNING APPROACH FOR NETWORK INTRUSION DETECTION SYSTEM ON...
AN EFFICIENT DEEP LEARNING APPROACH FOR NETWORK INTRUSION DETECTION SYSTEM ON...
 
An Approach of Automatic Data Mining Algorithm for Intrusion Detection and P...
An Approach of Automatic Data Mining Algorithm for Intrusion  Detection and P...An Approach of Automatic Data Mining Algorithm for Intrusion  Detection and P...
An Approach of Automatic Data Mining Algorithm for Intrusion Detection and P...
 
IDS for IoT.pptx
IDS for IoT.pptxIDS for IoT.pptx
IDS for IoT.pptx
 
MULTI-LAYER CLASSIFIER FOR MINIMIZING FALSE INTRUSION
MULTI-LAYER CLASSIFIER FOR MINIMIZING FALSE INTRUSIONMULTI-LAYER CLASSIFIER FOR MINIMIZING FALSE INTRUSION
MULTI-LAYER CLASSIFIER FOR MINIMIZING FALSE INTRUSION
 
INTRUSION DETECTION SYSTEM CLASSIFICATION USING DIFFERENT MACHINE LEARNING AL...
INTRUSION DETECTION SYSTEM CLASSIFICATION USING DIFFERENT MACHINE LEARNING AL...INTRUSION DETECTION SYSTEM CLASSIFICATION USING DIFFERENT MACHINE LEARNING AL...
INTRUSION DETECTION SYSTEM CLASSIFICATION USING DIFFERENT MACHINE LEARNING AL...
 
Intrusion Detection System Classification Using Different Machine Learning Al...
Intrusion Detection System Classification Using Different Machine Learning Al...Intrusion Detection System Classification Using Different Machine Learning Al...
Intrusion Detection System Classification Using Different Machine Learning Al...
 
IRJET- Review on Network Intrusion Detection using Recurrent Neural Network A...
IRJET- Review on Network Intrusion Detection using Recurrent Neural Network A...IRJET- Review on Network Intrusion Detection using Recurrent Neural Network A...
IRJET- Review on Network Intrusion Detection using Recurrent Neural Network A...
 
012
012012
012
 
IRJET- Intrusion Detection based on J48 Algorithm
IRJET- Intrusion Detection based on J48 AlgorithmIRJET- Intrusion Detection based on J48 Algorithm
IRJET- Intrusion Detection based on J48 Algorithm
 
Using a Long Short-Term Memory Recurrent Neural Network (LSTM-RNN) to Classif...
Using a Long Short-Term Memory Recurrent Neural Network (LSTM-RNN) to Classif...Using a Long Short-Term Memory Recurrent Neural Network (LSTM-RNN) to Classif...
Using a Long Short-Term Memory Recurrent Neural Network (LSTM-RNN) to Classif...
 
Cyb 5675 class project final
Cyb 5675   class project finalCyb 5675   class project final
Cyb 5675 class project final
 
2013 feature selection for intrusion detection using nsl kdd
2013 feature selection for intrusion detection using nsl kdd2013 feature selection for intrusion detection using nsl kdd
2013 feature selection for intrusion detection using nsl kdd
 
A Survey on Different Machine Learning Algorithms and Weak Classifiers Based ...
A Survey on Different Machine Learning Algorithms and Weak Classifiers Based ...A Survey on Different Machine Learning Algorithms and Weak Classifiers Based ...
A Survey on Different Machine Learning Algorithms and Weak Classifiers Based ...
 
A SURVEY ON DIFFERENT MACHINE LEARNING ALGORITHMS AND WEAK CLASSIFIERS BASED ...
A SURVEY ON DIFFERENT MACHINE LEARNING ALGORITHMS AND WEAK CLASSIFIERS BASED ...A SURVEY ON DIFFERENT MACHINE LEARNING ALGORITHMS AND WEAK CLASSIFIERS BASED ...
A SURVEY ON DIFFERENT MACHINE LEARNING ALGORITHMS AND WEAK CLASSIFIERS BASED ...
 
A SURVEY ON DIFFERENT MACHINE LEARNING ALGORITHMS AND WEAK CLASSIFIERS BASED ...
A SURVEY ON DIFFERENT MACHINE LEARNING ALGORITHMS AND WEAK CLASSIFIERS BASED ...A SURVEY ON DIFFERENT MACHINE LEARNING ALGORITHMS AND WEAK CLASSIFIERS BASED ...
A SURVEY ON DIFFERENT MACHINE LEARNING ALGORITHMS AND WEAK CLASSIFIERS BASED ...
 
An Efficient Intrusion Detection System with Custom Features using FPA-Gradie...
An Efficient Intrusion Detection System with Custom Features using FPA-Gradie...An Efficient Intrusion Detection System with Custom Features using FPA-Gradie...
An Efficient Intrusion Detection System with Custom Features using FPA-Gradie...
 

Recently uploaded

1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
AldoGarca30
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
Neometrix_Engineering_Pvt_Ltd
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Kandungan 087776558899
 
Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdf
Kamal Acharya
 
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
HenryBriggs2
 
Digital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptxDigital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptx
pritamlangde
 

Recently uploaded (20)

1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
 
Post office management system project ..pdf
Post office management system project ..pdfPost office management system project ..pdf
Post office management system project ..pdf
 
Introduction to Geographic Information Systems
Introduction to Geographic Information SystemsIntroduction to Geographic Information Systems
Introduction to Geographic Information Systems
 
Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdf
 
PE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and propertiesPE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and properties
 
Max. shear stress theory-Maximum Shear Stress Theory ​ Maximum Distortional ...
Max. shear stress theory-Maximum Shear Stress Theory ​  Maximum Distortional ...Max. shear stress theory-Maximum Shear Stress Theory ​  Maximum Distortional ...
Max. shear stress theory-Maximum Shear Stress Theory ​ Maximum Distortional ...
 
Computer Graphics Introduction To Curves
Computer Graphics Introduction To CurvesComputer Graphics Introduction To Curves
Computer Graphics Introduction To Curves
 
8086 Microprocessor Architecture: 16-bit microprocessor
8086 Microprocessor Architecture: 16-bit microprocessor8086 Microprocessor Architecture: 16-bit microprocessor
8086 Microprocessor Architecture: 16-bit microprocessor
 
Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network Devices
 
UNIT 4 PTRP final Convergence in probability.pptx
UNIT 4 PTRP final Convergence in probability.pptxUNIT 4 PTRP final Convergence in probability.pptx
UNIT 4 PTRP final Convergence in probability.pptx
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
 
Introduction to Artificial Intelligence ( AI)
Introduction to Artificial Intelligence ( AI)Introduction to Artificial Intelligence ( AI)
Introduction to Artificial Intelligence ( AI)
 
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
 
Digital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptxDigital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptx
 
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKARHAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
 
Electromagnetic relays used for power system .pptx
Electromagnetic relays used for power system .pptxElectromagnetic relays used for power system .pptx
Electromagnetic relays used for power system .pptx
 
Linux Systems Programming: Inter Process Communication (IPC) using Pipes
Linux Systems Programming: Inter Process Communication (IPC) using PipesLinux Systems Programming: Inter Process Communication (IPC) using Pipes
Linux Systems Programming: Inter Process Communication (IPC) using Pipes
 
Online food ordering system project report.pdf
Online food ordering system project report.pdfOnline food ordering system project report.pdf
Online food ordering system project report.pdf
 

Deep learning approach for network intrusion detection system

  • 1. Deep Learning Approach for Network Intrusion Detection System Name - Avinash Kumar IRN No.- N18023 Exam No. T150953005
  • 2. Intrusion Detection System (IDS) A system that identifies, in real time attacks on a network and takes corrective action to prevent those attacks.
  • 3. Classes of intruder ● Masquerader – illegitimate user penetrates the system using a legitimate user’s account ● Misfeasor – legitimate user misuses his/her privileges, accessing resources that is not authorized ● Clandestine user - privileged user uses supervisory control to suppress audit control
  • 4. Types of Intrusions ● Denial of Service (DoS) ● Remote to User Attacks (R2L) ● User to Root Attacks (U2R) ● Probing
  • 5. Intrusion Detection Methods ● lMisuse detection - matches the activities occurring on an information system to the signatures of known intrusions ● Anomaly detection - compares activities on the information system to the norm behaviour
  • 6. Basics Structure of IDS Detections
  • 7.
  • 8. Motivation for using AI for Intrusion Detection ● lDrawbacks of conventional techniques - constant update of database with new signatures - false alarm
  • 9. ● Advantages of AI based techniques - Flexibility - Adaptability - Pattern recognition and possibly detection of new patterns - Learning abilities
  • 10. Existing AI techniques used for Intrusion Detection ● Support Vector Machines (SVMs) ● Artificial Neural Networks (ANNs) ● Naive-Bayesian (NB) ● Random Forests (RF) ● Principal component analysis (PCA)
  • 11. Neural Network Fundamentals ● Neuron is fundamental information processing unit of brain ● Information exchange between neurons is via pulses of electrical activitiy ● Axons act as transmission lines ● Syntaptic interconnections impose excitation or inhibition of receptive nerons
  • 12. AI techniques we used for IDS ● Self-taught learning(STL) ● Sparse autoencoder ● Soft-max regression ● Deep Belief Network (DBN)
  • 13. SELF-TAUGHT LEARNING(STL) Self-taught Learning (STL) is two stages classification. ● Unsupervised Feature Learning (UFL) - Sparse Autoencoder - Restricted Boltzmann Machine(RBM) - K-Means Clustering - Gaussian Mixtures ● Classification of Labeled and Unlabeled data - Soft-max regression
  • 14.
  • 15. NSL-KDD Dataset ● Improved and reduced version of the KDD Cup 99 dataset. ● The KDD Cup dataset was prepared using the network traffic captured by 1998 DARPA IDS evaluation program. ● It was observed that almost 78% and 75% records are redundant in the training and test dataset ● Consists of 41 features
  • 16. Various steps involved in our NIDS implementation
  • 17. NIDS Implementation ● Nominal attributes are converted into discrete attributes using 1-to-n encoding. ● Output layer is computed by the sigmoid function that gives values between 0 and 1. ● Normalization values at the input layer in the range of [0, 1]. ● The training data without labels for feature learning using sparse autoencoder for the first stage of self-taught learning. ● In second stage, we applied classification on training data using soft-max regression.
  • 18. RESULTS Two approaches applied for the evaluation of NIDSs. ● Training data is used for both training and testing either using n-fold cross-validation or splitting the training data into training, cross-validation, and test sets. ● Training and test data separately for the training and testing. Since the training and test data were collected in different environments, the accuracy obtained using the second approach is not as high as in the first approach. ● NIDSs based on this approach achieved very high accuracy and less false-alarm rates.
  • 19. Performance Evaluation NIDS is implemented for three different types of classification: 1. Normal and anomaly (2-class) 2. Normal and four different attack categories (5-class) 3. Normal and 22 different attacks (23-class).
  • 20. Evaluation based on Training data ● Applied 10-fold cross-validation on the training data to evaluate the classification accuracy of self-taught learning (STL) for 2-class, 5-class, and 23-class. ● Compared its performance with the soft-max regression (SMR) when applied directly to the dataset without feature learning. ● STL achieved a classification accuracy rate more than 98% for all types of classification.
  • 21. Evaluation based on Training and Test Data ● STL performs very well as compared to SMR. ● For the 2-class classification, STL achieved 88.39% accuracy rate, whereas SM achieved 78.06%. ● In the best accuracy rate achieved was 82% with NB-Tree. ● For the 5-class classification, STL achieved an accuracy of 79.10% whereas SMR achieved 75.23%.
  • 22. CONCLUSION ● NIDS performed very well compared to previously implemented NIDSs for the normal/anomaly detection when evaluated on the test data. ● Further enhanced by applying techniques such as Stacked Autoencoder, an extension of sparse autoencoder in deep belief nets, ● For unsupervised feature learning, and NB-Tree, Random Tree, or J48 for further classification.
  • 23. FUTURE WORK ● We plan to implement a real-time NIDS for actual networks using deep learning technique. ● Additionally, on-the-go feature learning on raw network traffic headers instead of derived features can be another high impact research in this area.