Citation Export
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Xu, Wen | - |
dc.contributor.author | Jang-Jaccard, Julian | - |
dc.contributor.author | Liu, Tong | - |
dc.contributor.author | Sabrina, Fariza | - |
dc.contributor.author | Kwak, Jin | - |
dc.date.issued | 2022-06-01 | - |
dc.identifier.issn | 2073-431X | - |
dc.identifier.uri | https://dspace.ajou.ac.kr/dev/handle/2018.oak/32738 | - |
dc.description.abstract | Existing generative adversarial networks (GANs), primarily used for creating fake image samples from natural images, demand a strong dependence (i.e., the training strategy of the generators and the discriminators require to be in sync) for the generators to produce as realistic fake samples that can “fool” the discriminators. We argue that this strong dependency required for GAN training on images does not necessarily work for GAN models for network intrusion detection tasks. This is because the network intrusion inputs have a simpler feature structure such as relatively low-dimension, discrete feature values, and smaller input size compared to the existing GAN-based anomaly detection tasks proposed on images. To address this issue, we propose a new Bidirectional GAN (Bi-GAN) model that is better equipped for network intrusion detection with reduced overheads involved in excessive training. In our proposed method, the training iteration of the generator (and accordingly the encoder) is increased separate from the training of the discriminator until it satisfies the condition associated with the cross-entropy loss. Our empirical results show that this proposed training strategy greatly improves the performance of both the generator and the discriminator even in the presence of imbalanced classes. In addition, our model offers a new construct of a one-class classifier using the trained encoder–discriminator. The one-class classifier detects anomalous network traffic based on binary classification results instead of calculating expensive and complex anomaly scores (or thresholds). Our experimental result illustrates that our proposed method is highly effective to be used in network intrusion detection tasks and outperforms other similar generative methods on two datasets: NSL-KDD and CIC-DDoS2019 datasets. | - |
dc.description.sponsorship | This work is supported by the Cyber Security Research Programme\u2014Artificial Intelligence for Automating Response to Threats from the Ministry of Business, Innovation, and Employment (MBIE) of New Zealand as a part of the Catalyst Strategy Funds under the grant number MAUX1912 and Massey University\u2014Massey University Research Fund Early Career Round. | - |
dc.language.iso | eng | - |
dc.publisher | MDPI | - |
dc.title | Improved Bidirectional GAN-Based Approach for Network Intrusion Detection Using One-Class Classifier | - |
dc.type | Article | - |
dc.citation.title | Computers | - |
dc.citation.volume | 11 | - |
dc.identifier.bibliographicCitation | Computers, Vol.11 | - |
dc.identifier.doi | 10.3390/computers11060085 | - |
dc.identifier.scopusid | 2-s2.0-85131530339 | - |
dc.identifier.url | https://www.mdpi.com/2073-431X/11/6/85/pdf?version=1653562192 | - |
dc.subject.keyword | generative adversarial networks | - |
dc.subject.keyword | network intrusion detection | - |
dc.subject.keyword | one class classifier | - |
dc.description.isoa | true | - |
dc.subject.subarea | Human-Computer Interaction | - |
dc.subject.subarea | Computer Networks and Communications | - |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.