Ajou University repository

Network Intrusion Detection with Improved Feature Representation
  • Lee, Geonsu ;
  • Rhee, Hochang ;
  • Shim, Jae Hoon ;
  • Koo, Hyung Il ;
  • Cho, Nam Ik
Citations

SCOPUS

0

Citation Export

Publication Year
2021-01-01
Journal
2021 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, APSIPA ASC 2021 - Proceedings
Publisher
Institute of Electrical and Electronics Engineers Inc.
Citation
2021 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, APSIPA ASC 2021 - Proceedings, pp.2049-2054
Keyword
Feature embeddingFeature representationNetwork intrusion detection
Mesh Keyword
Categorical featuresEmbedding methodFeature embeddingFeature representationNetwork dataNetwork intrusion detectionNeural-networksNumerical featuresPerformanceRepresentation method
All Science Classification Codes (ASJC)
Artificial IntelligenceComputer Vision and Pattern RecognitionSignal ProcessingInstrumentation
Abstract
This paper presents new feature representation methods for the network intrusion detection. Like conventional work, our method is based on neural networks. However, rather than focusing on the network architecture search, we improve the performance by developing effective feature representation methods. First, we apply the embedding method to categorical features in the network data. Although embedding has been commonly used in natural language processing and recommen-dation systems, categorical features in network problems were often ignored or simply used in a one-hot-encoding vector form. By applying the embedding method to categorical features, we can effectively exploit them. Second, we apply a robust scaler to numerical features. Numerical features are concentrated in a few clusters with a small portion of outliers, and we can effectively remove outliers with a robust scaler. Finally, we augment feature vectors with categorical representations of numerical values. These categorical representations (e.g., high, medium, and low) help to discover simple logical rules and facilitate the intrusion detection. We have applied our method to two scenarios: a normal/attack classification and an unsupervised learning of anomaly detection. Experimental results have shown that the proposed method outperforms conventional methods on public benchmark datasets.
Language
eng
URI
https://aurora.ajou.ac.kr/handle/2018.oak/36656
https://www.scopus.com/inward/record.uri?partnerID=HzOxMe3b&scp=85126704862&origin=inward
Journal URL
http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=9688568
Type
Conference Paper
Funding
This research was supported by Samsung Electronics Co., Ltd.
Show full item record

Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

 KOO, HYUNG IL Image
KOO, HYUNG IL구형일
Department of Electrical and Computer Engineering
Read More

Total Views & Downloads

File Download

  • There are no files associated with this item.