Ajou University repository

Network Intrusion Detection with Improved Feature Representation
  • Lee, Geonsu ;
  • Rhee, Hochang ;
  • Shim, Jae Hoon ;
  • Koo, Hyung Il ;
  • Cho, Nam Ik
Citations

SCOPUS

0

Citation Export

DC Field Value Language
dc.contributor.authorLee, Geonsu-
dc.contributor.authorRhee, Hochang-
dc.contributor.authorShim, Jae Hoon-
dc.contributor.authorKoo, Hyung Il-
dc.contributor.authorCho, Nam Ik-
dc.date.issued2021-01-01-
dc.identifier.urihttps://aurora.ajou.ac.kr/handle/2018.oak/36656-
dc.identifier.urihttps://www.scopus.com/inward/record.uri?partnerID=HzOxMe3b&scp=85126704862&origin=inward-
dc.description.abstractThis paper presents new feature representation methods for the network intrusion detection. Like conventional work, our method is based on neural networks. However, rather than focusing on the network architecture search, we improve the performance by developing effective feature representation methods. First, we apply the embedding method to categorical features in the network data. Although embedding has been commonly used in natural language processing and recommen-dation systems, categorical features in network problems were often ignored or simply used in a one-hot-encoding vector form. By applying the embedding method to categorical features, we can effectively exploit them. Second, we apply a robust scaler to numerical features. Numerical features are concentrated in a few clusters with a small portion of outliers, and we can effectively remove outliers with a robust scaler. Finally, we augment feature vectors with categorical representations of numerical values. These categorical representations (e.g., high, medium, and low) help to discover simple logical rules and facilitate the intrusion detection. We have applied our method to two scenarios: a normal/attack classification and an unsupervised learning of anomaly detection. Experimental results have shown that the proposed method outperforms conventional methods on public benchmark datasets.-
dc.description.sponsorshipThis research was supported by Samsung Electronics Co., Ltd.-
dc.language.isoeng-
dc.publisherInstitute of Electrical and Electronics Engineers Inc.-
dc.subject.meshCategorical features-
dc.subject.meshEmbedding method-
dc.subject.meshFeature embedding-
dc.subject.meshFeature representation-
dc.subject.meshNetwork data-
dc.subject.meshNetwork intrusion detection-
dc.subject.meshNeural-networks-
dc.subject.meshNumerical features-
dc.subject.meshPerformance-
dc.subject.meshRepresentation method-
dc.titleNetwork Intrusion Detection with Improved Feature Representation-
dc.typeConference-
dc.citation.conferenceDate2021.12.14. ~ 2021.12.17.-
dc.citation.conferenceName2021 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, APSIPA ASC 2021-
dc.citation.edition2021 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, APSIPA ASC 2021 - Proceedings-
dc.citation.endPage2054-
dc.citation.startPage2049-
dc.citation.title2021 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, APSIPA ASC 2021 - Proceedings-
dc.identifier.bibliographicCitation2021 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, APSIPA ASC 2021 - Proceedings, pp.2049-2054-
dc.identifier.scopusid2-s2.0-85126704862-
dc.identifier.urlhttp://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=9688568-
dc.subject.keywordFeature embedding-
dc.subject.keywordFeature representation-
dc.subject.keywordNetwork intrusion detection-
dc.type.otherConference Paper-
dc.subject.subareaArtificial Intelligence-
dc.subject.subareaComputer Vision and Pattern Recognition-
dc.subject.subareaSignal Processing-
dc.subject.subareaInstrumentation-
Show simple item record

Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

 KOO, HYUNG IL Image
KOO, HYUNG IL구형일
Department of Electrical and Computer Engineering
Read More

Total Views & Downloads

File Download

  • There are no files associated with this item.