NETWORK INTRUSION DETECTION MODEL BASED ON CONVOLUTIONAL NEURAL NETWORKS AND TABULAR DATA CONVERTED INTO IMAGES

Authors

  • Svitlana Gavrylenko
  • Vadim Poltoratskyi

DOI:

https://doi.org/10.26906/SUNZ.2024.4.052

Keywords:

intrusion detection systems, computer networks, machine learning, deep neural networks, tabular data conversion

Abstract

The object of the study is the process of identifying the state of a computer systems and network. The subject of the study are the methods of identifying the state of computer systems and networks. The purpose of this paper is to improve the quality of detecting intrusions into computer networks. The UNSW-NB 15 set, which contains information about the normal functioning of the network and during synthetic intrusions, was used as input. Deep neural networks (DL), their advantages and problems in big data processing are considered. It was found that deep neural networks when processing tabular data require their transformation. Modern methods of tabular data transformation were studied. The results obtained. A method of converting tabular data into an image is proposed. The method converts each object of a separate class from a set of tabular data into an image by mapping the attribute values onto a two-dimensional plane. The method was implemented programmatically using the GOOGLE COLAB cloud service based on Jupyter Notebook. Conclusions. It was found that the use of the proposed conversion method of tabular data into an image made it possible to use a classification model based on the CNN neural network and increase the quality of detection of intrusions into computer networks up to 4%.

Downloads

Download data is not yet available.

References

Chen, Ying. "Big data technology for computer intrusion detection" Open Computer Science, vol. 13, no. 1, 2023, 20220267. https://doi.org/10.1515/comp-2022-0267

Gavrylenko , S., Poltoratskyi , V., & Nechyporenko , A. “Intrusion detection model based on improved transformer”. Advanced Information Systems, 2024, 8(1), 94–99. https://doi.org/10.20998/2522-9052.2024.1.12

Dusan Nedeljkovic, Zivana Jakovljevic. “CNN based method for the development of cyber-attacks detection algorithms in industrial control systems” ,Computers & Security, 2022, vol.114, 102585, https://doi.org/10.1016/j.cose.2021.102585

A. El-Rady, H. Osama, R. Sadik and H. El Badwy, "Network Intrusion Detection CNN Model for Realistic Network Attacks Based on Network Traffic Classification," 2023 40th National Radio Science Conference (NRSC), Giza, Egypt, 2023, pp. 167-178, https://doi.org/10.1109/NRSC58893.2023.10152872

S. Golubev and E. Novikova, "Transformation of Network Flow Data into Images for Intrusion Detection Using Convolutional Neural Networks," 2023 International Russian Automation Conference (RusAutoCon), Sochi, Russian Federation, 2023, pp. 948-952, https://doi.org/10.1109/RusAutoCon58002.2023.10272890

Borisov V, Leemann T, Seßler K, Haug J, Pawelczyk M, Kasneci G. “Deep neural networks and tabular data: A survey.” IEEE Transactions on Neural Networks and Learning Systems. 2022 https://doi.org/ 10.1109/TNNLS.2022.3229161

Medeiros Neto L, Rogerio da Silva Neto S, Endo PT, “A comparative analysis of converters of tabular data into image for Kim the classification of Arboviruses using Convolutional Neural Networks.” PLoS ONE 2023? 18(12): e0295598.https://doi.org/10.1371/journal.pone.0295598

Taehoon & Pak, Wooguil. (2023). “Deep Learning-Based Network Intrusion Detection Using Multiple Image Transformers.”Applied Sciences. 13. 2754. https://doi.org/10.3390/app13052754

Sharma, A., Vans, E., Shigemizu, D. et al. “DeepInsight: A methodology to transform a non-image data to an image for convolution neural network architecture”. Sci Rep 9, 11399 (2019). https://doi.org/10.1038/s41598-019-47765-6

Bazgir O, Zhang R, Dhruba SR, Rahman R, Ghosh S, Pal R. “Representation of features as images with neighborhood dependencies for compatibility with convolutional neural networks.” Nature communications. 2020;11(1):4391. https://doi.org/10.1038/s41467-020-18197-y

Zhu Y, Brettin T, Xia F, Partin A, Shukla M, Yoo H, Evrard YA, Doroshow JH, Stevens RL. “Converting tabular data into images for deep learning with convolutional neural networks.” Sci Rep. 2021 Jul 1;11(1):14036. https://doi.org/10.1038/s41598-021-93376-5

N. Moustafa and J. Slay, "UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set)," 2015 Military Communications and Information Systems Conference (MilCIS), Canberra, ACT, Australia, 2015, pp. 1-6, https://doi.org/ 10.1109/MilCIS.2015.7348942

Abdi L, Sattar H. “To combat multi-class imbalanced problems by means of over-sampling techniques”. IEEE Trans Knowl Data Eng. 2016;28(1):238–251. https://doi.org/10.1109/TKDE.2015.2458858

S. Gavrylenko, V. Zozulia, and N. Khatsko. “Methods for Improving the Quality of Classification on Imbalanced Data”, Proceedings of the IEEE 4th KhPI Week on Advanced Technology (KhPIWeek), Kharkiv, Ukraine, 2023, pp. 1-5, https://doi.org/ 10.1109/KhPIWeek61412.2023.10312879

Downloads

Published

2024-11-28

Most read articles by the same author(s)