Convolutional Neural Networks for Multi-class Intrusion Detection System

  • Sasanka PotluriEmail author
  • Shamim Ahmed
  • Christian Diedrich
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 11308)


Advances in communication and networking technology leads to the use of internet-based technology in Industrial Control System (ICS) applications. Simultaneously to the advantages and flexibility, it also opens doors to the attackers. Increased attacks on ICS are clear examples for the need of developing strong security mechanisms to develop defense in depth strategies for industries. Despite several techniques, every day a novel attack is being identified and this highlights the importance and need of robust techniques for identifying those attacks. Deep learning-based intrusion detection mechanisms are proven to be efficient in identifying novel attacks. Deep learning techniques such as Stacked Autoencoders (SAE), Deep Belief Networks (DBN) are widely used for intrusion detection but the research on using Convolutional Neural Networks (CNN) is limited. In this paper, the efficiency of CNN based intrusion detection for identifying the multiple attack classes using datasets such as NSL-KDD and UNSW-NB 15 is evaluated. Different performance metrics such as precision, recall and F-measure were calculated and compared with the existing deep learning approaches.


Intrusion Detection System (IDS) Convolutional Neural Networks (CNN) Industrial Control Systems (ICS) Deep learning Network security 


  1. 1.
    Stallings, W.: Network security essentials : applications and standards (2000)Google Scholar
  2. 2.
    Scarfone, K., Mell, P.: Guide to intrusion detection and prevention systems (IDPS) recommendations of the National Institute of Standards and Technology. NIST Spec. Publ. 800–94, 127 (2007)Google Scholar
  3. 3.
    Tofino Security, SCADA Security Basics: Why Industrial Networks are Different than IT Networks (2012).
  4. 4.
    Colbert, E.J.M., Kott, A. (eds.): Cyber-security of SCADA and Other Industrial Control Systems. AIS, vol. 66. Springer, Cham (2016). Scholar
  5. 5.
    M. Lincoln Laboratory, DARPA Intrusion Detection Data Sets. Accessed 07 Apr 2016
  6. 6.
    Sahu, S.K., Sarangi, S., Jena, S.K.: A detail analysis on intrusion detection datasets. In: Souvenir 2014 IEEE International Advance Computing Conference (IACC 2014), May, pp. 1348–1353 (2014)Google Scholar
  7. 7.
    McHugh, J.: Testing intrusion detection systems: a critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln Laboratory. ACM Trans. Inf. Syst. Secur. 3(4), 262–294 (2000)CrossRefGoogle Scholar
  8. 8.
    Revathi, D.A.M.S.: A detailed analysis on NSL-KDD dataset using various machine learning techniques for intrusion detection. Int. J. Eng. Res. Technol. 2(12), 1848–1853 (2013)Google Scholar
  9. 9.
    Tang, T.A., Mhamdi, L., McLernon, D., Zaidi, S.A.R., Ghogho, M.: Deep learning approach for network intrusion detection in software defined networking. In: 2016 International Conference on Wireless Networks and Mobile Communications, pp. 258–263 (2016)Google Scholar
  10. 10.
    Javaid, A., Niyaz, Q., Sun, W., Alam, M.: A deep learning approach for network intrusion detection system. In: Proceedings of the 9th EAI International Conference on Bio-inspired Information and Communications Technologies (formerly BIONETICS) (2016)Google Scholar
  11. 11.
    Sheikhan, M., Jadidi, Z., Farrokhi, A.: Intrusion detection using reduced-size RNN based on feature grouping. Neural Comput. Appl. 21(6), 1185–1190 (2012)CrossRefGoogle Scholar
  12. 12.
    Yin, C., Zhu, Y., Fei, J., He, X.: A deep learning approach for intrusion detection using recurrent neural networks. IEEE Access 5(c), 21954–21961 (2017)CrossRefGoogle Scholar
  13. 13.
    Alom, Z., Bontupalli, V., Taha, T.M.: Intrusion detection using deep belief networks, pp. 339–344 (2015)Google Scholar
  14. 14.
    Potluri, S., Diedrich, C.: Deep feature extraction for multi-class intrusion detection in industrial control systems. Int. J. Comput. Theory Eng. 9(5), 374–379 (2017)CrossRefGoogle Scholar
  15. 15.
    Potluri, S., Diedrich, C.: Accelerated deep neural networks for enhanced Intrusion Detection System. In: IEEE International Conference on Emerging Technologies and Factory Automation, ETFA 2016 (2016)Google Scholar
  16. 16.
    Potluri, S., Henry, N.F., Diedrich, C.: Evaluation of hybrid deep learning techniques for ensuring security in networked control systems. In: 2017 22nd IEEE International Conference on Emerging Technologies and Factory Automation, pp. 1–8 (2017)Google Scholar
  17. 17.
    Shone, N., Ngoc, T.N., Phai, V.D., Shi, Q.: A deep learning approach to network intrusion detection. IEEE Trans. Emerg. Top. Comput. Intell. 2(1), 41–50 (2018)CrossRefGoogle Scholar
  18. 18.
    Li, Z., Qin, Z., Huang, K., Yang, X., Ye, S.: Intrusion detection using convolutional neural networks for representation learning. In: Liu, D., Xie, S., Li, Y., Zhao, D., El-Alfy, E.-S.M. (eds.) ICONIP 2017. LNCS, vol. 10638, pp. 858–866. Springer, Cham (2017). Scholar
  19. 19.
    Vinayakumar, R., Soman, K.P., Poornachandran, P.: Applying convolutional neural network for network intrusion detection. In: 2017 International Conference on Advanced Computing, Communications and Informatics, pp. 1222–1228 (2017)Google Scholar
  20. 20.
    Tavallaee, M., Bagheri, E., Lu, W., Ghorbani, A.A.: A detailed analysis of the KDD CUP 99 data set. In: IEEE Symposium on Computational Intelligence in Security and Defense Applications, CISDA 2009, pp. 1–6 (2009)Google Scholar
  21. 21.
    Dhanabal, L., Shantharajah, S.P.: A study on NSL-KDD dataset for intrusion detection system based on classification algorithms. Int. J. Adv. Res. Comput. Commun. Eng. 4, 446–452 (2015)Google Scholar
  22. 22.
    Moustafa, N., Slay, J.: UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set). In: 2015 Military Communications and Information Systems Conference, pp. 1–6 (2015)Google Scholar
  23. 23.
    Moustafa, N., Slay, J.: The evaluation of network anomaly detection systems: statistical analysis of the UNSW-NB15 data set and the comparison with the KDD99 data set. Inf. Secur. J. 25(1–3), 18–31 (2016)Google Scholar
  24. 24.
    Moustafa, N., Slay, J.: The UNSW-NB15 data set description (2015). Accessed 06 Apr 2018
  25. 25.
    Wu, J.: Introduction to Convolutional Neural Networks, pp. 1–28 (2016)Google Scholar
  26. 26.
    Agarap, A.F.: Deep Learning using Rectified Linear Units (ReLU), no. 1 (2018)Google Scholar
  27. 27.
    Wu, H., Gu, X.: Max-pooling dropout for regularization of convolutional neural networks. In: Arik, S., Huang, T., Lai, W.K., Liu, Q. (eds.) ICONIP 2015. LNCS, vol. 9489, pp. 46–54. Springer, Cham (2015). Scholar
  28. 28.
    Karn, U.: An intuitive explanation of convolutional neural networks. The Data Science Blog (2016). Accessed 06 May 2018
  29. 29.
    Bhandare, A., Bhide, M., Gokhale, P., Chandavarkar, R.: Applications of convolutional neural networks. Int. J. Comput. Sci. Inf. Technol. 7(5), 2206–2215 (2016)Google Scholar
  30. 30.
    MathWorks, Deep Learning Basics, Documentation (2018). Accessed 06 May 2018
  31. 31.
    MathWorks, Real-Time UDP (2018). Accessed 06 May 2018

Copyright information

© Springer Nature Switzerland AG 2018

Authors and Affiliations

  • Sasanka Potluri
    • 1
    Email author
  • Shamim Ahmed
    • 1
  • Christian Diedrich
    • 1
  1. 1.Institute for Automation EngineeringOtto-von-Guericke University MagdeburgMagdeburgGermany

Personalised recommendations