Using Long-Short-Term Memory Based Convolutional Neural Networks for Network Intrusion Detection

  • Chia-Ming Hsu
  • He-Yen Hsieh
  • Setya Widyawan Prakosa
  • Muhammad Zulfan Azhari
  • Jenq-Shiou LeuEmail author
Conference paper
Part of the Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering book series (LNICST, volume 264)


The quantity of internet use has grown dramatically in the last decade. Internet is almost available in every human activity. However, there are some critical obstacles behind this massive development. Security becomes the hottest issue among the researchers. In this study, we focus on intrusion detection system (IDS) which is one of the solutions for security problems on network administration. Since intrusion detection system is a kind of classifier machine, it is allowed to engage with machine learning schemes. Related to this reason, the number of studies related to utilizing machine learning schemes for intrusion detection system has been increased recently. In this study, we use NSL-KDD dataset as the benchmark. Even though machine learning schemes perform well on intrusion detection, the obtained result on NSL-KDD dataset is not satisfied enough. On the other hand, deep learning offers the solution to overcome this issue. We propose two deep learning models which are long-short-term memory only (LSTM-only) and the combination of convolutional neural networks and LSTM (CNN-LSTM) for intrusion detection system. Both proposed methods achieve better accuracy than that of the existing method which uses recurrent neural networks (RNN).


Intrusion detection system Deep learning Long-short term memory NSL-KDD dataset 


  1. 1.
    Revathi, S., Malathi, A.: A detailed analysis on NSL-KDD dataset using various machine learning techniques for intrusion detection. Int. J. Eng. Res. Technol. 2, 1848–1853 (2013)Google Scholar
  2. 2.
    Dhanabal, L., Shantharajah, S.P., Dr.: A study on NSL-KDD dataset for intrusion detection system based on classification algorithms. In: International Journal of Advanced Research in Computer and Communication Engineering, vol. 4, pp. 446–452 (2015)Google Scholar
  3. 3.
    Kuang, F., Xu, W., Zhang, S.: A novel hybrid KPCA and SVM with GA model for intrusion detection. Appl. Soft Comput. 18, 178–184 (2014)CrossRefGoogle Scholar
  4. 4.
    Hettich, S., Bay, S.D.: The UCI KDD Archive, University of California, Department of Information and Computer Science, Irvine, CA (1999).
  5. 5.
    Reddy, R.R., Ramadevi, Y., Sunitha, K.V.N.: Effective discriminant function for intrusion detection using SVM. In: International Conference on Advances in Computing, Communications and Informatics (ICACCI), pp. 11481153 (2016)Google Scholar
  6. 6.
    Ingre, B., Yadav, A.: Performance analysis of NSL-KDD dataset using ANN. In: International Conference on Signal Processing and Communication Engineering Systems (SPACES), pp. 9296 (2015)Google Scholar
  7. 7.
    Farnaaz, N., Jabbar, M.A.: Random forest modeling for network intrusion detection system. Procedia Comput. Sci. 89, 213217 (2016)CrossRefGoogle Scholar
  8. 8.
    Zhang, J., Zulkernine, M., Haque, A.: Random-forests-based network intrusion detection systems. IEEE Trans. Syst. Man Cybern. Part C (Appl. Rev.) 38, 649–659 (2008)Google Scholar
  9. 9.
    Niyaz, Q., Sun, W., Javaid, A.Y., Alam, M.: A deep learning approach for network intrusion detection system. EAI Endorsed Trans. Secur. Saf. 16, 21–26 (2015)Google Scholar
  10. 10.
    Xu, Y., Shi, L., Ni, Y.: Deep-learning-based scenario generation strategy considering correlation between multiple wind farms. J. Eng. 2017, 2207–2210 (2017)Google Scholar
  11. 11.
    Wu, B.-F., Lin, C.-H.: Adaptive feature mapping for customizing deep learning based facial expression recognition model. IEEE Access 6, 12451–12461 (2018)CrossRefGoogle Scholar
  12. 12.
    Wang, T., Wen, C.-K., Wang, H., Gao, F., Jiang, T., Jin, S.: Deep learning for wireless physical layer: opportunities and challenges. China Commun. 14, 92–111 (2017)CrossRefGoogle Scholar
  13. 13.
    Yin, C., Zhu, Y., Fei, J., He, X.: A deep learning approach for intrusion detection using recurrent neural networks. IEEE Access 5, 21954–21961 (2017)Google Scholar
  14. 14.
    Hochreiter, S., Schmidhuber, J.: Long short-term memory. Neural Comput. 9, 1735–1780 (1997)Google Scholar
  15. 15.
    Kaushik, S.S., Deshmukh, P.R., Dr. Prof.: Detection of attacks in an intrusion detection system. Int. J. Comput. Sci. Inf. Technol. 2(3), 982–986 (2011)Google Scholar

Copyright information

© ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2019

Authors and Affiliations

  • Chia-Ming Hsu
    • 1
  • He-Yen Hsieh
    • 1
  • Setya Widyawan Prakosa
    • 1
  • Muhammad Zulfan Azhari
    • 1
  • Jenq-Shiou Leu
    • 1
    Email author
  1. 1.National Taiwan University of Science and TechnologyTaipeiTaiwan

Personalised recommendations