透過您的圖書館登入
IP:3.138.105.89
  • 期刊

一個有效的深度學習超參數選擇方法應用於入侵偵測系統

An Effective Hyperparameter Selection for Deep Learning Algorithm in Intrusion Detection System

摘要


許多近期的研究利用機器學習或深度學習方法,作為入侵偵測系統的判別模組方法。部分研究主要注重於如何改良深度學習架構,來提升深度學習的準確率。其中一個影響深度學習的效能的原因是超參數的設定,包含了神經元的個數、層數或學習率等。然而目前超參數的設定,通常是依據個人的經驗或窮舉法方式來設定超參數的數值。在本論文中將差分進化演算法與深度學習結合,提出了一種可以自適應調整超參數的方法,並將其應用於入侵偵測系統中。本論文將所提出的方法與其他機器學習和深度學習進行比較。最終實驗結果說明,本論文所提的超啟發式演算法,在較複雜的入侵偵測問題上,可以有效的找到深度學習的最佳超參數,能有效提升深度學習模型對於入侵攻擊的檢測能力。

並列摘要


With the great success of artificial intelligence, machine learning and deep learning have been applied to intrusion detection as the core methods in recent years. The primary focus of many researches is on how to improve the performance by tuning the deep learning model and the associated hyperparameters. Hyperparameters are critical factors for deep learning-based method which includes how many layers should be used in the model; how many neurons are there for each layer; and how to set up the learning rate properly. However, most of studies set the hyperparameters depending on personal experience or using inefficient brute force exhaustive search. In this paper, we will present a self-adaptive method to decide the setting of hyperparameters that integrated deep learning and differential evolution. The proposed scheme is then be used for intrusion detection system. To evaluate the effectiveness of the proposed method, the performance of the scheme is compared to those of other machine learning and deep learning methods. Three performance metrics in terms of accuracy, recall and precision are used. Results show that the proposed algorithm can find the best hyperparameters setting for deep learning model than other methods compared in this paper.

參考文獻


A. Gilchrist, Industry 4.0: The Industrial Internet of Things. New York: Springer, 2016.
R. M. Lee, M. J. Assante and T. Conway, “Analysis of the Cyber Attack on the Ukrainian Power Grid: Defense Use Case., 2016, https://ics.sans.org/media/E-ISAC_SANS_Ukraine_DUC_5.pdf (2021/01/14).
A. Burt and T. Pott, “Gitpaste-12: A New Worming Botnet with Reverse Shell Capability Spreading via GitHub and Pastebin, 2020, https://blogs.juniper.net/en-us/threat-research/gitpaste-12 (2021/01/14).
F. A. Alaba, M. Othman, I. A. T. Hashem and F. Alotaibi, “Internet of Things Security: A Survey,” Journal of Network and Computer Applications, vol. 88, pp. 10-28, 2017.
P. H. Duy and N. N. Diep, “Intrusion Detection Using Deep Neural Network,” SoutheastAsian Journal Sciences, vol. 5, no. 2, pp. 111-125, 2017.

延伸閱讀