On the combination of data augmentation method and gated convolution model for building effective and robust intrusion detection

7Citations
Citations of this article
27Readers
Mendeley users who have this article in their library.

Abstract

Deep learning (DL) has exhibited its exceptional performance in fields like intrusion detection. Various augmentation methods have been proposed to improve data quality and eventually to enhance the performance of DL models. However, the classic augmentation methods cannot be applied to those DL models which exploit the system-call sequences to detect intrusion. Previously, the seq2seq model has been explored to augment system-call sequences. Following this work, we propose a gated convolutional neural network (GCNN) model to thoroughly extract the potential information of augmented sequences. Also, in order to enhance the model’s robustness, we adopt adversarial training to reduce the impact of adversarial examples on the model. Adversarial examples used in adversarial training are generated by the proposed adversarial sequence generation algorithm. The experimental results on different verified models show that GCNN model can better obtain the potential information of the augmented data and achieve the best performance. Furthermore, GCNN with adversarial training can enhance robustness significantly.

References Powered by Scopus

Long Short-Term Memory

76931Citations
N/AReaders
Get full text

Support-Vector Networks

45791Citations
N/AReaders
Get full text

Gradient-based learning applied to document recognition

44103Citations
N/AReaders
Get full text

Cited by Powered by Scopus

Network intrusion detection based on IE-DBN model

42Citations
N/AReaders
Get full text

SynDroid: An adaptive enhanced Android malware classification method based on CTGAN-SVM

7Citations
N/AReaders
Get full text

Optimizing Sustainable Architecture: Machine Learning Approaches for Eco-friendly Building Design

0Citations
N/AReaders
Get full text

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Cite

CITATION STYLE

APA

Wang, Y., lv, S., Liu, J., Chang, X., & Wang, J. (2020). On the combination of data augmentation method and gated convolution model for building effective and robust intrusion detection. Cybersecurity, 3(1). https://doi.org/10.1186/s42400-020-00063-5

Readers' Seniority

Tooltip

Lecturer / Post doc 5

45%

PhD / Post grad / Masters / Doc 5

45%

Researcher 1

9%

Readers' Discipline

Tooltip

Computer Science 8

73%

Engineering 2

18%

Agricultural and Biological Sciences 1

9%

Save time finding and organizing research with Mendeley

Sign up for free