• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Enhanced Deep Autoencoder Based Feature Representation Learning for Intelligent Intrusion Detection System

    2021-12-14 06:04:44ThavavelVaiyapuriandAdelBinbusayyis
    Computers Materials&Continua 2021年9期

    Thavavel Vaiyapuriand Adel Binbusayyis

    College of Computer Engineering and Sciences,Prince Sattam Bin Abdulaziz University,AlKharj,Saudi Arabia

    Abstract:In the era of Big data,learning discriminant feature representation from network traffic is identified has as an invariably essential task for improving the detection ability of an intrusion detection system(IDS).Owing to the lack of accurately labeled network traffic data,many unsupervised feature representation learning models have been proposed with state-of-theart performance.Yet,these models fail to consider the classification error while learning the feature representation.Intuitively,the learnt feature representation may degrade the performance of the classification task.For the first time in the field of intrusion detection,this paper proposes an unsupervised IDS model leveraging the benefits of deep autoencoder (DAE) for learning the robust feature representation and one-class support vector machine(OCSVM)for finding the more compact decision hyperplane for intrusion detection.Specially,the proposed model defines a new unified objective function to minimize the reconstruction and classification error simultaneously.This unique contribution not only enables the model to support joint learning for feature representation and classifier training but also guides to learn the robust feature representation which can improve the discrimination ability of the classifier for intrusion detection.Three set of evaluation experiments are conducted to demonstrate the potential of the proposed model.First,the ablation evaluation on benchmark dataset,NSL-KDD validates the design decision of the proposed model.Next,the performance evaluation on recent intrusion dataset,UNSW-NB15 signifies the stable performance of the proposed model.Finally,the comparative evaluation verifies the efficacy of the proposed model against recently published state-of-the-art methods.

    Keywords:Cybersecurity;network intrusion detection;deep learning;autoencoder;stacked autoencoder;feature representational learning;joint learning;one-class classifier;OCSVM

    1 Introduction

    Following a decade of rapid advances,networking technologies has driven dramatically the global connectivity and online businesses worldwide.Apparently,this cyber dependency has opened opportunities for cybercriminals to increase the odds of cyberattacks inflicting catastrophic damage against business continuity and eventually impacts the political economy [1].As such,the dire need for cybersecurity solutions takes a new crucial stand in safeguarding the cyberspace from the fast-evolving threat landscape.Recently,IDS has become an indispensable part of cybersecurity as it not only detects the anomalous activities from attackers but also monitors the network for any attempts to break the cybersecurity and alerts with timely information to secure the system [2].For these reasons,IDS has gained momentous interest across the industries and research communities.

    The wide adoption of internet technologies is closely followed by massive increase of network traffic volume which contains redundant and irrelevant network data.These undesired data make the classification process increasingly complex in the existing IDS and limits the detection accuracy for intrusion [3,4].Consequently,efficient and effective approach for learning the most robust feature representation from massive network data is of paramount importance to boost detection accuracy of IDS.

    In recent years,several research works have explored the potential of feature representation learning (FRL) to handle massive amount of data and solve the classification problems in various fields with state-of-the-art performance.For example,to handle the arrival of information explosion effectively in field of multimedia technology,Wang et al.[5]presented a number of FRL approaches based on deep autoencoders and compared their efficiency for text categorization process.Similarly,Tang et al.[6]embedded unsupervised FRL to make the feature selection process robust to noises and improve the performance of data mining tasks on massive datasets.In [7],the authors applied FRL within a multi-scale framework to learn more compact discriminative descriptors for effective person reidentification in a video surveillance system.Apart from the above applications,several researchers have reported the prime role of FRL in handling the large volume of biological data to identify therapeutic peptides and serve as future benchmark in designing promising tools for disease screening [8,9].More potentially in recent studies,many authors have claimed that the application of FRL can boost the performance of real-time analytic tasks on massive IoT data [10-13].Taking inspiration from these literatures,the impetus of this work is to apply FRL and develop an efficient IDS which can be in pace with current trends to handle the large volume of network traffic in a big data environment and display higher detection accuracy for intrusion.

    Deep learning (DL),a new version of machine learning has shown a series of breakthroughs in recent years in wide range of applications [14,15].More essentially,the recent research trends are recognizing DL as a most promising approach for FRL deeming that the hierarchical nonlinear mappings via multiple activation layers in DL will facilitate to learn the robust feature representation from the given raw data through successive transformations [16].But as stated in literature [17],the success of DL merely depends on the quality of the employed training set.The increasing network size indeed may complicate the labeling process and may lead to error prone training set.Owing to these reasons,unsupervised deep learning approaches has gained revival of interest in the field of intrusion detection.

    Amongst different unsupervised DL approaches,the autoencoder (AE) architecture has shown immense potential for impressive feature representation and is under intensive research.For example,the authors in [18]developed an online light weight AE model utilizing random forest to select the effective features for representation learning and displayed improved accuracy for intrusion detection.correspondingly,an AE model is designed in [19]combining the advantages of data analytics and statistical techniques to extract strongly correlated features.The model gained better intrusion detection performance for modern attacks.Musafer et al.[20]proposed a mathematical model to optimize the hyperparameters of sparse AE and enhanced the model capability for feature representation learning.Besides these efforts on improving the performance of AE for intrusion detection,few variants of AE are also put forward for intrusion detection.For instance,in 2017,Yu et al.[21]introduced dilated convolutional AE combining the strength of AE and CNN.The model proved its potential for learning robust feature representation from large volume of raw network traffic and meeting high accuracy demand of modern network IDS.Following this variant of AE,in 2018,[22]a non-symmetric DAE is proposed for unsupervised feature representation learning,to increase the detection capability of random forest classifier for intrusion detection.Yan et al.[23]designed a stacked sparse AE model based on unsupervised learning strategy to learn useful feature representation of intrusive behavior and compared its performance on three shallow learning classifiers.Al-Qatf et al.[24]presented an AE model based on selftaught learning framework with SVM for classification to gain improved detection accuracy with regard to attacks.In 2019,the authors in [25]developed a two-stage semi-supervised stacked AE model to learn useful feature representation from large volume of network traffic data.Then,used the learnt feature representation with softmax classifier to achieve increased detection rate for unseen attacks.Recently in 2020,a convolutional AE [26]is proposed for multi-channel feature representation learning and demonstrated that the class-specific features of network traffic can improve the model accuracy significantly for intrusion detection.The model potentially accelerated the intrusion detection process with good accuracy for attacks.

    It is worth noting in these literatures,that the application of AE for FRL has contributed to achieve better detection accuracy yet are confronted with two main issues while considering their practical applications.First,due to system uncertainty,the abnormal network traffics are not collected in large size.Intuitively,the available intrusion datasets are inherently imbalanced with more normal traffic samples.The existing models trained under this scenario are biased towards normal traffic behavior degrading the detection accuracy for intrusion.Second,the existing models learn feature representation minimizing reconstruction loss on training sets.Instinctively,there is no guarantee that the learnt feature representation is optimal for intrusion detection task.

    Taking into account the aforementioned factors,this paper proposes a novel unsupervised IDS model integrating DAE and one-class classifier within a joint framework for intrusion detection.The joint framework guides the DAE to learn optimal feature representation and enhance the discriminative ability of the classifier for intrusion detection.Further,to address the class imbalance problem,both feature representation and one-classifier learning are trained only with normal samples.In short,the major contributions of this work are highlighted below,

    a.To the best of authors’knowledge,this is the first study to propose a joint optimization framework that simultaneously optimizes DAE for feature representation learning and oneclass classifier for intrusion detection.

    b.Different from existing works,a unified objective function is defined combining the reconstruction error and classification error to ensure that the learnt feature representation is robust to minimize the classification error and achieve higher accuracy for intrusion detection.

    c.The proposed model is trained only with the given normal samples to address the class imbalance problem and overfitting that may more likely occur due to the lack of insufficient intrusion traffic samples.This ensures and improves the generalization ability of proposed model.

    d.Extensive ablation experiments on benchmark intrusion datasets demonstrate the potential of the proposed model to gain improved detection rate for intrusion through robust feature representation learning.The comparative analysis results manifest the effectiveness of the proposed model against the state-of-the-art methods.

    2 Proposed Methodology

    The proposed unsupervised IDS model as shown in Fig.1 includes two essential components namely,DAE for normal traffic feature representational learning and one-class classifier for intrusion detection.The two subsections that follow elaborates the technical details of the two components,respectively.Subsequently,the objective function and training process of the proposed model is presented.

    Figure 1:Illustration of proposed IDS architecture

    2.1 Deep Autoencoder for Feature Representation Learning

    An AE is neural network that learns the intrinsic network traffic features reconstructing the original network traffic at its output layer [27].The general architecture of an AE consists of two key networks,encoder and decoder connected in serial.As represented by Eq.(1),the encoder network generates the feature representation by mapping the given input network traffic to hidden layer using an activation function f parameterized by W and b.

    Similarly,the decoder network reconstructs the original input network traffic from the generated feature representation using the activation function g parameterized by W′and b′as given below

    The AE is trained jointly with given training samples to learn the parameter setθ={W,W′,b,b′} of two networks,encoder and decoder minimizing the reconstruction error which is determined as follows,

    In general,AE demonstrates lower training efficiency and poor generalization ability while dealing diverse and massive network traffic data,due to its simple network structure with single hidden layer [28].To address this limitation,this work constructs DAE stacking multiple AEs successively such that the output of first AE is fed as input to next AE and so on as shown in Fig.2.Notably,this hierarchical structure benefits to drive deeper and learn more abstract high-level features that can support better feature representation learning.The output of the kth AE is computed as follows setting H0=X.

    Figure 2:Structure of general AE network

    Figure 3:DAE network in the proposed IDS model consists of four AEs with hidden layer dimension 35,25,15,7 respectively

    The DAE network of the proposed model is formed by stacking four AEs with the hidden layer dimension of 35,25,15 and 7 respectively to learn the most robust feature representation hierarchically from input network traffic data in an unsupervised manner.The structure of DAE of the proposed model is shown in Fig.3.Here,the number of hidden layer and hidden units is decided conducting practical experiments and utilizing best results without following the rule of thumb defined in previous literature.This is due to the fact that no evidence of any kind exists to confirm the validity of these rules for network generalization.Also,all hidden layers in our DAE use Rectified linear unit (ReLU) activation function.And the number of input units is set in concord to the dimension of input network traffic data.More specifically,the number of trainable parameters is reduced using tied weights where parameter sharing is enforced to obtain decoder weights transposing the encoder weights [29].

    2.2 One-Class Classifier for Intrusion Detection

    In most real networking environments,acquisition of network traffic with various anomalous behavior is practically impossible.Therefore,this work focuses on unsupervised one-class classification (OCC) method for intrusion detection.Essentially,OCC methods aim to build classifier model using only normal traffic behavior and detect a new incoming traffic as intrusion if its behavior deviates from normal behavior [30].Thus,OCC methods play significant role in successfully modeling the normal traffic behavior without any a priori knowledge about its underlying distribution.Among different OCC methods,OCSVM method has attracted lot of attention in recent literatures due to its several merits in solving OCC problems [31,32],such as its kernel trick to deal with nonlinearity in input data,itsνtrick to deal effectively the outliers in training set and its sparseness of solution to deal effectively with massive input data.

    Inspired by these merits,this work employs OCSVM method for intrusion detection.In real scenario,the distribution of normal samples in training set are non-linearly separable.Hence,OCSVM maps the given normal samples to feature space usingφ(X) to make them linearly separable and finds a decision boundary that separates all mapped normal samples from origin with maximum margin solving the optimization problem [30]given below,

    Here,the mappingφ(.) is usually implicit and indefinite.Therefore,the inner product of mapped data is generally specified by kernel function K(xi,xj) in practice.The most commonly used kernel functions are linear,sigmoid,polynomial and radial basis (RBF).In this work,RBF is chosen to achieve better performance.The RBF is given as follows,

    Further,in Eq.(5),F denotes feature space,denotes margin size,the termξimodels classification ‖w‖ error with respect to the ith sample and the regularization termν∈(0,1]is outlier score that controls the tradeoff between maximizing the margin from origin and minimizing the classification error.Usually,the optimization problem in Eq.(5) is solved introducing Lagrangian multiplierαand the final decision hyperplane of OCSVM is obtained as follows,

    In the above equation,αiis obtained by solving its dual form as follows,

    Once the optimal solution forαiis obtained,the constantρis computed by selecting a sample from the training set that satisfiesand that the sample is a support vector.

    Observing the decision function of OCSVM,it is evident that OCSVM can effectively detect malicious activities just with knowledge of normal network traffic samples with an optimal hyperplane.Notwithstanding,the performance of OCSVM is sensitive to the data-dependent parameters(γ,ν) that are difficult to tune.The subsection following will brief how these parameters are fine-tuned during training process in an unsupervised manner through a unified objective function defined in this work.

    2.3 Unified Objective Function

    In all existing IDS,AE and classifier are trained independently without joint optimization [19,21,24].In that case,the learnt feature representation does not guarantee strong discriminative ability for intrusion detection task.The work here aims to combat this problem combining the reconstruction loss in Eq.(3) with classification loss in Eq.(5),as given below,

    The above defined unified objective function guides the proposed model to learn robust feature representation for an improved effective intrusion detection by integrating the feature representation and classification process into joint optimization framework.In doing so,the proposed model reduces the reconstruction loss and at the same time ensures that the classification hyperplane margin is maximized for improving detection accuracy of the proposed model.

    Algorithm 1:Algorithm of the proposed IDS model Input:X-Training Set Initialization:1.DAE parameter θ=(W,b,W′,b′) using Xavier algorithm 2.OCSVM parameter {ν,γ} using grid search algorithm Procedure:Stage-I:Greedy Layer-wise Pretraining Process for each pretraining epoch do for each mini batch do 1.H ←Feature representation using Eq.(1)2.Z ←Reconstructed Input using Eq.(2)3.Lr ←Reconstruction Loss using Eq.(3)end for end for Stage II:Training for Fine tuning Process repeat Feature representation Learning:1.H ←Feature representation using Eq.(1)2.Z ←Reconstructed Input using Eq.(2)3.Lr ←Reconstruction Loss using Eq.(3)Classifier Learning:1.Obtain optimal kernel parameter γ using grid search 2.Transform H to kernel space applying Eq.(6)3.Find the hyperplane computing αi as in Eq.(8) and ρ as in Eq.(9)Optimization:1.Compute the gradient minimizing the objective function in Eq.(10)2.Update model parameter θ until 〈Convergence of θ〉

    2.4 Training Process

    As advised in previous literature [33,34],the training of DAE comprises two stages,pretraining and fine tuning to avoid local minima and to ensure fast convergence.During pretraining,each AE in the proposed DAE component is trained individually for its parameters minimizing the reconstruction loss and then its encoding is used as input to the next AE.

    After the weight and bias vector of all AEs are initialized through pretraining,first the hyperparameterνof OCSVM is optimized using grid search algorithm on the given training set.Later,the two key components,DAE and OCSVM in the proposed model are trained jointly in an unsupervised manner to fine tune their hyperparameter optimizing the unified objective function defined in Eq.(10).During each iteration of fine-tuning process,the parameterγof OCSVM is optimized using grid search on the feature representation learnt during that iteration.This sequence of training ensures for robust feature representation that not only demonstrates ability for reconstruction of input network traffic but also in enhancing the discriminative ability of OCSVM for intrusion detection.

    Furthermore,Xavier algorithm is used to initialize the trainable parameters of DAE to keep the gradient values and activation values within a reasonable range [35].Also,adaptive moment estimation (Adam) method [36]which is regarded as better gradient optimization method for deep learning networks is chosen in this work to compute the gradient values ofθas it presents the benefits of both AdaGrad and RMSProp algorithms.Notably,to obtain stabilized results,the training process is terminated when the number of epochs exceed 15 and loss value of the model falls below the threshold value of 0.005.The Algorithm-1 summarizes the training procedure adopted for the proposed model.

    3 Experimental Setup

    This section first describes the experimental datasets.Then details the methods used for preprocessing the datasets.Subsequently,the implementation details and the metrics used for experimental evaluation are presented.

    3.1 Datasets

    A number of datasets are available publicly for IDS research evaluation.Nonetheless,these datasets suffer from absences of traffic diversity and lack of sufficient number of sophisticated attack styles.Therefore,in order to conduct a fair and effective evaluation of the proposed model,an old benchmark NSL-KDD dataset and a new contemporary UNSW-NB15 dataset are considered in this work.A brief description of these two intrusion datasets is given below.

    A.NSL-KDD Dataset

    The NSL-KDD dataset is an improved version of KDD’99 dataset,presented by Tavallaee et in 2009 resolving the redundancy in KDD ‘99 dataset [37].This dataset contains an optimal ratio of 125,973 training samples to 22,543 testing samples.Thus NSL-KDD is regarded as one of the most valuable benchmark resource in the field cybersecurity research for IDS evaluation.Each sample in NSL-KDD contains 41 features and 1 class label to characterize whether the network traffic is normal or belongs to attack category.The distribution of normal traffic samples in the training and testing sets with regard to attacks are given in Tab.1.

    Table 1:Data distribution in NSL-KDD

    B.UNSW-NB15 Dataset

    The UNSW-NB15 is a modernized dataset recently developed by ACCS with hybrid of real normal and synthesized contemporary attack behavior from network traffic flow [38].This dataset includes 9 families of attacks namely DoS,Analysis,Generic,Fuzzers,Backdoors,Exploits,Shellcode,Reconnaissance,and Worms.The dataset consists of 175,341 training samples and 82,332 testing samples,each characterized with 42 features and a class label to discriminate the network traffic as normal or malicious activities.The distribution of samples against normal and attack class is shown in Tab.2.

    Table 2:Data distribution in UNSW-NB15

    3.2 Data Preprocessing

    Data preprocessing is essentially crucial for providing quality input for model training and boost the detection ability of the IDS.It includes two main operations namely,data encoding and normalization.

    a)Data Encoding:In this work,label encoding method is used to map all non-numeric or nominal features to numeric values.This method maps a nominal feature with C different values to an integer in the range of 0 to C-1.For example,the NSL-KDD dataset includes three nominal features namely,protocol_type,service_type,TCP status flag with 3,70 and 11 distinct nominal values respectively.After label encoding,the feature protocol_type with three values is mapped as follows,tcp:0,udp:1 and icmp:2.

    b)Normalization:Generally,the machine learning algorithms are biased by input features with large numeric value.To combat this effect,min-max normalization is applied to adjust the value range of all input features within the range [0,1].

    3.3 Implementation Details

    All the experiments are conducted on a personal computer with the specifications as follows,Intel Core i7-8565H@1.8 GHz,128 GB RAM and Windows 10 operating system.The proposed model is implemented in Jupyter development environment using Python 3 as programming language.More specifically,the python libraries,Keras and Tensorflow are used to implement various deep learning tasks [39].Also,python Scikit-learn library is used to implement various evaluation measures and data preprocessing tasks.

    3.4 Evaluation Metrics

    The effectiveness of the proposed IDS model is measured by analyzing four evaluation metrics that are most commonly used in the field of intrusion detection.The relevant definition of these four metrics are as follows,

    a)Accuracy (ACC):measures the proportion of network traffic flows that are correctly classified and is computed as follows,

    b)Detection rate(DR):Also called Recall or Sensitivity,measures the proportion of intrusion traffic flow that are correctly classified as given below,

    c)F1-measure (F1):Also termed as F1-Score,is considered as more effective measure than accuracy to evaluate the performance of intrusion detection model especially for imbalanced datasets.It is an hormonic average of detection rate and precision as follows

    d)False alarm rate (FAR):Also termed as false positive rate,measures the proportion of normal network traffic flows that are incorrectly classified.It is computed as follows,

    4 Experimental Results and Discussion

    The potentiality of the proposed model is demonstrated designing three set of evaluation experiments.Specially,these experiments are designed with the following objectives

    a) Validate the design decision of the proposed model on benchmark dataset NSL-KDD

    b) Verify the stable performance of the proposed model on recent intrusion dataset

    c) Compare the potential of the proposed model against recently published state-of-theart methods.

    4.1 Ablation Evaluation

    This study involves two sets of analyses,first the design decision of the proposed model is validated,next the structural configuration of the DAE network is analyzed with regard to intrusion detection performance.Both these analyze are conducted on the standard benchmark intrusion dataset,NSL-KDD in terms of ACC,F1,DR and FAR.The subsections below describe these two analyses in detail.

    4.1.1 Ablation Analysis I

    The aim of this analysis is to investigate the significance and contribution of different components of the proposed model to the overall detection performance.For this purpose,the following three variants of proposed model are developed to conduct the ablation analysis,

    (a)OC:This variant is developed removing DAE components to demonstrate the significance of feature representation learning in the proposed model

    (b)DAE+Softmax:This variant is developed replacing the OCSVM component with Softmax layer as shown in Fig.4.to demonstrate the significance of one-class unsupervised classification in the proposed model

    (c)DAE+OC:This version indeed is developed to demonstrate the significance of the training jointly DAE and OCSVM through the defined unified objective function.To this purpose,the DAE is first pretrained and fine-tuned to learn essential feature representation.Then,the learnt feature representation is used to train OCSVM for intrusion detection.

    In order to conduct a reasonable comparison,the above variants are developed under the same environmental setup using the same parameter as the proposed model and the results are reported in Tab.3.The results clearly reveal the independent effects and relevance of all components of the proposed model for the obtained performance improvement with regard to intrusion detection.In particular,the results of the variant OC with high FAR value on training set and low DR value indicates that the DAE plays a very crucial role in learning the most robust feature representation from network traffic and improves the discrimination ability of the proposed model for intrusion detection.This in accordance to the claim of recent literature [24]and provides a new insight for improving the intrusion detection accuracy.

    Figure 4:Structure of the DAE+softmax variant

    Table 3:Ablation analysis results on NSL-KDD dataset for different variants of proposed model

    Similarly,the significant drop in the evaluation results of the variant DAE+Softmax suggests that the kernel trick of OCSVM classifier is more effective in contributing the compact representation of normal samples and improves the detection accuracy significantly without any knowledge about the intrusion behavior.

    Finally,the results of the variant DAE+OCSVM reveals the potential of the proposed model over the three variants.The improved performance of the proposed model confirms the significance of the unified objective function for joint training of DAE and OCSVM to learn the robust feature representation that can enhance the discriminative ability of classifier for intrusion detection.Importantly,the outcome of this analysis suggests that the proposed model will serve as a new promising way for improving the intrusion detection accuracy in future studies.

    4.1.2 Ablation Analysis II

    This ablation analysis aims to observe the influence of number of hidden layers (number of stacking AEs) on intrusion detection performance exploring different structural configuration for DAE.As claimed in previous literature [40],it is quite intuitive that adding more hidden layers in DAE can improve the model performance.In tandem,a series of ablation experiments were conducted to examine the increase in number of hidden layers on intrusion detection performance.For this purpose,the number of hidden layers was varied from two to five and the corresponding results are summarized in Tab.4.It can be observed from the results that the proposed model improved its performance with increase in number of hidden layers.But surprisingly,the performance with five hidden layers was not significantly better compared to that displayed by four hidden layers.In particular,it induced lower DR value indicating that the increase in number of hidden layers above four leads to overfitting with the trained dataset.

    Table 4:Ablation analysis results on NSL-KDD dataset for different number of hidden layers in DAE network of proposed model

    Added to,Fig.5 illustrates the ability of DAE to learn the robust feature representation that can reconstruct the original input with small variation,when the number of hidden layer is 4 with dimension of 35,25,15 and 7 respectively.A similar observation is also reported in previous literature that increasing the number of hidden layers deeper may weaken the classifier performance [41].Taking into account this observation,the number of hidden layers in the subsequent experiments is set to 4 to achieve remarkable detection performance.

    Figure 5:Illustration of reconstructed network traffic sample (b) by the proposed DAE network from the original 1D network traffic (a)

    4.2 Performance Evaluation

    In literature,it is stated that the change of datasets considerably affects and varies the performance of detection process [42].Accordingly,to investigate the stable performance of the proposed model on different datasets,this experiment is conducted choosing a most recent benchmark dataset,UNSW-NB15 that includes many new modern attack styles.

    The confusion matrix delivered by the proposed model on UNSW-NB15 training and testing datasets are shown in Fig.6.The evaluation metrics computed using these confusion matrices are presented in.Fig.7.These figures demonstrate that the proposed model is very effective in achieving a DR of 97.16,FAR of 6.6,ACC of 95.93 and F1 of 97.27 on training dataset.Comparably a DR of 96.63,FAR of 2.61,ACC of 96.97 and F1 of 97.33 on testing dataset clearly reveals the efficacy of the proposed model to generalize even on a complex dataset such as UNSW-NB15 and at the same time confirms that the proposed model is very competitive for modern attack detection.

    Figure 6:Confusion matrix of proposed model on UNSW-NB15.(a) Training set (b) testing set

    Figure 7:Performance analysis of proposed IDS model on UNSW-NB15

    It is can be noted that,similar to the results on NSL-KDD,the performance improvement of the proposed model on UNSW-NB15 dataset,also remains at a promising level.This consistent performance of the proposed model is evidently attributed to the joint optimization of feature representation and classification learning for intrusion detection task.

    4.3 Comparative Analysis with Related Works

    The effectiveness of the proposed model is further highlighted comparing with recent and relevant IDS models based on deep learning approaches.Since its impractical to compare with all latest approaches,only those approaches that have used both NSL-KDD datasets are considered to have a rational comparison.Also,the results provided in their published papers are used to maintain fair comparison and the results of this comparison are presented in Tab.5.Here,for clarity purpose,the highest score is highlighted in bold for each metrics.

    Table 5:Comparative evaluation of proposed model against recent IDS models

    Now observing the results,it can be realized that the proposed model outperforms all the recent IDS approaches for all metrics except for the model introduced in [44]with improved conditional variational autoencoder (ICVAE) displays the very low FAR of 2.74.Though,ICVAE model shows lower probability for FAR than the proposed model,its performance in terms of DR,ACC and F1 metrics are very worst.This indicates that the proposed model is competitively effective in displaying better performance than all other recent approaches.The reason is possibly might be due to the introduced joint optimization framework that enables DAE to generate feature representation with potential ability not only for reconstruction but also for enhancing the classifier discriminative ability for intrusion detection.

    In summary,it can be concluded that the superior performance of the proposed model demonstrates that it has great potential to be a used as promising tool for intrusion detection.

    5 Conclusion

    This paper has proposed an unsupervised learning model for building an effective IDS.The proposed model resolves the labelled data scarcity challenge associated with supervised learning by integrating DAE and OCSVM within a joint optimization framework.Specifically,it has defined a unified objective function for joint learning of feature representation and classification task.This mechanism has guided the DAE to learn the most robust feature representation and at the same time has ensured to improve the discriminative ability of OCSVM for any unknown attacks.The outcome of ablation experiments has not only validated the design decision of the proposed model but has also signified the crucial contribution of each component in the proposed model in gaining improved detection rate for intrusions.Also,extensive comparative evaluation has manifested the efficacy of the proposed model against recently published state-of-the-art baselines.The proposed model will serve as a new sight for the research communities in the field intrusion detection to explore on joint unsupervised learning and achieve excellent intrusion detection rate for new modern attacks.

    Funding Statement:This work was supported by the Research Deanship of Prince Sattam Bin Abdulaziz University,Al-Kharj,Saudi Arabia (Grant No.2020/01/17215).Also,the author thanks Deanship of college of computer engineering and sciences for technical support provided to complete the project successfully.

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    一a级毛片在线观看| 在线永久观看黄色视频| 亚洲av电影不卡..在线观看| 丝袜美腿诱惑在线| 久久久久国产精品人妻aⅴ院| tocl精华| 999久久久国产精品视频| 亚洲精品国产色婷婷电影| 色播亚洲综合网| 亚洲第一青青草原| 欧美+亚洲+日韩+国产| 欧美不卡视频在线免费观看 | 亚洲精品国产色婷婷电影| 97超级碰碰碰精品色视频在线观看| 久9热在线精品视频| 国产精品久久视频播放| 在线天堂中文资源库| 搡老岳熟女国产| 亚洲精品中文字幕在线视频| 韩国av一区二区三区四区| 亚洲欧洲精品一区二区精品久久久| 男人的好看免费观看在线视频 | 国产av一区在线观看免费| 久久久精品国产亚洲av高清涩受| 69av精品久久久久久| 国产精品久久久人人做人人爽| 女人高潮潮喷娇喘18禁视频| av免费在线观看网站| 在线观看舔阴道视频| 91精品国产国语对白视频| 亚洲国产精品久久男人天堂| 国产欧美日韩一区二区精品| 国产色视频综合| 亚洲五月婷婷丁香| 久久久久久大精品| 亚洲中文av在线| av在线播放免费不卡| 手机成人av网站| 国内久久婷婷六月综合欲色啪| 欧美成人性av电影在线观看| 日韩欧美一区视频在线观看| 精品国产亚洲在线| 免费在线观看亚洲国产| 黄色女人牲交| 精品卡一卡二卡四卡免费| 久久精品91无色码中文字幕| 国产亚洲av高清不卡| 夜夜夜夜夜久久久久| 午夜福利欧美成人| 91大片在线观看| 国产在线观看jvid| 亚洲情色 制服丝袜| 在线观看免费日韩欧美大片| 丰满的人妻完整版| 欧美激情久久久久久爽电影 | 久久人妻av系列| 国产成人精品无人区| 国产高清视频在线播放一区| 又黄又爽又免费观看的视频| 日韩有码中文字幕| 他把我摸到了高潮在线观看| 亚洲精品一卡2卡三卡4卡5卡| 国产精品永久免费网站| 久久香蕉激情| 国产精品免费一区二区三区在线| 亚洲欧美激情在线| 久久婷婷成人综合色麻豆| 国产欧美日韩一区二区三区在线| 久久久久精品国产欧美久久久| 成人亚洲精品av一区二区| 亚洲国产精品久久男人天堂| 色播在线永久视频| 女人被狂操c到高潮| 国产精品一区二区免费欧美| 一级黄色大片毛片| 国产精品影院久久| 黄片小视频在线播放| 久久久久久国产a免费观看| 一级,二级,三级黄色视频| 美女 人体艺术 gogo| 黄片播放在线免费| 精品一区二区三区视频在线观看免费| 国产不卡一卡二| 叶爱在线成人免费视频播放| x7x7x7水蜜桃| 黑人操中国人逼视频| 国产午夜福利久久久久久| 国产xxxxx性猛交| 天天添夜夜摸| 可以免费在线观看a视频的电影网站| 中文字幕av电影在线播放| 老司机深夜福利视频在线观看| 99久久久亚洲精品蜜臀av| 国产一卡二卡三卡精品| 大型av网站在线播放| 日本撒尿小便嘘嘘汇集6| 国产成人av激情在线播放| 黄色成人免费大全| 一级a爱片免费观看的视频| videosex国产| 日本撒尿小便嘘嘘汇集6| 成人欧美大片| 人人妻,人人澡人人爽秒播| 一二三四社区在线视频社区8| 色播亚洲综合网| 在线av久久热| 久久精品亚洲精品国产色婷小说| 好男人电影高清在线观看| 亚洲精品在线美女| 亚洲成人精品中文字幕电影| 黄色视频,在线免费观看| 中文字幕人妻熟女乱码| 国内精品久久久久久久电影| 最近最新中文字幕大全电影3 | 69精品国产乱码久久久| 50天的宝宝边吃奶边哭怎么回事| 老汉色∧v一级毛片| 国产精品久久久久久精品电影 | 97超级碰碰碰精品色视频在线观看| 亚洲色图综合在线观看| 亚洲人成网站在线播放欧美日韩| 在线免费观看的www视频| 午夜福利在线观看吧| 亚洲男人的天堂狠狠| 欧美日韩瑟瑟在线播放| 欧美黑人精品巨大| 18美女黄网站色大片免费观看| 亚洲avbb在线观看| 国产精品99久久99久久久不卡| 村上凉子中文字幕在线| 狠狠狠狠99中文字幕| 欧美中文日本在线观看视频| 成人国语在线视频| 日韩精品中文字幕看吧| 久久久国产精品麻豆| 好男人电影高清在线观看| 51午夜福利影视在线观看| 在线观看免费日韩欧美大片| av天堂在线播放| 亚洲精品粉嫩美女一区| 很黄的视频免费| 国产1区2区3区精品| 欧美一区二区精品小视频在线| 中文字幕人妻丝袜一区二区| 亚洲人成电影免费在线| 日日爽夜夜爽网站| 午夜免费成人在线视频| 久久人妻熟女aⅴ| 性欧美人与动物交配| 成人永久免费在线观看视频| 男女午夜视频在线观看| 两个人视频免费观看高清| 欧美日韩亚洲国产一区二区在线观看| 成人国产综合亚洲| 日本 av在线| 日本 欧美在线| 国产av一区在线观看免费| 精品福利观看| 亚洲av五月六月丁香网| 97人妻精品一区二区三区麻豆 | 99精品欧美一区二区三区四区| 午夜精品在线福利| 91精品国产国语对白视频| 大型黄色视频在线免费观看| www.熟女人妻精品国产| 免费在线观看影片大全网站| 欧美日韩亚洲综合一区二区三区_| 后天国语完整版免费观看| 夜夜躁狠狠躁天天躁| 欧美亚洲日本最大视频资源| 黄色视频不卡| 国产区一区二久久| www日本在线高清视频| 在线观看一区二区三区| 18美女黄网站色大片免费观看| 成人18禁高潮啪啪吃奶动态图| 国产亚洲精品久久久久久毛片| 欧美黑人精品巨大| 69精品国产乱码久久久| 国产免费男女视频| 久久精品国产亚洲av香蕉五月| 久久天躁狠狠躁夜夜2o2o| 正在播放国产对白刺激| 午夜视频精品福利| 欧美成人性av电影在线观看| 亚洲天堂国产精品一区在线| 国产欧美日韩一区二区三区在线| 日本a在线网址| 亚洲avbb在线观看| 黄色 视频免费看| 女性生殖器流出的白浆| 久久久久国产一级毛片高清牌| 色老头精品视频在线观看| 日本 av在线| 日韩大码丰满熟妇| 成人精品一区二区免费| 美女午夜性视频免费| 人成视频在线观看免费观看| 日韩欧美国产在线观看| 日本免费一区二区三区高清不卡 | 国产亚洲精品av在线| 日韩成人在线观看一区二区三区| 欧美日韩亚洲综合一区二区三区_| 亚洲自拍偷在线| av网站免费在线观看视频| 久久欧美精品欧美久久欧美| 在线观看舔阴道视频| 国产极品粉嫩免费观看在线| 国产男靠女视频免费网站| 久9热在线精品视频| 亚洲av电影在线进入| 欧美乱妇无乱码| 99国产精品免费福利视频| 热re99久久国产66热| 免费看美女性在线毛片视频| ponron亚洲| 欧美一级a爱片免费观看看 | 亚洲av第一区精品v没综合| 亚洲精品一区av在线观看| 啦啦啦观看免费观看视频高清 | 久久久精品国产亚洲av高清涩受| 悠悠久久av| a在线观看视频网站| 亚洲 欧美 日韩 在线 免费| 国产97色在线日韩免费| 欧美在线一区亚洲| 午夜精品国产一区二区电影| 欧美久久黑人一区二区| 99久久综合精品五月天人人| 免费高清在线观看日韩| 久久久久国产一级毛片高清牌| 在线观看免费视频日本深夜| 成人亚洲精品一区在线观看| 这个男人来自地球电影免费观看| 美女免费视频网站| 亚洲一区二区三区色噜噜| 日本在线视频免费播放| 亚洲精品久久国产高清桃花| 搡老岳熟女国产| 免费在线观看视频国产中文字幕亚洲| 99精品在免费线老司机午夜| 欧美中文日本在线观看视频| 啦啦啦 在线观看视频| 人人妻人人澡欧美一区二区 | 在线天堂中文资源库| 国产区一区二久久| 动漫黄色视频在线观看| 精品国产乱码久久久久久男人| 亚洲国产精品久久男人天堂| av天堂在线播放| 免费看十八禁软件| 亚洲专区字幕在线| 日本精品一区二区三区蜜桃| 久久草成人影院| 欧美成人午夜精品| 精品免费久久久久久久清纯| 日日夜夜操网爽| 日本五十路高清| 日本 欧美在线| 亚洲成人精品中文字幕电影| 亚洲性夜色夜夜综合| 99在线视频只有这里精品首页| 中文字幕最新亚洲高清| 三级毛片av免费| 国产免费男女视频| av天堂久久9| 99精品在免费线老司机午夜| 天天躁狠狠躁夜夜躁狠狠躁| 真人一进一出gif抽搐免费| 老司机在亚洲福利影院| 久热这里只有精品99| 久久人妻福利社区极品人妻图片| 夜夜夜夜夜久久久久| 麻豆av在线久日| 久久人妻av系列| 在线视频色国产色| 久久这里只有精品19| 亚洲熟女毛片儿| 久久人妻熟女aⅴ| 亚洲精品av麻豆狂野| 国产精品久久久人人做人人爽| 亚洲成国产人片在线观看| 久久婷婷成人综合色麻豆| 一级,二级,三级黄色视频| 老司机深夜福利视频在线观看| 亚洲中文av在线| 正在播放国产对白刺激| 久久婷婷人人爽人人干人人爱 | 精品不卡国产一区二区三区| 人成视频在线观看免费观看| 日韩精品中文字幕看吧| 欧美成人性av电影在线观看| 欧美性长视频在线观看| 国产精品av久久久久免费| 中文字幕av电影在线播放| 亚洲第一青青草原| 国产精品永久免费网站| 亚洲欧美日韩无卡精品| 亚洲一区高清亚洲精品| 午夜影院日韩av| 国产麻豆成人av免费视频| 久久久久久免费高清国产稀缺| 亚洲国产欧美一区二区综合| 色老头精品视频在线观看| 丝袜美腿诱惑在线| netflix在线观看网站| 欧美黑人欧美精品刺激| 国产aⅴ精品一区二区三区波| 国产在线观看jvid| 精品一区二区三区四区五区乱码| 亚洲久久久国产精品| 亚洲男人的天堂狠狠| 欧美av亚洲av综合av国产av| e午夜精品久久久久久久| 悠悠久久av| 久久性视频一级片| 久久香蕉精品热| 久久久久久久久久久久大奶| 97人妻天天添夜夜摸| 欧美激情高清一区二区三区| 男男h啪啪无遮挡| 久久久水蜜桃国产精品网| 国产精品一区二区在线不卡| 在线观看免费视频网站a站| 狂野欧美激情性xxxx| 此物有八面人人有两片| 国产极品粉嫩免费观看在线| 自线自在国产av| 欧美乱妇无乱码| 亚洲成人免费电影在线观看| 丝袜人妻中文字幕| 侵犯人妻中文字幕一二三四区| 两个人视频免费观看高清| 无限看片的www在线观看| 亚洲无线在线观看| 亚洲中文日韩欧美视频| 国产一区二区三区在线臀色熟女| 久久精品国产综合久久久| 啦啦啦 在线观看视频| 我的亚洲天堂| 午夜福利,免费看| 亚洲国产中文字幕在线视频| 精品人妻在线不人妻| 国产精品久久电影中文字幕| 波多野结衣av一区二区av| 母亲3免费完整高清在线观看| 啦啦啦观看免费观看视频高清 | 国产单亲对白刺激| 丝袜在线中文字幕| 满18在线观看网站| 看片在线看免费视频| 久久久国产欧美日韩av| 大香蕉久久成人网| 国产成+人综合+亚洲专区| 一进一出好大好爽视频| 好男人在线观看高清免费视频 | 男女之事视频高清在线观看| 国产精品乱码一区二三区的特点 | 成人精品一区二区免费| 亚洲av成人一区二区三| 身体一侧抽搐| 国产真人三级小视频在线观看| 19禁男女啪啪无遮挡网站| 91av网站免费观看| 制服诱惑二区| 亚洲成国产人片在线观看| 国产成人精品久久二区二区免费| 久久精品91蜜桃| 日本免费一区二区三区高清不卡 | 成人三级做爰电影| 丝袜美足系列| 在线视频色国产色| 中文字幕人妻熟女乱码| 一二三四在线观看免费中文在| 午夜福利免费观看在线| 亚洲第一欧美日韩一区二区三区| 97人妻天天添夜夜摸| 一二三四社区在线视频社区8| 精品久久蜜臀av无| 12—13女人毛片做爰片一| 狠狠狠狠99中文字幕| 久久青草综合色| 午夜福利欧美成人| 99国产精品一区二区蜜桃av| 黄片小视频在线播放| 国产欧美日韩一区二区精品| 久久久久久久久中文| 亚洲片人在线观看| 亚洲成av人片免费观看| 韩国av一区二区三区四区| 自线自在国产av| 一二三四社区在线视频社区8| 免费看十八禁软件| 成年人黄色毛片网站| 日韩精品中文字幕看吧| 视频区欧美日本亚洲| 亚洲第一电影网av| 亚洲伊人色综图| 国产精华一区二区三区| 欧美日韩瑟瑟在线播放| 琪琪午夜伦伦电影理论片6080| 亚洲精品国产色婷婷电影| av天堂在线播放| 好男人在线观看高清免费视频 | 99久久国产精品久久久| 一个人观看的视频www高清免费观看 | 精品欧美一区二区三区在线| 欧美不卡视频在线免费观看 | 精品国产国语对白av| 亚洲成人国产一区在线观看| 亚洲成国产人片在线观看| 一区二区三区高清视频在线| 亚洲一码二码三码区别大吗| 一区二区三区国产精品乱码| 国产一区在线观看成人免费| 午夜久久久在线观看| 国产精品久久久人人做人人爽| 国产人伦9x9x在线观看| 欧美日本中文国产一区发布| 热re99久久国产66热| 叶爱在线成人免费视频播放| 激情在线观看视频在线高清| 18美女黄网站色大片免费观看| 黄网站色视频无遮挡免费观看| 欧美乱妇无乱码| ponron亚洲| 亚洲欧美激情综合另类| 中文字幕人成人乱码亚洲影| 成人18禁在线播放| 日韩欧美三级三区| 精品久久久久久久人妻蜜臀av | 欧美大码av| 精品乱码久久久久久99久播| 99精品在免费线老司机午夜| 亚洲九九香蕉| 久热爱精品视频在线9| 亚洲国产毛片av蜜桃av| 午夜福利视频1000在线观看 | 国产av精品麻豆| 精品第一国产精品| 午夜精品国产一区二区电影| 1024视频免费在线观看| 黑人操中国人逼视频| 岛国视频午夜一区免费看| 国产精品久久电影中文字幕| 国产欧美日韩一区二区三| 最近最新中文字幕大全电影3 | 久久久精品欧美日韩精品| 欧美日本视频| av视频在线观看入口| 777久久人妻少妇嫩草av网站| 国产成人影院久久av| 亚洲国产欧美日韩在线播放| 亚洲人成伊人成综合网2020| 一级a爱片免费观看的视频| 久久伊人香网站| 男女床上黄色一级片免费看| 亚洲午夜理论影院| 免费搜索国产男女视频| 亚洲精品中文字幕在线视频| 久久这里只有精品19| 丁香欧美五月| 久久久久精品国产欧美久久久| www.999成人在线观看| 国产成人免费无遮挡视频| 大陆偷拍与自拍| 国产精品乱码一区二三区的特点 | 老汉色∧v一级毛片| 国产成人一区二区三区免费视频网站| 日韩成人在线观看一区二区三区| 国产av一区在线观看免费| 亚洲av成人av| 亚洲国产日韩欧美精品在线观看 | 久久久久国产一级毛片高清牌| av视频免费观看在线观看| 亚洲欧美日韩高清在线视频| 国产精品爽爽va在线观看网站 | 91九色精品人成在线观看| 日日干狠狠操夜夜爽| 亚洲专区国产一区二区| 操出白浆在线播放| 人人妻人人澡欧美一区二区 | 美女高潮喷水抽搐中文字幕| 精品卡一卡二卡四卡免费| 满18在线观看网站| 妹子高潮喷水视频| x7x7x7水蜜桃| 午夜福利一区二区在线看| 免费在线观看日本一区| 国产伦人伦偷精品视频| 中文亚洲av片在线观看爽| 1024视频免费在线观看| 天天躁夜夜躁狠狠躁躁| 亚洲第一欧美日韩一区二区三区| 日韩欧美三级三区| 欧美日本视频| 国产精品 国内视频| 悠悠久久av| 久久精品国产99精品国产亚洲性色 | 极品教师在线免费播放| 亚洲色图av天堂| 给我免费播放毛片高清在线观看| 黄色成人免费大全| a级毛片在线看网站| 国产精品乱码一区二三区的特点 | 在线观看舔阴道视频| 国产精品爽爽va在线观看网站 | 精品久久久久久久人妻蜜臀av | 精品卡一卡二卡四卡免费| 亚洲国产精品成人综合色| 国产精品亚洲一级av第二区| 国产精品美女特级片免费视频播放器 | 久久午夜亚洲精品久久| 色在线成人网| xxx96com| 日韩欧美免费精品| 在线观看66精品国产| bbb黄色大片| 一级a爱片免费观看的视频| 久久国产精品人妻蜜桃| 亚洲av电影在线进入| 国产精品98久久久久久宅男小说| 久久香蕉激情| 搡老岳熟女国产| 91老司机精品| 搡老妇女老女人老熟妇| 亚洲精品国产区一区二| 久久久久久亚洲精品国产蜜桃av| 久久中文看片网| 欧美日本视频| 高清毛片免费观看视频网站| 涩涩av久久男人的天堂| 九色国产91popny在线| 午夜福利免费观看在线| 一二三四在线观看免费中文在| 免费在线观看黄色视频的| 男女下面进入的视频免费午夜 | 久久草成人影院| 亚洲国产精品sss在线观看| 久9热在线精品视频| 国产午夜福利久久久久久| 黄片大片在线免费观看| 午夜两性在线视频| 色精品久久人妻99蜜桃| 国产精品免费视频内射| 成在线人永久免费视频| 香蕉久久夜色| 国产精品,欧美在线| 91大片在线观看| 91麻豆精品激情在线观看国产| 国产精品久久电影中文字幕| www.999成人在线观看| 99国产精品一区二区三区| 国产精华一区二区三区| 在线视频色国产色| 人妻丰满熟妇av一区二区三区| 亚洲精品中文字幕一二三四区| 久久婷婷成人综合色麻豆| 欧美成人免费av一区二区三区| 99在线人妻在线中文字幕| 国产精品国产高清国产av| 欧美色视频一区免费| 一a级毛片在线观看| 久久国产亚洲av麻豆专区| 亚洲五月天丁香| 成人国产一区最新在线观看| 多毛熟女@视频| 精品久久久久久久毛片微露脸| 女同久久另类99精品国产91| 久久久久久亚洲精品国产蜜桃av| 中文字幕人妻丝袜一区二区| 久久久久国产精品人妻aⅴ院| 在线观看免费午夜福利视频| 国产免费av片在线观看野外av| 国产亚洲精品av在线| 亚洲五月婷婷丁香| 亚洲美女黄片视频| 欧美国产日韩亚洲一区| 人人妻人人爽人人添夜夜欢视频| 窝窝影院91人妻| 69av精品久久久久久| 日韩免费av在线播放| 午夜久久久在线观看| 99热只有精品国产| 可以在线观看毛片的网站| 国产精品一区二区精品视频观看| 亚洲精品中文字幕一二三四区| 国产精品免费视频内射| 国产精华一区二区三区| 丝袜在线中文字幕| 国产国语露脸激情在线看| 神马国产精品三级电影在线观看 | 国产一区二区三区视频了| 操出白浆在线播放| 亚洲国产看品久久| 精品久久久久久久人妻蜜臀av | 9热在线视频观看99| 亚洲欧美激情综合另类| 十八禁网站免费在线| av免费在线观看网站| 性少妇av在线| 老汉色av国产亚洲站长工具| 9热在线视频观看99| 亚洲成a人片在线一区二区| 国产欧美日韩精品亚洲av| 黄色成人免费大全| 久久久国产成人精品二区| av有码第一页| 午夜两性在线视频| 色av中文字幕| 国产av精品麻豆| 女人被躁到高潮嗷嗷叫费观| 正在播放国产对白刺激| 久久精品国产亚洲av高清一级| 日韩精品青青久久久久久|