Improving Multilayer-Perceptron(MLP)-based Network Anomaly Detection with Birch Clustering on CICIDS-2017 Dataset

08/20/2022
by   Yuhua Yin, et al.
0

Machine learning algorithms have been widely used in intrusion detection systems, including Multi-layer Perceptron (MLP). In this study, we proposed a two-stage model that combines the Birch clustering algorithm and MLP classifier to improve the performance of network anomaly multi-classification. In our proposed method, we first apply Birch or Kmeans as an unsupervised clustering algorithm to the CICIDS-2017 dataset to pre-group the data. The generated pseudo-label is then added as an additional feature to the training of the MLP-based classifier. The experimental results show that using Birch and K-Means clustering for data pre-grouping can improve intrusion detection system performance. Our method can achieve 99.73 using Birch clustering, which is better than similar researches using a stand-alone MLP model.

READ FULL TEXT
research
10/05/2019

A Case Study on Using Deep Learning for Network Intrusion Detection

Deep Learning has been very successful in many application domains. Howe...
research
10/17/2019

Multi-level conformal clustering: A distribution-free technique for clustering and anomaly detection

In this work we present a clustering technique called multi-level confor...
research
08/22/2023

Performance Comparison and Implementation of Bayesian Variants for Network Intrusion Detection

Bayesian classifiers perform well when each of the features is completel...
research
11/29/2018

A Machine-Learning Phase Classification Scheme for Anomaly Detection in Signals with Periodic Characteristics

In this paper we propose a novel machine-learning method for anomaly det...
research
11/28/2018

An Adversarial Approach for Explainable AI in Intrusion Detection Systems

Despite the growing popularity of modern machine learning techniques (e....
research
04/27/2022

Detecting Backdoor Poisoning Attacks on Deep Neural Networks by Heatmap Clustering

Predicitions made by neural networks can be fraudulently altered by so-c...
research
01/13/2021

UNSW-NB15 Computer Security Dataset: Analysis through Visualization

This paper presents a visual analysis of the UNSW-NB25 computer network ...

Please sign up or login with your details

Forgot password? Click here to reset