<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Intelligent methods for intrusion detection in local area networks</article-title>
      </title-group>
      <contrib-group>
        <aff id="aff0">
          <label>0</label>
          <institution>Alexey Nickolaevich Nazarov Doctor of Technical Science, Professor Professor, National Research University Higher School of Economics</institution>
          ,
          <addr-line>Moscow, Russian Federation</addr-line>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Dmitry Valerievich Pantiukhin Master of Science, Senior lecturer, National Research University Higher School of Economics</institution>
          ,
          <addr-line>Moscow, Russian Federation 142800, Russia, Moscow Region, Stupino, Chaikovskogo str. 52, apt. 32</addr-line>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>Ilya Michailovich Voronkov Master of Science, Head of Departament, International Centre of Informatics and Electronics, ICIE, Moscow, Russian Federation Invited lecturer, National Research University Higher School of Economics</institution>
          ,
          <addr-line>Moscow, Russian Federation</addr-line>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2019</year>
      </pub-date>
      <fpage>138</fpage>
      <lpage>149</lpage>
      <abstract>
        <p>Annotation: Review of intelligent methods for intrusion detection in local area networks is presented. Publically available datasets of intrusions are shortly described. A problem of imbalanced classes appointed and approach for batch training of a neural network intrusion classifier with imbalanced classes is presented. In computer simulation, it is shown that such approach helps to train on classes with small amount of examples by the cost of larger classes.</p>
      </abstract>
      <kwd-group>
        <kwd>information security</kwd>
        <kwd>intrusion detection</kwd>
        <kwd>neural network classifier</kwd>
        <kwd>imbalanced classes</kwd>
        <kwd>intrusion datasets</kwd>
        <kwd>UNSW-NB15 dataset</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1 Introduction</title>
      <p>
        – neural networks, including recurrent [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ], [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ], [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ], convolutional [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ], [
        <xref ref-type="bibr" rid="ref17">17</xref>
        ], [
        <xref ref-type="bibr" rid="ref18">18</xref>
        ] and others [
        <xref ref-type="bibr" rid="ref19">19</xref>
        ], [
        <xref ref-type="bibr" rid="ref20">20</xref>
        ], [
        <xref ref-type="bibr" rid="ref21">21</xref>
        ], [
        <xref ref-type="bibr" rid="ref22">22</xref>
        ].
      </p>
      <p>Most of these works use a KDD99 intrusion dataset that is quite old and has no modern examples of intrusions.
However, today exists large set of publically available labeled datasets with intrusions examples. We use UNSW-NB15
dataset.</p>
    </sec>
    <sec id="sec-2">
      <title>2 Publically available intrusion datasets</title>
      <p>Intrusion detection systems and datasets, which they use to training, can be classified in two big classes: network-based and
host-based. Host based systems make a decisions using information from defended host machines, like CPU usage,
processes launched, errors occurrence etc. Network-based systems make a decisions using information about network
traffics between defended hosts and\or outside networks. There are exist examples of both type of systems and
combinations of them. Datasets, also can be of these two types, here we deal only with network-based ones, but always
remember that for practice better to combine various approaches and use hybrid IDS systems and corresponding datasets.
Below short description of existing publically available datasets is presented.</p>
      <p>
        One of the first and still most popular intrusion dataset was a KDD99Cup [
        <xref ref-type="bibr" rid="ref23">23</xref>
        ], available since 1998-99 and based on
DARPA Intrusion Dataset. It is open, free for researchers, dataset made in Information and Computer Science University of
California. It consists from about 5 million records about network transaction. Each record includes 41 parameters of
network traffic (for example destination IP\port, source IP\port etc.) of three type: categorical, logical (flags) and numeric.
Dataset includes information about 22 types of intrusion in four main classes: Denial of Service (DoS, 3883370 records),
Remote to User (R2L, 1126 records), User to Root (U2R, 52 records), Probe (41102 records) and one class of Normal
packets (972780 records). As we can see, number of records of different classes is quite different. Although dataset was
criticized [
        <xref ref-type="bibr" rid="ref24">24</xref>
        ], it is yet the most popular dataset. Main disadvantages are:
- large number of duplicated, redundant records (about 80%!),
- lack of records of some intrusion classes (U2R, R2L),
- moral obsolescence – dataset was collected in 1998-99 and does not contain information about modern attacks.
      </p>
      <p>
        In 2009, ten years after, KDD99Cup was modified in NSL-KDD [
        <xref ref-type="bibr" rid="ref24">24</xref>
        ], redundant records was dropped, some work for
refining was made and dataset reduced 4 times, see Table 1. Many authors try to modify this dataset, for example PU-IDS
[
        <xref ref-type="bibr" rid="ref25">25</xref>
        ] in which statistics of data was used to generate new, unreal but similar, records (about 200 000 new records), and
generic framework to generate new similar records was presented.
      </p>
      <p>
        In 2012, the UNB ISCX 2012 Intrusion Detection Evaluation Data Set [
        <xref ref-type="bibr" rid="ref26">26</xref>
        ] was created and announced at the Canadian
Institute for Cybersecurity (CIC). This dataset, as well as KDD99, contains information about network connections, but also
offers records of all traffic. Traffic was received within 7 days from a test computer network (6 local subnets, NAT server,
main and secondary server, traffic monitoring tools), under various attack scenarios. Includes 2450324 connections (about
90GB of traffic), of which 68792 are attacks. CIC continue works on this dataset and, in 2017, the UNB ISCX 2017 (known
also as CICIDS2017) dataset was announced. Dataset containing the latest attack scenarios. A tool for traffic analysis was
also presented [
        <xref ref-type="bibr" rid="ref27">27</xref>
        ]. This dataset was used in [
        <xref ref-type="bibr" rid="ref28">28</xref>
        ] for training of different types of neural network classifiers. It is shown
that recurrent neural networks like LSTM or GRU achieve a good results (accuracy &gt;97%).
      </p>
      <p>
        In 2015, the UNSW-NB15 dataset [
        <xref ref-type="bibr" rid="ref29">29</xref>
        ] was created at the Australian Center for Cyber Security. Dataset contains both
records about network connections, and the traffic itself (about 100GB) from the test computer network (3 servers). Dataset
contains 9 types of attacks: Fuzzers, Analysis, Backdoors, DoS, Exploits, Generic, Reconnaissance, Shellcode, Worms.
Each records contains 47 fields - information about network connections and 2 fields - information about the type of
intrusion (or normal packets). The total number of records is about 2 million. Information about network connections is
divided into 4 text files (csv format). Files for training and testing of classifiers, containing respectively 175341 and 82332
records, are separately presented. We will use this dataset in our work. Records amount and description of used intrusions
are shown in Table 2 [
        <xref ref-type="bibr" rid="ref29">29</xref>
        ].
      </p>
      <p>It is important to note, than mostly intrusion features, measured in the UNSW-NB15 dataset are comparable with ones in
the NSL-KDD dataset, so combinations of these datasets can be used for increasing of amount of available data.</p>
      <p>
        Comprehensive comparison of another existing dataset can be found in [
        <xref ref-type="bibr" rid="ref30">30</xref>
        ].
      </p>
      <p>
        Also it can be mention about ADFA dataset from Australian Defense Force Agency which works in different principle, it
consist not from records about network traffic, but from information about running processes on host machine, so can be
used in host-based intrusion detection systems, which is beyond of our work now.
3 Short review of UNSW-NB15 dataset applications in machine learning approaches to intrusion
detection and classification
Recent time UNSW-NB15 dataset is used to create machine learning classifiers by some authors. Some results are
described below1. Hereafter we use the definition and abbreviation according to [
        <xref ref-type="bibr" rid="ref31">31</xref>
        ], “false alarm rate” is synonymous to
“false positive rate”.
      </p>
      <p>
        Firstly, in 2015, creators of UNSW-NB15 dataset propose and compare significant feature selection approach to
UNSWNB15 and KDD99 datasets and build classifiers based on Naive Bayes and EM-clustering approaches [
        <xref ref-type="bibr" rid="ref32">32</xref>
        ]. They show that
such simple approaches works with accuracy about 30-40% but some classes are not recognized at all. In [
        <xref ref-type="bibr" rid="ref33">33</xref>
        ] (2017) other
authors combine Random forest classification method and feature selection approach, and reach better results both for
KDD99 and UNSW-NB15 dataset. In same 2017, another author [
        <xref ref-type="bibr" rid="ref34">34</xref>
        ] combine Random Forest method with “Logitboost”
[
        <xref ref-type="bibr" rid="ref35">35</xref>
        ] boosting algorithm and show better results on both datasets compared to clear Random forest methods [
        <xref ref-type="bibr" rid="ref36">36</xref>
        ] and some
previous approaches, see Table 3 (for Random Forest application in intrusion detection see also [
        <xref ref-type="bibr" rid="ref37">37</xref>
        ]). Boosting is quite
attractive approach to create classifiers, as example in [
        <xref ref-type="bibr" rid="ref38">38</xref>
        ] authors compare a set of boosting methods (Bagged Tree,
AdaBoost, GentleBoost, LogitBoost and RUSBoost algorithms) on UNSW-NB15 dataset and show that Bagged Tree and
GentleBoost classifiers show superior performance (see [
        <xref ref-type="bibr" rid="ref38">38</xref>
        ] for details). Another comparison of boosting presented in [
        <xref ref-type="bibr" rid="ref39">39</xref>
        ]
and ensembling methods in [
        <xref ref-type="bibr" rid="ref40">40</xref>
        ].
      </p>
      <p>1 This review based on IEEEXPLORE publications search engine on the July 2019.</p>
      <p>https://ieeexplore.ieee.org/search/searchresult.jsp?queryText=unsw%20nb15&amp;highlight=true&amp;returnFacets=ALL&amp;returnType=SEARCH&amp;sortType=n
ewest</p>
      <p>
        In 2016 researches apply genetic search to select appropriate features to each class and use Support Vector Machine to
classify intrusions with such features [
        <xref ref-type="bibr" rid="ref41">41</xref>
        ]. They achieve high accuracy, more than 90% for all classes except of “Exploits”
(~80%), and false positive rates less then 0.1%.
      </p>
      <p>
        In 2018 quite interesting approach was introduced in [
        <xref ref-type="bibr" rid="ref42">42</xref>
        ]. Authors use multiscale wavelet transform and perceptron-like
neural network with Hebbian learning for anomaly detection in records with HTTP protocol. They achieve Mean Accuracy
93.56% (wherein Mean TPR is 73.55%, Mean FPR is 4.46%, Mean TNR is 95.53%, Mean FNR: is 26.44%).
      </p>
      <p>
        Creators of UNSW-NB15 continues their work and propose a Collaborative Anomaly Detection Framework, which is
based on modification of Gaussian Mixture Model [
        <xref ref-type="bibr" rid="ref43">43</xref>
        ]. This system installed on each node of cloud network and each node
in training phase create a statistical model of normal data by approximation of probability distribution function using
Gaussian Mixture Model. Then, in testing phase, such model can be used to detect an anomaly, which is interpreted as
intrusion. Such approach can be applied only to detection but not to classification of intrusion. Authors achieve results 96%
in accuracy and detection rate and 4-9% in false positive rate. Similar approaches but with Hidden Markov Models also was
applied in [
        <xref ref-type="bibr" rid="ref44">44</xref>
        ], with Beta Mixture Model in [
        <xref ref-type="bibr" rid="ref45">45</xref>
        ], with Dirichlet Mixture Mechanism in [
        <xref ref-type="bibr" rid="ref46">46</xref>
        ].
      </p>
      <p>
        Some comparison of machine learning approaches for intrusion classification over UNSW-NB15 dataset are made in
[
        <xref ref-type="bibr" rid="ref47">47</xref>
        ]. Authors compare Support Vector Machine, Multilayer Perceptron, Restricted Boltzmann Machine, Sparse
Autoencoder and deep learning architecture with embedding (like word2vec approach). They show that deep learning
approach is better in average than others, but, unfortunately, does not provide information about performance on each
classes for UNSW-NB15 dataset. Autoencoders is also interesting approach to intrusion detection, in [
        <xref ref-type="bibr" rid="ref48">48</xref>
        ] authors present a
two stage approach with autoencoders then second stage uses a results (score – output of classification unit) from first stage.
Such approach shows follow results: 89.134% in accuracy and a 0.7495% in FAR for the UNSW-NB15 dataset.
Combination of deep autoencoder, Support Vector Machine and Artificial Bee Colony searching method was used in [
        <xref ref-type="bibr" rid="ref49">49</xref>
        ]
and show detection accuracy about 90% and FAR about 5%.
      </p>
      <p>
        In [
        <xref ref-type="bibr" rid="ref50">50</xref>
        ] authors provide using a Long-Short-Term-Memory (LSTM) neural network, which is a type of Recurrent Neural
Network, for intrusion detection over UNSW-NB15 dataset. They achieve quite high results (Precision=98.02%;
Accuracy=99.41%; TPR=97.97%; TNR=99.53%, FNR=2.03%, and FPR=0.47%) in detection and show that such approach
works better than, for example, Support Vector Machine. Bidirectional LSTM was used in [
        <xref ref-type="bibr" rid="ref51">51</xref>
        ] and show average 85% in
precision and 88% in recall metrics. It is also shown that some classes are not recognized at all, due to imbalance amount of
data.
      </p>
      <p>
        In [
        <xref ref-type="bibr" rid="ref52">52</xref>
        ] deep learning architecture (16 layers, including fully connected with ReLU activation, dropout, and batch
normalization layers) was created and tested on various intrusion datasets, including UNSW-NB15. Results not so high as
in previous researches, but this architecture in used for large set of different datasets, and clearly show a problem of
imbalanced classes.
      </p>
      <p>
        Authors of [
        <xref ref-type="bibr" rid="ref53">53</xref>
        ] provide a set of techniques (Bootstrap Aggregation, Synthetic Minority Over-sampling, Under-sampling,
and Class Balancer) to deal with imbalanced classes in intrusion detection system. They show minor advantages in term of
area under ROC-curve to whole dataset, but, unfortunately, did not provide any information for classes.
      </p>
      <p>
        Latest article [
        <xref ref-type="bibr" rid="ref54">54</xref>
        ] use a multiple-layer approach consisting of a coarse layer and a fine layer, in which the coarse layer
with the deep convolutional neural network model focuses on identification of N abnormal classes and a normal class.
While in the fine layer, an improved model based on gcForest (caXGBoost) further classifies the abnormal classes into N-1
subclasses. The proposed framework has been compared with the existing deep learning models using dataset NBC, a
combination of UNSW-NB15 and CICIDS2017 including 101 classes. The experimental results show that method
outperforms other single deep learning methods in terms of accuracy, detection rate and FAR and works well with
imbalanced classes.
      </p>
    </sec>
    <sec id="sec-3">
      <title>4 Neural network structure</title>
      <p>Convolutional neural network consists from some number of layers of the next basic types: convolutional layers, fully
connected layers, activation layers. In addition, network can contain different layers, such as normalization layers, dropout
layers etc.</p>
      <p>Convolutional layer performs a convolution of input data and some kernel – set of parameters also known as weights.
Such kernels may be adjustable during training or not. In the last case weights is not changing during training and example
of such layer is pooling layer which is widely use in image processing to decrease number of adjustable parameters, but for
our work number of parameter is not large, so we will not use a convolution with nonadjustable weights. Convolution can
be applied to data of different dimension, for example, 2D convolution is more usable in image processing. In our work, we
will use 1D convolution, because input data presented as a vector, 1D array. In this case, mathematically convolution can be
described as follow. Let xi be the i-th element of the input vector, i = 1 ... N, where N is the number of input parameters, wk
is the k-th element of the kernel (which is also represented as a vector), k = 1..K; w0 is separate coefficient which is called
bias, then the output of a one-dimensional convolutional layer yj defined as (no stride, no padding):</p>
      <p>yj=∑k (xi+k*wk)+w0 , j=1..N-K
Schematically this is shown in Fig.1 (top).</p>
      <p>Layer can contain some number of kernels, ordinary with the same number of parameters. In this case, output of layer is
an union of outputs of each kernel.</p>
      <p>Fully connected layer consists of neurons, each of them multiplies corresponding element of input by its own weight,
summarizes results and adds bias. Inputs to all neurons in a layer is the same. Let xi be the i-th element of the input vector,
i=1...N, where N is the number of input parameters, wi,j is the i-th weights of the j-th neuron, w0,j is the bias of the j-th
neuron, then the output yj of the fully-connected layer is defined as:</p>
      <p>yj=∑i (xi*wi,j)+w0,j
Schematically this is shown in Fig.1 (bottom).</p>
      <p>Comparing convolutional and fully connected layers we can understand that convolutional layer is some particular case
of fully connected one with some weights equal to zero and some weights in different neurons are the same (shared between
neurons). Example of such equivalence for small layer is shown in Fig.1. Convolutional layer uses less number of weights
but still able to perform complex transformation from input to output.
0
w1
w2
w3
0
w0</p>
      <p>Activation layer performs some nonlinear transformation from its inputs to outputs. Both, convolutional and fully
connected layers perform, as we can see, a linear transformation of inputs. Because of this, if we use two of such layers
sequentially, this equivalent to use only one layer (linear transformation of linear transformation is a linear transformation).
Therefore, in practice, convolutional or fully connected layers alternates with activation layers. Activation layers apply
some activation function to inputs. For example, so called ‘sigmoid’ calculates each output y as y=1/(1+e -x), x – input.
Piecewise linear activation function ReLU calculates output as a maximum between 0 and input x. ‘Softmax’ activation
function calculates output yj as yj=exp(xj)/[∑i exp(xi)] , xi - i-th input. There are exist large number of different activation
functions. Overall, convolutional neural network consists of alternated convolutional and activation layers and has some
number of fully connected layers at the end, also alternated with activation.</p>
      <p>Structure of network, which we use in our work, is shown in Fig.2. It consist from 5 convolutional layers with ‘sigmoid’
activations and 3 fully connected layers, first and second with ‘sigmoid’ and last with ‘softmax’ activation. Number of
inputs – 190 (see Section IV), number of outputs – 10 (number of classes, 9 intrusions and Normal).</p>
      <p>To use chosen dataset we need preprocess data to be suitable to neural network. We made it in three stage: choosing of
relevant features, coding of nonnumeric data and scaling of numeric data.</p>
      <p>Firstly, we need to drop some irrelevant features. UNSW-NB15 has 47 features field, some of them relates only to that
computer network which used for dataset collection. Namely, we drop following 7 fields from dataset:
- ‘srcip’ (source IP address),
- ‘dstip’ (destination IP address),
- ‘sport’ (source port number),
- ‘dsport’ (destination port number),
- ‘stime’ (record start time),
- ‘ltime’ (record last time),
-‘res_bdy_len’ because this field does not change in dataset.</p>
      <p>Among other fields, dataset contains 3 categorical (string) fields:
- ‘proto’ (transaction protocol), has 129 different values (‘udp’, ‘tcp’, arp’ etc.);
- ‘servis’, has 8 values (‘http’, ‘ftp’, ‘smtp’, ‘ssh’, ‘dns’, ‘ftp-data’, ‘ir and '-‘ if not used);
- ‘state’, depend on transaction protocol and has 16 values (ACC, CLO, CON, ECO, ECR, FIN, INT, MAS, PAR, REQ,
RST, TST, TXD, URH, URN and ‘-‘ if not applicable).</p>
      <p>We code this categorical fields using one-hot encoding scheme then a sparse vector with ‘0’ and only one ‘1’ show the
value of fields. Therefore, for categorical fields we have output vector of 153 (129+8+16) length. 15 of 37 numerical fields
scaled by division to appropriate value to make range almost equal and remaining 22 fields unchanged.</p>
      <sec id="sec-3-1">
        <title>Input: 190 elements Convolution layer 1, 64 kernels of size 1*5 Output: 186*64 </title>
        <sec id="sec-3-1-1">
          <title>Activation layer 1, sigmoid</title>
        </sec>
        <sec id="sec-3-1-2">
          <title>Activation layer 2, sigmoid</title>
        </sec>
        <sec id="sec-3-1-3">
          <title>Activation layer 3, sigmoid</title>
        </sec>
        <sec id="sec-3-1-4">
          <title>Activation layer 4, sigmoid</title>
        </sec>
        <sec id="sec-3-1-5">
          <title>Activation layer 5, sigmoid</title>
        </sec>
        <sec id="sec-3-1-6">
          <title>Fully connected layer 1, 256 neurons</title>
        </sec>
        <sec id="sec-3-1-7">
          <title>Activation layer 6, sigmoid</title>
        </sec>
        <sec id="sec-3-1-8">
          <title>Fully connected layer 2, 64 neurons</title>
        </sec>
        <sec id="sec-3-1-9">
          <title>Activation layer 7, sigmoid</title>
        </sec>
        <sec id="sec-3-1-10">
          <title>Fully connected layer 3, 10 neurons</title>
        </sec>
        <sec id="sec-3-1-11">
          <title>Activation layer 8, softmax</title>
        </sec>
      </sec>
      <sec id="sec-3-2">
        <title>Output: 10 elements</title>
        <p>Desired outputs of neural network classifier is 10-dimensional vectors showed class of input data. We have 9 classes of
intrusions (‘Fuzzers’, ‘Analysis’, ‘Backdoors’, ‘DoS’, ‘Exploits’, ‘Generic’, ‘Reconnaissance’, ‘Shellcode’, ‘Worms’) and
one class of normal packets (‘Normal’). The same one-hot encoding scheme used for outputs.</p>
        <p>
          Neural network trained using ‘RMS-prop’ [
          <xref ref-type="bibr" rid="ref55">55</xref>
          ] method, which is one of the modification of gradient-based method
realized in ‘keras’ [
          <xref ref-type="bibr" rid="ref28">28</xref>
          ] library. Training is an iterative process in which loss-function minimizes. On each iteration,
examples of inputs and corresponding desired outputs processed in neural network.
        </p>
        <p>Common choice for large datasets is to use so called ‘batches’ – combination of inputs\outputs of some length. This
batches varies in each iteration and random input\output examples taken to a batch (see Fig.3 top).</p>
        <p>In our work, we show that for situations then amount of examples in classes is very different better to use another
approach for batch forming, namely predefine amount of examples of each class in batch (see Fig.3 bottom). For example,
if batch size is 300 and we have 10 classes then we can form a batch that consist of 30 random examples of each class.</p>
        <p>Random choice
1
2
3
4
5 6 7 8 ...</p>
        <p>BATCH without class‐balance
Class 1</p>
        <p>Class 2
...</p>
        <p>Class К
Training data</p>
        <p>Training data
1
2
3
4
5
6
7
8
9</p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>6 Results and discussion</title>
      <p>
        For computational experiments we use next software products:
- programming language: Python 3.5 with Anaconda 4.2.0;
- Microsoft Visual Studio 2017, v15.5.2;
- neural networks training: : keras 2.0.2 with tensorflow (GPU version) 1.1.0;
- additional: pandas 0.20.1 for text file processing, numpy 1.13.1 for calculations, scikit-learn 0.18.1 for data
encoding, matplotlib 2.0.2 for visulization.
and hardware:
- computer with IntellCore i7, 3.4GHz, 32 Gb
- graphical processing unit Nvidia Quadro K600, 1Gb
We use the following configuration of neural networks:
- structure showed in Fig.2;
- batch size: 256;
- learning rate lr=0.001;
- maximum allowed training epochs: 200;
- other parameters are by default of keras library [
        <xref ref-type="bibr" rid="ref55">55</xref>
        ].
      </p>
      <p>We train and compare neural network in two variants: with random batches (default) and with class-balanced batches.
Test data differ from train data, experiments repeat several times, mean results are shown.</p>
      <p>
        Fig. 4 and 5 shows results of experiment. Fig. 4 shows confusion matrix on train and test data. Confusion matrix show
how much data recognized well (diagonal elements) and how many mistakes (non-diagonal elements). Fig.5 shows value of
loss function and accuracy during training both on train and test data. Loss-function is a categorical cross-entropy [
        <xref ref-type="bibr" rid="ref55">55</xref>
        ].
      </p>
      <p>Analyzing the results we can see that class-balanced approach to batch forming can improve recognition performance of
classes with small number of examples. Without such balance it is possible that some classes will be absolutely ignored by
neural network (‘worms’, ‘backdoors’ in our experiment). In addition, we can see that better accuracy (and loss) does not
guaranteed that classification will be better (see Fig.4 and 5 that shows that accuracy is better for random batch forming but
some classes does not recognized at all).</p>
      <p>But it is need to understand that better recognition of classes with small number of examples achieved at the expense of
worse recognition of classes with large number of examples (compare ‘Normal’ and ‘Exploits’ for both cases). Therefore,
such approach allow to control, is some degree, recognition performance of different classes and can be used in systems
with different importance of classes. Note also that usage of class-balanced approach is not a guarantee of good recognition
and only a one means to increasing of such recognition (see for example on class ‘Analysis’ which is not recognized nor by
random batch forming nor by class-balanced one).</p>
    </sec>
    <sec id="sec-5">
      <title>7 Conclusion</title>
      <p>In this work we show that for intrusion detection tasks it is a common situation then amount of examples of data of various
classes is quite different. In this case training process of neural networks for intrusion recognition need to be modified to
achieve better recognition of classes with small amount of examples. We describe an approach of class-balanced batch
forming and show in experiment that it can improve recognition performance of classes with small number of examples by
the expense of decreased recognition performance of classes with large number of examples.</p>
      <p>Approach can be enlarged to control relative importance of classes by varying proportion of classes presented in batch.</p>
      <p>
        Previously reported UNSW-NB15 dataset were used to support this study and it is available at
10.1080/19393555.2015.1125974, and can be downloaded from
https://www.unsw.adfa.edu.au/unsw-canberracyber/cybersecurity/ADFA-NB15-Datasets/ .These prior studies (and datasets) are cited at relevant places within the text as
references [
        <xref ref-type="bibr" rid="ref29">29</xref>
        ].
      </p>
    </sec>
    <sec id="sec-6">
      <title>8 Acknowledgement</title>
      <p>Support from the Basic Research Program of the National Research University Higher School of Economics is gratefully
acknowledged.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>S.</given-names>
            <surname>Kumar</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E. H.</given-names>
            <surname>Spafford</surname>
          </string-name>
          , “
          <article-title>A pattern matching model for misuse intrusion detection,”</article-title>
          <source>in Proc. of the 17th National Computer Security Conference</source>
          , Baltimore,
          <string-name>
            <surname>MD</surname>
          </string-name>
          , USA,
          <year>1995</year>
          , pp.
          <fpage>11</fpage>
          -
          <lpage>21</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <surname>Erlacher</surname>
            and
            <given-names>F.</given-names>
          </string-name>
          <string-name>
            <surname>Dressler</surname>
          </string-name>
          ,
          <article-title>"FIXIDS: A high-speed signature-based flow intrusion detection system," NOMS 2018 - 2018 IEEE/IFIP Network Operations</article-title>
          and
          <string-name>
            <given-names>Management</given-names>
            <surname>Symposium</surname>
          </string-name>
          , Taipei,
          <year>2018</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>8</lpage>
          . doi:
          <volume>10</volume>
          .1109/NOMS.
          <year>2018</year>
          .8406247
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>S. T.</given-names>
            <surname>Eckmann</surname>
          </string-name>
          , G. Vigna,
          <string-name>
            <given-names>R. A.</given-names>
            <surname>Kemmerer</surname>
          </string-name>
          , “STATL:
          <article-title>An attack language for state-based intrusion detection</article-title>
          ,”
          <source>in Journal of Computer Security</source>
          , vol.
          <volume>10</volume>
          , №
          <fpage>1</fpage>
          -
          <issue>2</issue>
          , pp.
          <fpage>71</fpage>
          -
          <lpage>103</lpage>
          ,
          <year>2002</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>S.</given-names>
            <surname>Roschke</surname>
          </string-name>
          , F. Cheng and C.
          <article-title>Meinel, "High-quality attack graph-based IDS correlation," in Logic Journal of the IGPL</article-title>
          , vol.
          <volume>21</volume>
          , no.
          <issue>4</issue>
          , pp.
          <fpage>571</fpage>
          -
          <lpage>591</lpage>
          , Aug.
          <year>2013</year>
          . doi:
          <volume>10</volume>
          .1093/jigpal/jzs034
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>O. M.</given-names>
            <surname>Sheyner</surname>
          </string-name>
          , “Scenario Graphs and Attack Graphs,”
          <source>Ph.D. dissertation</source>
          , School of Computer Science, CarnegieMellon University, Pittsburgh, PA, USA,
          <year>2004</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <surname>M. M. Sebring</surname>
          </string-name>
          , “
          <article-title>Expert systems in intrusion detection: a case study,”</article-title>
          <source>in Proc. 11th National</source>
          Computer Security Conference, Baltimore, Maryland, USA,
          <year>1988</year>
          , pp.
          <fpage>74</fpage>
          -
          <lpage>81</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>B.</given-names>
            <surname>Peralta</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Saavedra</surname>
          </string-name>
          and
          <string-name>
            <given-names>L.</given-names>
            <surname>Caro</surname>
          </string-name>
          ,
          <article-title>"A proposal for mixture of experts with entropic regularization," 2017 XLIII Latin American Computer Conference</article-title>
          (CLEI),
          <year>Cordoba</year>
          ,
          <year>2017</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>9</lpage>
          . doi:
          <volume>10</volume>
          .1109/CLEI.
          <year>2017</year>
          .8226425
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>S. E.</given-names>
            <surname>Smaha</surname>
          </string-name>
          , “
          <article-title>Haystack: An intrusion detection system</article-title>
          ,” in IEEE Aerospace Computer Security Applications Conference, Washington, DC, USA,
          <year>1988</year>
          , pp.
          <fpage>37</fpage>
          -
          <lpage>44</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>S.</given-names>
            <surname>Mukkamala</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. H.</given-names>
            <surname>Sung</surname>
          </string-name>
          ,
          <string-name>
            <surname>A</surname>
          </string-name>
          . Abraham, “
          <article-title>Intrusion detection using an ensemble of intelligent paradigms,”</article-title>
          <source>in Journal of Network and Computer Applications</source>
          , vol.
          <volume>28</volume>
          , .№ 2, pp.
          <fpage>167</fpage>
          -
          <lpage>182</lpage>
          ,
          <year>2005</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>C.</given-names>
            <surname>Zhang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Ni</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Yin</surname>
          </string-name>
          and
          <string-name>
            <given-names>K.</given-names>
            <surname>Qiu</surname>
          </string-name>
          ,
          <article-title>"Developed Density Peak Clustering with Support Vector Data Description for Access Network Intrusion Detection,"</article-title>
          <source>in IEEE Access. doi: 10</source>
          .1109/ACCESS.
          <year>2018</year>
          .2866128
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>I.</given-names>
            <surname>Ahmad</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Basheri</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. J.</given-names>
            <surname>Iqbal</surname>
          </string-name>
          and
          <string-name>
            <given-names>A.</given-names>
            <surname>Rahim</surname>
          </string-name>
          ,
          <article-title>"Performance Comparison of Support Vector Machine, Random Forest, and Extreme Learning Machine for Intrusion Detection,"</article-title>
          <source>in IEEE Access</source>
          , vol.
          <volume>6</volume>
          , pp.
          <fpage>33789</fpage>
          -
          <lpage>33795</lpage>
          ,
          <year>2018</year>
          . doi:
          <volume>10</volume>
          .1109/ACCESS.
          <year>2018</year>
          .2841987
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>M.</given-names>
            <surname>Zielinski</surname>
          </string-name>
          , L. Venter, “
          <article-title>Applying mobile agents in an immune-system-based intrusion detection system: reviewed article,” in South African Computer Journal</article-title>
          , vol.
          <year>2005</year>
          , №.34, pp.
          <fpage>76</fpage>
          -
          <lpage>83</lpage>
          ,
          <year>2005</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>W.</given-names>
            <surname>Anani</surname>
          </string-name>
          and
          <string-name>
            <given-names>J.</given-names>
            <surname>Samarabandu</surname>
          </string-name>
          ,
          <article-title>"Comparison of Recurrent Neural Network Algorithms for Intrusion Detection Based on Predicting Packet Sequences,"</article-title>
          2018 IEEE Canadian Conference on Electrical &amp; Computer
          <string-name>
            <surname>Engineering</surname>
            (CCECE), Quebec,
            <given-names>QC</given-names>
          </string-name>
          , Canada,
          <year>2018</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>4</lpage>
          . doi:
          <volume>10</volume>
          .1109/CCECE.
          <year>2018</year>
          .8447793
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>C.</given-names>
            <surname>Xu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Shen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>X.</given-names>
            <surname>Du</surname>
          </string-name>
          and
          <string-name>
            <given-names>F.</given-names>
            <surname>Zhang</surname>
          </string-name>
          ,
          <article-title>"An Intrusion Detection System Using a Deep Neural Network with Gated Recurrent Units,"</article-title>
          <source>in IEEE Access. doi: 10</source>
          .1109/ACCESS.
          <year>2018</year>
          .2867564
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Fu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Lou</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Meng</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Z.</given-names>
            <surname>Tian</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Zhang</surname>
          </string-name>
          and
          <string-name>
            <given-names>F.</given-names>
            <surname>Jiang</surname>
          </string-name>
          ,
          <article-title>"An Intelligent Network Attack Detection Method Based on RNN,"</article-title>
          <source>2018 IEEE Third International Conference on Data Science in Cyberspace (DSC)</source>
          ,
          <year>Guangzhou</year>
          ,
          <year>2018</year>
          , pp.
          <fpage>483</fpage>
          -
          <lpage>489</lpage>
          . doi:
          <volume>10</volume>
          .1109/DSC.
          <year>2018</year>
          .00078
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>U.</given-names>
            <surname>Çekmez</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Z.</given-names>
            <surname>Erdem</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. G.</given-names>
            <surname>Yavuz</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O. K.</given-names>
            <surname>Sahingoz</surname>
          </string-name>
          and
          <string-name>
            <given-names>A.</given-names>
            <surname>Buldu</surname>
          </string-name>
          ,
          <article-title>"Network anomaly detection with deep learning,"</article-title>
          <source>2018 26th Signal Processing and Communications Applications Conference (SIU)</source>
          ,
          <year>Izmir</year>
          ,
          <year>2018</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>4</lpage>
          . doi:
          <volume>10</volume>
          .1109/SIU.
          <year>2018</year>
          .8404817
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <given-names>W.</given-names>
            <surname>Lin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Lin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Wang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Wu</surname>
          </string-name>
          and
          <string-name>
            <given-names>J.</given-names>
            <surname>Tsai</surname>
          </string-name>
          ,
          <article-title>"Using convolutional neural networks to network intrusion detection for cyber threats,"</article-title>
          <source>2018 IEEE International Conference on Applied System Invention (ICASI)</source>
          ,
          <year>Chiba</year>
          ,
          <year>2018</year>
          , pp.
          <fpage>1107</fpage>
          -
          <lpage>1110</lpage>
          . doi:
          <volume>10</volume>
          .1109/ICASI.
          <year>2018</year>
          .8394474
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <given-names>R.</given-names>
            <surname>Vinayakumar</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K. P.</given-names>
            <surname>Soman</surname>
          </string-name>
          and
          <string-name>
            <given-names>P.</given-names>
            <surname>Poornachandran</surname>
          </string-name>
          ,
          <article-title>"Applying convolutional neural network for network intrusion detection,"</article-title>
          <source>2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI)</source>
          ,
          <year>Udupi</year>
          ,
          <year>2017</year>
          , pp.
          <fpage>1222</fpage>
          -
          <lpage>1228</lpage>
          . doi:
          <volume>10</volume>
          .1109/ICACCI.
          <year>2017</year>
          .8126009
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [19]
          <string-name>
            <given-names>H.</given-names>
            <surname>Debar</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Becker</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Siboni</surname>
          </string-name>
          , “
          <article-title>A neural network component for an intrusion detection system,”</article-title>
          <source>in Proc. of 1992 IEEE Computer Society Symposium on Research in Security and Privacy</source>
          , IEEE,
          <year>1992</year>
          , pp.
          <fpage>240</fpage>
          -
          <lpage>250</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [20]
          <string-name>
            <given-names>R.</given-names>
            <surname>Jalili</surname>
          </string-name>
          et al.,
          <article-title>“Detection of distributed denial of service attacks using statistical pre-processor and unsupervised neural networks</article-title>
          ,
          <source>” in International Conference on Information Security Practice and Experience</source>
          , Springer, Berlin, Heidelberg,
          <year>2005</year>
          , pp.
          <fpage>192</fpage>
          -
          <lpage>203</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [21]
          <string-name>
            <given-names>A.</given-names>
            <surname>Nisioti</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Mylonas</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P. D.</given-names>
            <surname>Yoo</surname>
          </string-name>
          and
          <string-name>
            <given-names>V.</given-names>
            <surname>Katos</surname>
          </string-name>
          ,
          <article-title>"From Intrusion Detection to Attacker Attribution: A Comprehensive Survey of Unsupervised Methods,"</article-title>
          <source>in IEEE Communications Surveys &amp; Tutorials. doi: 10</source>
          .1109/COMST.
          <year>2018</year>
          .2854724
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          [22]
          <string-name>
            <given-names>M.</given-names>
            <surname>Zaman</surname>
          </string-name>
          and
          <string-name>
            <given-names>C.</given-names>
            <surname>Lung</surname>
          </string-name>
          ,
          <article-title>"Evaluation of machine learning techniques for network intrusion detection," NOMS 2018 - 2018 IEEE/IFIP Network Operations</article-title>
          and
          <string-name>
            <given-names>Management</given-names>
            <surname>Symposium</surname>
          </string-name>
          , Taipei,
          <year>2018</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>5</lpage>
          . doi:
          <volume>10</volume>
          .1109/NOMS.
          <year>2018</year>
          .8406212
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          <source>[23] “KDD Cup</source>
          <year>1999</year>
          Data.” [Online]. Available: http://kdd.ics.uci.edu/databases/kddcup99/kddcup99
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          [24]
          <string-name>
            <given-names>M.</given-names>
            <surname>Tavallaee</surname>
          </string-name>
          et al.,
          <article-title>“A detailed analysis of the KDD CUP 99 data set,” in 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications (CISDA)</article-title>
          , IEEE,
          <year>2009</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>6</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          [25]
          <string-name>
            <given-names>R.</given-names>
            <surname>Singh</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Kumar</surname>
          </string-name>
          , and
          <string-name>
            <given-names>R.</given-names>
            <surname>Singla</surname>
          </string-name>
          , “
          <article-title>A Reference Dataset for Network Traffic Activity Based Intrusion Detection System</article-title>
          ,”
          <source>International Journal of Computers Communications &amp; Control</source>
          , vol.
          <volume>10</volume>
          , no.
          <issue>3</issue>
          , pp.
          <fpage>390</fpage>
          -
          <lpage>402</lpage>
          ,
          <year>2015</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          [26]
          <string-name>
            <given-names>A.</given-names>
            <surname>Shiravi</surname>
          </string-name>
          et al, “
          <article-title>Toward developing a systematic approach to generate benchmark datasets for intrusion detection</article-title>
          ,
          <source>” in Computers &amp; Security</source>
          , vol.
          <volume>31</volume>
          , № 3, pp.
          <fpage>357</fpage>
          -
          <lpage>374</lpage>
          ,
          <year>2012</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          [27]
          <string-name>
            <given-names>I.</given-names>
            <surname>Sharafaldin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. H.</given-names>
            <surname>Lashkari</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. A.</given-names>
            <surname>Ghorbani</surname>
          </string-name>
          , “
          <article-title>Toward generating a new intrusion detection dataset and intrusion traffic characterization,”</article-title>
          <source>in Proc. of 4th International Conference on Information Systems Security and Privacy (ICISSP)</source>
          , Portugal, Jan.
          <year>2018</year>
          , pp.
          <fpage>108</fpage>
          -
          <lpage>116</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          [28]
          <string-name>
            <surname>Le T. T. H</surname>
          </string-name>
          . et al.
          <source>Network Intrusion Detection Based on Novel Feature Selection Model and Various Recurrent Neural Networks //Applied Sciences. - 2019. - Т. 9</source>
          . -
          <fpage>№</fpage>
          . 7. - p.
          <fpage>1392</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref29">
        <mixed-citation>
          [29]
          <string-name>
            <given-names>N.</given-names>
            <surname>Moustafa</surname>
          </string-name>
          , J.Slay, “
          <article-title>The evaluation of network anomaly detection systems: statistical analysis of the UNSW-NB15 data set and the comparison with the KDD99 data set,” in Information Security Journal: A Global Perspective</article-title>
          , vol.
          <volume>25</volume>
          , №
          <fpage>1</fpage>
          -
          <issue>3</issue>
          , pp.
          <fpage>18</fpage>
          -
          <lpage>31</lpage>
          ,
          <year>2016</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref30">
        <mixed-citation>
          [30]
          <string-name>
            <surname>Ring</surname>
            <given-names>M.</given-names>
          </string-name>
          et al.
          <article-title>A Survey of Network-based Intrusion Detection Data Sets /</article-title>
          /arXiv preprint arXiv:
          <year>1903</year>
          .02460. -
          <fpage>2019</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref31">
        <mixed-citation>
          [31]
          <article-title>Precision and recall</article-title>
          , Wikipedia. [Online]. Available: https://en.wikipedia.org/wiki/Precision_and_recall
        </mixed-citation>
      </ref>
      <ref id="ref32">
        <mixed-citation>
          [32]
          <string-name>
            <given-names>N.</given-names>
            <surname>Moustafa</surname>
          </string-name>
          and
          <string-name>
            <given-names>J.</given-names>
            <surname>Slay</surname>
          </string-name>
          ,
          <article-title>"The Significant Features of the UNSW-NB15 and the KDD99 Data Sets for Network Intrusion Detection Systems," /2015 4th International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security (BADGERS)/</article-title>
          , Kyoto,
          <year>2015</year>
          , pp.
          <fpage>25</fpage>
          -
          <lpage>31</lpage>
          . doi:
          <volume>10</volume>
          .1109/BADGERS.
          <year>2015</year>
          .
          <volume>014</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref33">
        <mixed-citation>
          [33]
          <string-name>
            <given-names>T.</given-names>
            <surname>Janarthanan</surname>
          </string-name>
          and
          <string-name>
            <given-names>S.</given-names>
            <surname>Zargari</surname>
          </string-name>
          ,
          <article-title>"Feature selection in UNSW-NB15 and KDDCUP'99 datasets," /2017 IEEE 26th International Symposium on Industrial Electronics (ISIE)/</article-title>
          , Edinburgh,
          <year>2017</year>
          , pp.
          <fpage>1881</fpage>
          -
          <lpage>1886</lpage>
          . doi:
          <volume>10</volume>
          .1109/ISIE.
          <year>2017</year>
          .
          <volume>8001537</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref34">
        <mixed-citation>
          [34]
          <string-name>
            <given-names>M. H.</given-names>
            <surname>Kamarudin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Maple</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Watson</surname>
          </string-name>
          and
          <string-name>
            <given-names>N. S.</given-names>
            <surname>Safa</surname>
          </string-name>
          ,
          <article-title>"A LogitBoost-Based Algorithm for Detecting Known and Unknown Web Attacks," in /IEEE Access/</article-title>
          , vol.
          <volume>5</volume>
          , pp.
          <fpage>26190</fpage>
          -
          <lpage>26200</lpage>
          ,
          <year>2017</year>
          . doi:
          <volume>10</volume>
          .1109/ACCESS.
          <year>2017</year>
          .
          <volume>2766844</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref35">
        <mixed-citation>
          [35]
          <string-name>
            <given-names>J.</given-names>
            <surname>Friedman</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Hastie</surname>
          </string-name>
          , and
          <string-name>
            <given-names>R.</given-names>
            <surname>Tibshirani</surname>
          </string-name>
          , “
          <article-title>Additive logistic regression: A statistical view of boosting</article-title>
          ,” Ann. Stat., vol.
          <volume>28</volume>
          , no.
          <issue>2</issue>
          , pp.
          <fpage>337</fpage>
          -
          <lpage>374</lpage>
          ,
          <year>2000</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref36">
        <mixed-citation>
          [36]
          <string-name>
            <given-names>H.</given-names>
            <surname>Tribak</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B. L.</given-names>
            <surname>Delgado-Márquez</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Rojas</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Valenzuela</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Pomares</surname>
          </string-name>
          ,
          <string-name>
            <surname>and I. Rojas</surname>
          </string-name>
          , “
          <article-title>Statistical analysis of different artificial intelligent techniques applied to intrusion detection system,”</article-title>
          <source>in Proc. Int. Conf. Multimed. Comput. Syst.</source>
          ,
          <year>2012</year>
          , pp.
          <fpage>434</fpage>
          -
          <lpage>440</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref37">
        <mixed-citation>
          [37]
          <string-name>
            <given-names>R.</given-names>
            <surname>Primartha</surname>
          </string-name>
          and
          <string-name>
            <given-names>B. A.</given-names>
            <surname>Tama</surname>
          </string-name>
          ,
          <article-title>"Anomaly detection using random forest: A performance revisited," /2017 International Conference on Data and Software Engineering (ICoDSE)/</article-title>
          , Palembang,
          <year>2017</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>6</lpage>
          . doi:
          <volume>10</volume>
          .1109/ICODSE.
          <year>2017</year>
          .
          <volume>8285847</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref38">
        <mixed-citation>
          [38]
          <string-name>
            <given-names>V.</given-names>
            <surname>Timčenko</surname>
          </string-name>
          and
          <string-name>
            <given-names>S.</given-names>
            <surname>Gajin</surname>
          </string-name>
          ,
          <article-title>"Ensemble classifiers for supervised anomaly based network intrusion detection,"</article-title>
          <source>/2017 13th IEEE International Conference on Intelligent Computer Communication and Processing</source>
          (ICCP)/, Cluj-Napoca,
          <year>2017</year>
          , pp.
          <fpage>13</fpage>
          -
          <lpage>19</lpage>
          . doi:
          <volume>10</volume>
          .1109/ICCP.
          <year>2017</year>
          .
          <volume>8116977</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref39">
        <mixed-citation>
          [39]
          <string-name>
            <given-names>B.</given-names>
            <surname>Patel</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Z.</given-names>
            <surname>Somani</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S. A.</given-names>
            <surname>Ajila</surname>
          </string-name>
          and
          <string-name>
            <given-names>C.</given-names>
            <surname>Lung</surname>
          </string-name>
          ,
          <article-title>"Hybrid Relabeled Model for Network Intrusion Detection," /2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and</article-title>
          IEEE Cyber,
          <article-title>Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData)/</article-title>
          , Halifax,
          <string-name>
            <surname>NS</surname>
          </string-name>
          , Canada,
          <year>2018</year>
          , pp.
          <fpage>872</fpage>
          -
          <lpage>877</lpage>
          . doi:
          <volume>10</volume>
          .1109/Cybermatics_
          <year>2018</year>
          .
          <year>2018</year>
          .
          <volume>00167</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref40">
        <mixed-citation>
          [40]
          <string-name>
            <given-names>N.</given-names>
            <surname>Moustafa</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Turnbull</surname>
          </string-name>
          and
          <string-name>
            <given-names>K. R.</given-names>
            <surname>Choo</surname>
          </string-name>
          ,
          <article-title>"An Ensemble Intrusion Detection Technique Based on Proposed Statistical Flow Features for Protecting Network Traffic of Internet of Things,"</article-title>
          <source>in /IEEE Internet of Things Journal/</source>
          , vol.
          <volume>6</volume>
          , no.
          <issue>3</issue>
          , pp.
          <fpage>4815</fpage>
          -
          <lpage>4830</lpage>
          ,
          <year>June 2019</year>
          . doi:
          <volume>10</volume>
          .1109/JIOT.
          <year>2018</year>
          .
          <volume>2871719</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref41">
        <mixed-citation>
          [41]
          <string-name>
            <given-names>H.</given-names>
            <surname>Gharaee</surname>
          </string-name>
          and
          <string-name>
            <given-names>H.</given-names>
            <surname>Hosseinvand</surname>
          </string-name>
          ,
          <article-title>"A new feature selection IDS based on genetic algorithm and SVM," /2016 8th International Symposium on Telecommunications (IST)/</article-title>
          , Tehran,
          <year>2016</year>
          , pp.
          <fpage>139</fpage>
          -
          <lpage>144</lpage>
          . doi:
          <volume>10</volume>
          .1109/ISTEL.
          <year>2016</year>
          .7881798
        </mixed-citation>
      </ref>
      <ref id="ref42">
        <mixed-citation>
          [42]
          <string-name>
            <given-names>S.</given-names>
            <surname>Siddiqui</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. S.</given-names>
            <surname>Khan</surname>
          </string-name>
          and
          <string-name>
            <given-names>K.</given-names>
            <surname>Ferens</surname>
          </string-name>
          ,
          <article-title>"Multiscale Hebbian neural network for cyber threat detection," /2017 International Joint Conference on Neural Networks (IJCNN)/</article-title>
          , Anchorage,
          <string-name>
            <surname>AK</surname>
          </string-name>
          ,
          <year>2017</year>
          , pp.
          <fpage>1427</fpage>
          -
          <lpage>1434</lpage>
          . doi:
          <volume>10</volume>
          .1109/IJCNN.
          <year>2017</year>
          .7966020
        </mixed-citation>
      </ref>
      <ref id="ref43">
        <mixed-citation>
          [43]
          <string-name>
            <given-names>N.</given-names>
            <surname>Moustafa</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G.</given-names>
            <surname>Creech</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E.</given-names>
            <surname>Sitnikova</surname>
          </string-name>
          and
          <string-name>
            <given-names>M.</given-names>
            <surname>Keshk</surname>
          </string-name>
          ,
          <article-title>"Collaborative anomaly detection framework for handling big data of cloud computing," /2017 Military Communications</article-title>
          and Information Systems Conference (MilCIS)/, Canberra,
          <string-name>
            <surname>ACT</surname>
          </string-name>
          ,
          <year>2017</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>6</lpage>
          . doi:
          <volume>10</volume>
          .1109/MilCIS.
          <year>2017</year>
          .
          <volume>8190421</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref44">
        <mixed-citation>
          [44]
          <string-name>
            <given-names>N.</given-names>
            <surname>Moustafa</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E.</given-names>
            <surname>Adi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Turnbull</surname>
          </string-name>
          and
          <string-name>
            <given-names>J.</given-names>
            <surname>Hu</surname>
          </string-name>
          ,
          <article-title>"A New Threat Intelligence Scheme for Safeguarding Industry 4.0 Systems,</article-title>
          " in /IEEE Access/, vol.
          <volume>6</volume>
          , pp.
          <fpage>32910</fpage>
          -
          <lpage>32924</lpage>
          ,
          <year>2018</year>
          . doi:
          <volume>10</volume>
          .1109/ACCESS.
          <year>2018</year>
          .
          <volume>2844794</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref45">
        <mixed-citation>
          [45]
          <string-name>
            <given-names>N.</given-names>
            <surname>Moustafa</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Slay</surname>
          </string-name>
          and
          <string-name>
            <given-names>G.</given-names>
            <surname>Creech</surname>
          </string-name>
          ,
          <article-title>"Novel Geometric Area Analysis Technique for Anomaly Detection using Trapezoidal Area Estimation on Large-Scale Networks," in /IEEE Transactions on Big Data/</article-title>
          . doi:
          <volume>10</volume>
          .1109/TBDATA.
          <year>2017</year>
          .
          <volume>2715166</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref46">
        <mixed-citation>
          [46]
          <string-name>
            <given-names>N.</given-names>
            <surname>Moustafa</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K. R.</given-names>
            <surname>Choo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>I.</given-names>
            <surname>Radwan</surname>
          </string-name>
          and
          <string-name>
            <given-names>S.</given-names>
            <surname>Camtepe</surname>
          </string-name>
          ,
          <article-title>"Outlier Dirichlet Mixture Mechanism: Adversarial Statistical Learning for Anomaly Detection in the Fog,"</article-title>
          <source>in /IEEE Transactions on Information Forensics and Security/</source>
          , vol.
          <volume>14</volume>
          , no.
          <issue>8</issue>
          , pp.
          <fpage>1975</fpage>
          -
          <lpage>1987</lpage>
          , Aug.
          <year>2019</year>
          . doi:
          <volume>10</volume>
          .1109/TIFS.
          <year>2018</year>
          .
          <volume>2890808</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref47">
        <mixed-citation>
          [47]
          <string-name>
            <given-names>J.</given-names>
            <surname>Yan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Jin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C. W.</given-names>
            <surname>Lee</surname>
          </string-name>
          and
          <string-name>
            <given-names>P.</given-names>
            <surname>Liu</surname>
          </string-name>
          ,
          <article-title>"A Comparative Study of Off-Line Deep Learning Based Network Intrusion Detection,"</article-title>
          <source>/2018 Tenth International Conference on Ubiquitous and Future Networks (ICUFN)/</source>
          , Prague,
          <year>2018</year>
          , pp.
          <fpage>299</fpage>
          -
          <lpage>304</lpage>
          . doi:
          <volume>10</volume>
          .1109/ICUFN.
          <year>2018</year>
          .
          <volume>8436774</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref48">
        <mixed-citation>
          [48]
          <string-name>
            <given-names>F. A.</given-names>
            <surname>Khan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Gumaei</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Derhab</surname>
          </string-name>
          and
          <string-name>
            <given-names>A.</given-names>
            <surname>Hussain</surname>
          </string-name>
          ,
          <article-title>"A Novel Two-Stage Deep Learning Model for Efficient Network Intrusion Detection," in /IEEE Access/</article-title>
          , vol.
          <volume>7</volume>
          , pp.
          <fpage>30373</fpage>
          -
          <lpage>30385</lpage>
          ,
          <year>2019</year>
          . doi:
          <volume>10</volume>
          .1109/ACCESS.
          <year>2019</year>
          .
          <volume>2899721</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref49">
        <mixed-citation>
          [49]
          <string-name>
            <given-names>Q.</given-names>
            <surname>Tian</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Li</surname>
          </string-name>
          and
          <string-name>
            <given-names>H.</given-names>
            <surname>Liu</surname>
          </string-name>
          ,
          <article-title>"A Method for Guaranteeing Wireless Communication Based on a Combination of Deep and Shallow Learning," in /IEEE Access/</article-title>
          , vol.
          <volume>7</volume>
          , pp.
          <fpage>38688</fpage>
          -
          <lpage>38695</lpage>
          ,
          <year>2019</year>
          . doi:
          <volume>10</volume>
          .1109/ACCESS.
          <year>2019</year>
          .
          <volume>2905754</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref50">
        <mixed-citation>
          [50]
          <string-name>
            <given-names>S.</given-names>
            <surname>Xiao</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>An</surname>
          </string-name>
          and
          <string-name>
            <given-names>W.</given-names>
            <surname>Fan</surname>
          </string-name>
          ,
          <article-title>"Constructing an Intrusion Detection Model based on Long Short-term Neural Networks,"</article-title>
          <source>/2018 IEEE/ACIS 17th International Conference on Computer and Information Science</source>
          (ICIS)/, Singapore,
          <year>2018</year>
          , pp.
          <fpage>355</fpage>
          -
          <lpage>360</lpage>
          . doi:
          <volume>10</volume>
          .1109/ICIS.
          <year>2018</year>
          .
          <volume>8466445</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref51">
        <mixed-citation>
          [51]
          <string-name>
            <given-names>S.</given-names>
            <surname>Yang</surname>
          </string-name>
          ,
          <article-title>"</article-title>
          <source>Research on Network Behavior Anomaly Analysis Based on Bidirectional LSTM," /2019 IEEE 3rd Information Technology</source>
          , Networking, Electronic and Automation Control Conference (ITNEC)/, Chengdu, China,
          <year>2019</year>
          , pp.
          <fpage>798</fpage>
          -
          <lpage>802</lpage>
          . doi:
          <volume>10</volume>
          .1109/ITNEC.
          <year>2019</year>
          .
          <volume>8729475</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref52">
        <mixed-citation>
          [52]
          <string-name>
            <given-names>R.</given-names>
            <surname>Vinayakumar</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Alazab</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K. P.</given-names>
            <surname>Soman</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Poornachandran</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Al-Nemrat</surname>
          </string-name>
          and
          <string-name>
            <given-names>S.</given-names>
            <surname>Venkatraman</surname>
          </string-name>
          ,
          <article-title>"Deep Learning Approach for Intelligent Intrusion Detection System," in /IEEE Access/</article-title>
          , vol.
          <volume>7</volume>
          , pp.
          <fpage>41525</fpage>
          -
          <lpage>41550</lpage>
          ,
          <year>2019</year>
          . doi:
          <volume>10</volume>
          .1109/ACCESS.
          <year>2019</year>
          .
          <volume>2895334</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref53">
        <mixed-citation>
          [53]
          <string-name>
            <given-names>C.</given-names>
            <surname>Wheelus</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E.</given-names>
            <surname>Bou-Harb</surname>
          </string-name>
          and
          <string-name>
            <given-names>X.</given-names>
            <surname>Zhu</surname>
          </string-name>
          ,
          <article-title>"</article-title>
          <source>Tackling Class Imbalance in Cyber Security Datasets," /2018 IEEE International Conference on Information Reuse and Integration</source>
          (IRI)/, Salt Lake City,
          <string-name>
            <surname>UT</surname>
          </string-name>
          ,
          <year>2018</year>
          , pp.
          <fpage>229</fpage>
          -
          <lpage>232</lpage>
          . doi:
          <volume>10</volume>
          .1109/IRI.
          <year>2018</year>
          .
          <volume>00041</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref54">
        <mixed-citation>
          [54]
          <string-name>
            <given-names>X.</given-names>
            <surname>Zhang</surname>
          </string-name>
          , J. Chen,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Zhou</surname>
          </string-name>
          , L. Han and
          <string-name>
            <given-names>J</given-names>
            .
            <surname>Lin</surname>
          </string-name>
          ,
          <article-title>"A Multiple-layer Representation Learning Model for NetworkBased Attack Detection," in /IEEE Access/</article-title>
          . doi:
          <volume>10</volume>
          .1109/ACCESS.
          <year>2019</year>
          .
          <volume>2927465</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref55">
        <mixed-citation>
          [55] “
          <article-title>Keras: The Python Deep Learning Library</article-title>
          .” [Online]. Available: https://keras.io
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>