5. We hypothesized that a higher Hilbert curve order
would enhance model efficiency, resulting in a single
image encapsulating 1024 data points.
The experimental results of using the original net-
work data flow to evaluate the classical ML are shown
in table 2. We applied Classical ML such as logistic
regression (LR), and decision tree (DT) to compare
the single sample training on the network data flow.
In conclusion, the HilxSEED model might be one
of the standards for using visualization in intrusion
detection. It successfully addressed the key chal-
lenges in this field, the need for high accuracy, and the
ability to process complex data patterns effectively.
As cyber threats continued to evolve, approaches like
the HilxSEED model were vital in developing robust
and efficient systems to safeguard digital infrastruc-
tures.
5 CONCLUSION
In this study, we proposed the intrusion detection
method. The Hilbert curve serves as a flow-to-image
technique and utilizes an image classification model
to detect the network attack. We map the network
data flow following the coordinates of Hilbert’s curve.
Then, we train and evaluate the HilxSEED model,
an integration of the Encoder-Decoder model and the
SENet model comparing with previous methods on
NSL-KDD and CIC-IDS2017. The result of the pro-
posed HilxSEED model achieved higher performance
than recent models, with 0.817 accuracy and 0.835
F1-score on the NSL-KDD, and 0.924 accuracy and
0.931 F1-score on the CIC-IDS2017.
Our results were influenced by our experiment’s
specific conditions. The Hilbert curve order was lim-
ited by our hardware’s robustness, but future studies
could use higher orders. Notably, as we increased
the Hilbert curve’s order, we generally observed en-
hanced efficiency. A limitation was the difficulty
in visually detecting some attack types, though our
method might indicate these patterns. Furthermore,
exploring other filling curves could further enhance
intrusion detection methodologies.
ACKNOWLEDGEMENTS
This research is partially funded by the FY2023 Grant
for fundamental research, Japan Advanced Institute of
Science and Technology.
REFERENCES
Anderson, J. P. (1980). Computer security threat monitoring
and surveillance. Technical report, James P. Anderson
Company, Fort Washington, Pennsylvania.
Belavagi, M. C. and Muniyal, B. (2016). Performance
evaluation of supervised machine learning algorithms
for intrusion detection. Procedia Computer Science,
89:117–123.
Belej, O., Karpinski, M., Shaikhanova, A., Veselska, O.,
and Azatov, A. (2020). Development of intrusion
monitoring system in wireless sensor networks based
on neural networks. In 2020 IEEE 5th International
Symposium on Smart and Wireless Systems within the
Conferences on Intelligent Data Acquisition and Ad-
vanced Computing Systems (IDAACS-SWS), pages 1–
6.
Denning, D. E. (1987). An intrusion-detection model.
IEEE Transactions on Software Engineering, SE-
13(2):222–232.
Dosovitskiy, A., Beyer, L., Kolesnikov, A., Weissenborn,
D., Zhai, X., Unterthiner, T., Dehghani, M., Minderer,
M., Heigold, G., Gelly, S., Uszkoreit, J., and Houlsby,
N. (2020). An image is worth 16x16 words: Trans-
formers for image recognition at scale.
Feng, C., Wu, S., and Liu, N. (2017). A user-centric ma-
chine learning framework for cyber security opera-
tions center. In 2017 IEEE International Conference
on Intelligence and Security Informatics (ISI), pages
173–175.
Hilbert, D. (1891).
¨
Uber die stetige abbildung einer linie auf
ein fl
¨
achenst
¨
uck. Mathematische Annalen, 38:459–
460.
Ho, C. M. K., Yow, K.-C., Zhu, Z., and Aravamuthan,
S. (2022). Network intrusion detection via flow-to-
image conversion and vision transformer classifica-
tion. IEEE Access, 10:97780–97793.
Hu, J., Shen, L., Albanie, S., Sun, G., and Wu, E. (2020).
Squeeze-and-excitation networks. IEEE Transac-
tions on Pattern Analysis and Machine Intelligence,
42(8):2011–2023.
Khan, R. U., Zhang, X., Alazab, M., and Kumar, R. (2019).
An improved convolutional neural network model for
intrusion detection in networks. In 2019 Cybersecu-
rity and Cyberforensics Conference (CCC), pages 74–
77.
Kim, J., Kim, J., Kim, H., Shim, M., and Choi, E. (2020).
Cnn-based network intrusion detection against denial-
of-service attacks. Electronics, 9(6).
Kim, J., Kim, J., Thi Thu, H. L., and Kim, H. (2016). Long
short term memory recurrent neural network classifier
for intrusion detection. In 2016 International Confer-
ence on Platform Technology and Service (PlatCon),
pages 1–5.
Liu, H. and Lang, B. (2019). Machine learning and deep
learning methods for intrusion detection systems: A
survey. Applied Sciences, 9(20).
Muhuri, P. S., Chatterjee, P., Yuan, X., Roy, K., and Ester-
line, A. (2020). Using a long short-term memory re-
Cybersecurity Intrusion Detection with Image Classification Model Using Hilbert Curve
331