A Two-Stage Confidence-Based Intrusion Detection System in Programmable Data-Planes

被引:1
|
作者
Zhang, Kaiyi [1 ]
Samaan, Nancy [1 ]
Karmouch, Ahmed [1 ]
机构
[1] Univ Ottawa, Sch Elect Engn & Comp Sci, Ottawa, ON, Canada
关键词
Intelligent data-planes; convolutional neural networks; anomaly detection; P4; parameter sharing;
D O I
10.1109/GLOBECOM54140.2023.10437314
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The frequent occurrence of network attacks highlights the criticality of developing effective intrusion detection systems (IDSs) that can promptly detect and respond to malicious flows. The proliferation of programmable devices has opened up new possibilities for integrating intelligent IDSs into the data-plane. This allows the execution of machine learning (ML)-based detection models at line-rate, meeting the low latency requirements of anomaly detection. We propose a two-stage confidence-based Intrusion Detection System (TSCIDS) that aims at early detection while considering the level of certainty of prediction. The control-plane adopts a customized transfer learning scheme, wherein two interdependent convolutional neural network (CNN) models are trained, one using the early context of flows and the other adding the later context. A post-hoc calibration method is applied to improve the performance of models. TSCIDS detects anomalous behavior in different phases of flows while allowing the latter CNN to leverage the hidden state of the early CNN. TSCIDS ensures that the two CNN models are integrated into the data-plane pipeline by building the inference steps of CNN into different modules, using switch-supported operations. Simulation results show that the calibrated model can detect more attacks in the early phase compared to the uncalibrated model. Additionally, the training scheme saves the memory consumption of running models on programmable devices.
引用
收藏
页码:6850 / 6855
页数:6
相关论文
共 50 条
  • [21] CFS-MHA: A Two-Stage Network Intrusion Detection Framework
    Kaur, Ritinder
    Gupta, Neha
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2022, 16 (01)
  • [22] Two-stage procedure for transportation mode detection based on sighting data
    Chen, Huey-Kuo
    Ho, Hsiao-Chingki
    Wu, Luo-Yu
    Lee, Ian
    Chou, Huey-Wen
    TRANSPORTMETRICA A-TRANSPORT SCIENCE, 2024, 20 (01) : 36 - 36
  • [23] A two-stage flow-based intrusion detection model for next-generation networks
    Umer, Muhammad Fahad
    Sher, Muhammad
    Bi, Yaxin
    PLOS ONE, 2018, 13 (01):
  • [24] IMPLEMENTATION OF THE FPGA BASED PROGRAMMABLE EMBEDDED INTRUSION DETECTION SYSTEM
    Tuncer, Taner
    Tatar, Yetkin
    JOURNAL OF THE FACULTY OF ENGINEERING AND ARCHITECTURE OF GAZI UNIVERSITY, 2012, 27 (01): : 59 - 69
  • [25] A two-stage process based on data mining and optimization to identify false positives and false negatives generated by intrusion detection systems
    Fatma, Hachmi
    Limam, Mohamed
    2015 11TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2015, : 308 - 311
  • [26] TDSC: Two-stage DDoS Detection and Defense System Based on Clustering
    Wei, Shuang
    Ding, Yijing
    Han, Xinhui
    2017 47TH ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS WORKSHOPS (DSN-W 2017), 2017, : 101 - 102
  • [27] A two-stage intrusion detection approach for software-defined IoT networks
    Tian, Qiuting
    Han, Dezhi
    Hsieh, Meng-Yen
    Li, Kuan-Ching
    Castiglione, Arcangelo
    SOFT COMPUTING, 2021, 25 (16) : 10935 - 10951
  • [28] Two-stage database intrusion detection by combining multiple evidence and belief update
    Suvasini Panigrahi
    Shamik Sural
    Arun K. Majumdar
    Information Systems Frontiers, 2013, 15 : 35 - 53
  • [29] Two-stage database intrusion detection by combining multiple evidence and belief update
    Panigrahi, Suvasini
    Sural, Shamik
    Majumdar, Arun K.
    INFORMATION SYSTEMS FRONTIERS, 2013, 15 (01) : 35 - 53
  • [30] A Novel Two-Stage Deep Learning Model for Efficient Network Intrusion Detection
    Khan, Farrukh Aslam
    Gumaei, Abdu
    Derhab, Abdelouahid
    Hussain, Amir
    IEEE ACCESS, 2019, 7 : 30373 - 30385