A Two-Stage Confidence-Based Intrusion Detection System in Programmable Data-Planes

被引:1
|
作者
Zhang, Kaiyi [1 ]
Samaan, Nancy [1 ]
Karmouch, Ahmed [1 ]
机构
[1] Univ Ottawa, Sch Elect Engn & Comp Sci, Ottawa, ON, Canada
关键词
Intelligent data-planes; convolutional neural networks; anomaly detection; P4; parameter sharing;
D O I
10.1109/GLOBECOM54140.2023.10437314
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The frequent occurrence of network attacks highlights the criticality of developing effective intrusion detection systems (IDSs) that can promptly detect and respond to malicious flows. The proliferation of programmable devices has opened up new possibilities for integrating intelligent IDSs into the data-plane. This allows the execution of machine learning (ML)-based detection models at line-rate, meeting the low latency requirements of anomaly detection. We propose a two-stage confidence-based Intrusion Detection System (TSCIDS) that aims at early detection while considering the level of certainty of prediction. The control-plane adopts a customized transfer learning scheme, wherein two interdependent convolutional neural network (CNN) models are trained, one using the early context of flows and the other adding the later context. A post-hoc calibration method is applied to improve the performance of models. TSCIDS detects anomalous behavior in different phases of flows while allowing the latter CNN to leverage the hidden state of the early CNN. TSCIDS ensures that the two CNN models are integrated into the data-plane pipeline by building the inference steps of CNN into different modules, using switch-supported operations. Simulation results show that the calibrated model can detect more attacks in the early phase compared to the uncalibrated model. Additionally, the training scheme saves the memory consumption of running models on programmable devices.
引用
收藏
页码:6850 / 6855
页数:6
相关论文
共 50 条
  • [31] A two-stage intrusion detection approach for software-defined IoT networks
    Qiuting Tian
    Dezhi Han
    Meng-Yen Hsieh
    Kuan-Ching Li
    Arcangelo Castiglione
    Soft Computing, 2021, 25 : 10935 - 10951
  • [32] Two-stage Detection of Semantic Redundancies in RDF Data
    Chen, Yiming
    Li, Daiyi
    Yan, Li
    Ma, Zongmin
    JOURNAL OF WEB ENGINEERING, 2022, 21 (08): : 2313 - 2338
  • [33] Two-Stage Dynamic Signal Detection: A Theory of Choice, Decision Time, and Confidence
    Pleskac, Timothy J.
    Busemeyer, Jerome R.
    PSYCHOLOGICAL REVIEW, 2010, 117 (03) : 864 - 901
  • [34] Simulation-based confidence bounds for two-stage stochastic programs
    Glynn, Peter W.
    Infanger, Gerd
    MATHEMATICAL PROGRAMMING, 2013, 138 (1-2) : 15 - 42
  • [35] Simulation-based confidence bounds for two-stage stochastic programs
    Peter W. Glynn
    Gerd Infanger
    Mathematical Programming, 2013, 138 : 15 - 42
  • [36] A Two Stage Intrusion Detection System for Industrial Control Networks Based on Ethernet/IP
    Yu, Wenbin
    Wang, Yiyin
    Song, Lei
    ELECTRONICS, 2019, 8 (12)
  • [37] High Performance Network Intrusion Detection System Using Two-Stage LSTM and Incremental Created Hybrid Features
    Han, Jonghoo
    Pak, Wooguil
    ELECTRONICS, 2023, 12 (04)
  • [38] Intrusion detection system based on data mining
    Zhang, Jishan
    Gan, Yong
    Bian, Zhiwei
    Fifth Wuhan International Conference on E-Business, Vols 1-3: INTEGRATION AND INNOVATION THROUGH MEASUREMENT AND MANAGEMENT, 2006, : 1214 - 1218
  • [39] Intrusion detection system based on data mining
    Zhan Jinhua
    FIRST INTERNATIONAL WORKSHOP ON KNOWLEDGE DISCOVERY AND DATA MINING, PROCEEDINGS, 2007, : 402 - 405
  • [40] STG2P: A two-stage pipeline model for intrusion detection based on and K-means
    Zhang, Zhiqiang
    Wang, Le
    Chen, Guangyao
    Gu, Zhaoquan
    Tian, Zhihong
    Du, Xiaojiang
    Guizani, Mohsen
    SIMULATION MODELLING PRACTICE AND THEORY, 2022, 120