A Two-Stage Confidence-Based Intrusion Detection System in Programmable Data-Planes

被引:1
|
作者
Zhang, Kaiyi [1 ]
Samaan, Nancy [1 ]
Karmouch, Ahmed [1 ]
机构
[1] Univ Ottawa, Sch Elect Engn & Comp Sci, Ottawa, ON, Canada
关键词
Intelligent data-planes; convolutional neural networks; anomaly detection; P4; parameter sharing;
D O I
10.1109/GLOBECOM54140.2023.10437314
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The frequent occurrence of network attacks highlights the criticality of developing effective intrusion detection systems (IDSs) that can promptly detect and respond to malicious flows. The proliferation of programmable devices has opened up new possibilities for integrating intelligent IDSs into the data-plane. This allows the execution of machine learning (ML)-based detection models at line-rate, meeting the low latency requirements of anomaly detection. We propose a two-stage confidence-based Intrusion Detection System (TSCIDS) that aims at early detection while considering the level of certainty of prediction. The control-plane adopts a customized transfer learning scheme, wherein two interdependent convolutional neural network (CNN) models are trained, one using the early context of flows and the other adding the later context. A post-hoc calibration method is applied to improve the performance of models. TSCIDS detects anomalous behavior in different phases of flows while allowing the latter CNN to leverage the hidden state of the early CNN. TSCIDS ensures that the two CNN models are integrated into the data-plane pipeline by building the inference steps of CNN into different modules, using switch-supported operations. Simulation results show that the calibrated model can detect more attacks in the early phase compared to the uncalibrated model. Additionally, the training scheme saves the memory consumption of running models on programmable devices.
引用
收藏
页码:6850 / 6855
页数:6
相关论文
共 50 条
  • [41] An Innovative Two-Stage Fuzzy kNN-DST Classifier for Unknown Intrusion Detection
    Jing, Xueyan
    Bi, Yingtao
    Deng, Hai
    INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY, 2016, 13 (04) : 359 - 366
  • [42] Two-stage Part-Based Pedestrian Detection
    Mogelmose, Andreas
    Prioletti, Antonio
    Trivedi, Mohan M.
    Broggi, Alberto
    Moeslund, Thomas B.
    2012 15TH INTERNATIONAL IEEE CONFERENCE ON INTELLIGENT TRANSPORTATION SYSTEMS (ITSC), 2012, : 67 - 71
  • [43] Two-stage image filtering based on limited data
    Grizman, I.S.
    Mikerin, V.I.
    Spektor, A.A.
    Radiotekhnika i Elektronika, 1995, 40 (05): : 817 - 822
  • [44] A two-stage stacked ensemble intrusion detection system using five base classifiers and MLP with optimal feature selection
    Mushtaq, Earum
    Zameer, Aneela
    Khan, Asifullah
    MICROPROCESSORS AND MICROSYSTEMS, 2022, 94
  • [45] APHIDS: A mobile agent-based programmable hybrid intrusion detection system
    Deeter, K
    Singh, K
    Wilson, S
    Filipozzi, L
    Vuong, S
    MOBILITY AWARE TECHNOLOGIES AND APPLICATIONS, PROCEEDINGS, 2004, 3284 : 244 - 253
  • [46] An Intrusion Detection System Based on Big Data for Power System
    Zeng, Sicheng
    Proceedings of the 2016 International Symposium on Advances in Electrical, Electronics and Computer Engineering (ISAEECE), 2016, 69 : 322 - 328
  • [47] A two-stage detection algorithm for the V-BLAST system
    Duong, TQ
    Hong, EK
    Lee, SY
    June, J
    Tran, NL
    2005 IEEE International Workshop on Antenna Technology: Small Antennas Novel MetaMaterials, Proceedings, 2005, : 282 - 286
  • [48] Two-tier based intrusion detection system
    Kim, BJ
    Kim, IK
    FUZZY SYSTEMS AND KNOWLEDGE DISCOVERY, PT 2, PROCEEDINGS, 2005, 3614 : 581 - 591
  • [49] A Novel Intrusion Detection System Based on Data Mining
    Xu Tao
    Zhang Wei
    Li XuHong
    Wang Xia
    Pan Wenwen
    PROCEEDINGS OF THE 2015 4TH INTERNATIONAL CONFERENCE ON COMPUTER, MECHATRONICS, CONTROL AND ELECTRONIC ENGINEERING (ICCMCEE 2015), 2015, 37 : 1306 - 1309
  • [50] Analysis of Data Dependency Based Intrusion Detection System
    Nugmanov, Yermek
    Panda, Brajendra
    Hu, Yi
    DATA AND APPLICATIONS SECURITY XXIII, PROCEEDINGS, 2009, 5645 : 111 - +