Rasd: Semantic Shift Detection and Adaptation for Network Intrusion Detection

被引:0
|
作者
Alotaibi, Fahad [1 ]
Maffeis, Sergio [1 ]
机构
[1] Imperial Coll London, Dept Comp, London, England
关键词
Distribution Shift; Shift Detection and Adaptation; Network Security; Intrusion Detection;
D O I
10.1007/978-3-031-65175-5_2
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Network Intrusion Detection Systems (NIDSs) based on Deep Neural Network have demonstrated impressive performance in multi-class, closed-world settings, where training and test data follow the same distribution. However, when deployed in real networks, these systems have a limited ability to detect novel attacks which do not belong to already known classes. In this work, we aim to tackle semantic shift, that is the emergence of unknown classes, by proposing a two-phase approach to detect new classes and integrate them into the classification model, while minimising the need for human intervention. While contrastive learning is a promising techniques to tackle semantic shift, it has high computational cost and it is sensitive to imbalanced data. We propose a novel contrastive learning approach based on synthetic centroids which has low computational cost and is robust to class imbalance, making it suitable for application to NIDS. To integrate the shifted samples in the existing model, we also design a novel adaptation method that combines manual labeling and pseudo-labeling to reduce labeling costs. We evaluate our system, Rasd, on two NIDS datasets, finding it excels in both detection and adaptation. For example Rasd improves on the nearest detection baseline F1-score by 6.83% for IDS 2017 and 19.21% for IDS 2018.
引用
收藏
页码:16 / 30
页数:15
相关论文
共 50 条
  • [41] Fuzzy network profiling for intrusion detection
    Dickerson, John E.
    Dickerson, Julie A.
    Annual Conference of the North American Fuzzy Information Processing Society - NAFIPS, 2000, : 301 - 306
  • [42] Multidimensional network monitoring for intrusion detection
    Gudkov, Vladimir
    Johnson, Joseph E.
    UNIFYING THEMES IN COMPLEX SYSTEMS IV, 2008, : 291 - 302
  • [43] Data Preprocessing for Network Intrusion Detection
    Li, Li
    Ye, Yuan
    INFORMATION TECHNOLOGY FOR MANUFACTURING SYSTEMS, PTS 1 AND 2, 2010, : 867 - 871
  • [44] Developing expertise for network intrusion detection
    Goodall, John R.
    Lutters, Wayne G.
    Komlodi, Anita
    INFORMATION TECHNOLOGY & PEOPLE, 2009, 22 (02) : 92 - 108
  • [45] Fuzzy network profiling for intrusion detection
    Dickerson, JE
    Dickerson, JA
    PEACHFUZZ 2000 : 19TH INTERNATIONAL CONFERENCE OF THE NORTH AMERICAN FUZZY INFORMATION PROCESSING SOCIETY - NAFIPS, 2000, : 301 - 306
  • [46] A Sequential Approach to Network Intrusion Detection
    Lee, Nicholas
    Ooi, Shih Yin
    Pang, Ying Han
    COMPUTATIONAL SCIENCE AND TECHNOLOGY (ICCST 2019), 2020, 603 : 11 - 21
  • [47] A Novel Method for Network Intrusion Detection
    Wang, Hongmin
    Wei, Qiang
    Xie, Yaobin
    SCIENTIFIC PROGRAMMING, 2022, 2022
  • [48] The Intrusion Detection in Mobile Sensor Network
    Keung, Gabriel Y.
    Li, Bo
    Zhang, Qian
    IEEE-ACM TRANSACTIONS ON NETWORKING, 2012, 20 (04) : 1152 - 1161
  • [49] Network stream splitting for intrusion detection
    Judd, JD
    McEachen, JC
    Michael, JB
    Ettlich, DW
    ICON 2003: 11TH IEEE INTERNATIONAL CONFERENCE ON NETWORKS, 2003, : 525 - 530
  • [50] Performance of the Network Intrusion Detection Systems
    Murthy, M. V. Ramana
    Kumar, P. Ram
    Rao, E. Devender
    Sharma, A. C.
    Rajender, S.
    Rambabu, S.
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2009, 9 (10): : 198 - 202