Toward feasible machine learning model updates in network-based intrusion detection

被引:16
|
作者
Horchulhack, Pedro [1 ]
Viegas, Eduardo K. [1 ,2 ]
Santin, Altair O. [1 ]
机构
[1] Pontificia Univ Catolica Parana, Grad Program Comp Sci, Curitiba, Parana, Brazil
[2] Technol Innovat Inst, Secure Syst Res Ctr, Abu Dhabi 9639, U Arab Emirates
关键词
Intrusion detection; Stream learning; Reject option; REJECT OPTION; REAL-TIME; ENSEMBLE; SVM;
D O I
10.1016/j.comnet.2021.108618
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Over the last years, several works have proposed highly accurate machine learning (ML) techniques for network-based intrusion detection systems (NIDS), that are hardly used in production environments. In practice, current intrusion detection schemes cannot easily handle network traffic's changing behavior over time, requiring frequent and complex model updates to be periodically performed. As a result, unfeasible amounts of labeled training data must be provided for model updates as time passes, making such proposals unfeasible for the real world. This paper proposes a new intrusion detection model based on stream learning with delayed model updates to make the model update task feasible with a twofold implementation. First, our model maintains the intrusion detection accuracy through a classification assessment approach, even with outdated underlying ML models. The classification with a reject option rationale also allows suppressing potential misclassifications caused by new network traffic behavior. Second, the rejected instances are stored for long periods and used for incremental model updates. As an insight, old rejected instances can be easily labeled through publicly available attack repositories without human assistance. Experiments conducted in a novel dataset containing a year of real network traffic with over 2.6 TB of data have shown that current techniques for intrusion detection cannot cope with the network traffic's evolving behavior, significantly degrading their accuracy over time if no model updates are performed. In contrast, the proposed model can maintain its classification accuracy for long periods without model updates, even improving the false-positive rates by up to 12% while rejecting only 8% of the instances. If periodic model updates are conducted, our proposal can improve the detection accuracy by up to 6% while rejecting only 2% of network events. In addition, the proposed model can perform model updates without human assistance, waiting up to 3 months for the proper event label to be provided without impact on accuracy, while demanding only 3.2% of the computational time and 2% of new instances to be labeled as time passes, making model updates in NIDS a feasible task.
引用
收藏
页数:14
相关论文
共 50 条
  • [21] Intrusion Detection of Imbalanced Network Traffic Based on Machine Learning and Deep Learning
    Liu, Lan
    Wang, Pengcheng
    Lin, Jun
    Liu, Langzhou
    IEEE Access, 2021, 9 : 7550 - 7563
  • [22] Intrusion Detection of Imbalanced Network Traffic Based on Machine Learning and Deep Learning
    Liu, Lan
    Wang, Pengcheng
    Lin, Jun
    Liu, Langzhou
    IEEE ACCESS, 2021, 9 : 7550 - 7563
  • [23] Network-based Intrusion Detection Through Image-based CNN and Transfer Learning
    Horchulhack, Pedro
    Viegas, Eduardo K.
    Santin, Altair O.
    Simioni, Joao A.
    20TH INTERNATIONAL WIRELESS COMMUNICATIONS & MOBILE COMPUTING CONFERENCE, IWCMC 2024, 2024, : 386 - 391
  • [24] Toward an Online Network Intrusion Detection System Based on Ensemble Learning
    Hsu, Ying-Feng
    He, ZhenYu
    Tarutani, Yuya
    Matsuoka, Morito
    2019 IEEE 12TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING (IEEE CLOUD 2019), 2019, : 174 - 178
  • [25] Performance analysis and feature selection for network-based intrusion detection with deep learning
    Caner, Serhat
    Erdogmus, Nesli
    Erten, Y. Murat
    TURKISH JOURNAL OF ELECTRICAL ENGINEERING AND COMPUTER SCIENCES, 2022, 30 (03) : 629 - 643
  • [26] Comparative research on network intrusion detection methods based on machine learning
    Zhang, Chunying
    Jia, Donghao
    Wang, Liya
    Wang, Wenjie
    Liu, Fengchun
    Yang, Aimin
    COMPUTERS & SECURITY, 2022, 121
  • [27] Research on Network Intrusion Detection Based on SMOTE Algorithm and Machine Learning
    Zhang Y.
    Zhang T.
    Chen J.
    Wang Y.
    Zou Q.
    Beijing Ligong Daxue Xuebao/Transaction of Beijing Institute of Technology, 2019, 39 (12): : 1258 - 1262
  • [28] Research On Network Security Intrusion Detection System Based On Machine Learning
    Luo, Yin
    International Journal of Network Security, 2021, 23 (03) : 490 - 495
  • [29] Application of intrusion detection technology in network safety based on machine learning
    Fang, Weijian
    Tan, Xiaoling
    Wilbur, Dominic
    SAFETY SCIENCE, 2020, 124
  • [30] Research on Network Intrusion Detection Based on Improved Machine Learning Method
    Jian, Yan
    Jian, Liang
    Dong, Xiaoyang
    International Journal of Network Security, 2022, 24 (03): : 533 - 540