Toward feasible machine learning model updates in network-based intrusion detection

被引:16
|
作者
Horchulhack, Pedro [1 ]
Viegas, Eduardo K. [1 ,2 ]
Santin, Altair O. [1 ]
机构
[1] Pontificia Univ Catolica Parana, Grad Program Comp Sci, Curitiba, Parana, Brazil
[2] Technol Innovat Inst, Secure Syst Res Ctr, Abu Dhabi 9639, U Arab Emirates
关键词
Intrusion detection; Stream learning; Reject option; REJECT OPTION; REAL-TIME; ENSEMBLE; SVM;
D O I
10.1016/j.comnet.2021.108618
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Over the last years, several works have proposed highly accurate machine learning (ML) techniques for network-based intrusion detection systems (NIDS), that are hardly used in production environments. In practice, current intrusion detection schemes cannot easily handle network traffic's changing behavior over time, requiring frequent and complex model updates to be periodically performed. As a result, unfeasible amounts of labeled training data must be provided for model updates as time passes, making such proposals unfeasible for the real world. This paper proposes a new intrusion detection model based on stream learning with delayed model updates to make the model update task feasible with a twofold implementation. First, our model maintains the intrusion detection accuracy through a classification assessment approach, even with outdated underlying ML models. The classification with a reject option rationale also allows suppressing potential misclassifications caused by new network traffic behavior. Second, the rejected instances are stored for long periods and used for incremental model updates. As an insight, old rejected instances can be easily labeled through publicly available attack repositories without human assistance. Experiments conducted in a novel dataset containing a year of real network traffic with over 2.6 TB of data have shown that current techniques for intrusion detection cannot cope with the network traffic's evolving behavior, significantly degrading their accuracy over time if no model updates are performed. In contrast, the proposed model can maintain its classification accuracy for long periods without model updates, even improving the false-positive rates by up to 12% while rejecting only 8% of the instances. If periodic model updates are conducted, our proposal can improve the detection accuracy by up to 6% while rejecting only 2% of network events. In addition, the proposed model can perform model updates without human assistance, waiting up to 3 months for the proper event label to be provided without impact on accuracy, while demanding only 3.2% of the computational time and 2% of new instances to be labeled as time passes, making model updates in NIDS a feasible task.
引用
收藏
页数:14
相关论文
共 50 条
  • [31] Intrusion Detection in Industrial Internet of Things Network-Based on Deep Learning Model with Rule-Based Feature Selection
    Awotunde, Joseph Bamidele
    Chakraborty, Chinmay
    Adeniyi, Abidemi Emmanuel
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2021, 2021
  • [32] Intrusion Detection in Industrial Internet of Things Network-Based on Deep Learning Model with Rule-Based Feature Selection
    Awotunde, Joseph Bamidele
    Chakraborty, Chinmay
    Adeniyi, Abidemi Emmanuel
    Wireless Communications and Mobile Computing, 2021, 2021
  • [33] Temporal Convolutional Network-Based Animal Intrusion Detection Model for Smart Farming
    Renuka, N.
    Kannan, N.
    Abinesh, S.
    Dhanushram, S.
    Sowmiya, T.
    2024 4TH INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND SOCIAL NETWORKING, ICPCSN 2024, 2024, : 63 - 66
  • [34] Method of evolutionary neural network-based intrusion detection
    Wang, L
    Yu, G
    Wang, GR
    Wang, D
    2001 INTERNATIONAL CONFERENCES ON INFO-TECH AND INFO-NET PROCEEDINGS, CONFERENCE A-G: INFO-TECH & INFO-NET: A KEY TO BETTER LIFE, 2001, : E13 - E18
  • [35] Method of evolutionary neural network-based intrusion detection
    Wang, Li-Na
    Dong, Xiao-Mei
    Yu, Ge
    Wang, Dong
    Dongbei Daxue Xuebao/Journal of Northeastern University, 2002, 23 (02): : 107 - 110
  • [36] A survey of network-based intrusion detection data sets
    Ring, Markus
    Wunderlich, Sarah
    Scheuring, Deniz
    Landes, Dieter
    Hotho, Andreas
    COMPUTERS & SECURITY, 2019, 86 : 147 - 167
  • [37] Characterizing the Effectiveness of Network-based Intrusion Detection Systems
    Ficke, Eric
    Schweitzer, Kristin M.
    Bateman, Raymond M.
    Xu, Shouhuai
    2018 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM 2018), 2018, : 76 - 81
  • [38] Robust genetic machine learning ensemble model for intrusion detection in network traffic
    Akhtar, Muhammad Ali
    Qadri, Syed Muhammad Owais
    Siddiqui, Maria Andleeb
    Mustafa, Syed Muhammad Nabeel
    Javaid, Saba
    Ali, Syed Abbas
    SCIENTIFIC REPORTS, 2023, 13 (01):
  • [39] Robust genetic machine learning ensemble model for intrusion detection in network traffic
    Muhammad Ali Akhtar
    Syed Muhammad Owais Qadri
    Maria Andleeb Siddiqui
    Syed Muhammad Nabeel Mustafa
    Saba Javaid
    Syed Abbas Ali
    Scientific Reports, 13 (1)
  • [40] Network-based intrusion detection - Modeling for a larger picture
    Totsuka, A
    Ohwada, H
    Fujita, N
    Chakraborty, D
    Keeni, GM
    Shiratori, N
    USENIX ASSOCIATION PROCEEDINGS OF THE SIXTEENTH SYSTEMS ADMINISTRATION CONFERENCE (LISA XVI), 2002, : 227 - 232