Toward feasible machine learning model updates in network-based intrusion detection

被引:16
|
作者
Horchulhack, Pedro [1 ]
Viegas, Eduardo K. [1 ,2 ]
Santin, Altair O. [1 ]
机构
[1] Pontificia Univ Catolica Parana, Grad Program Comp Sci, Curitiba, Parana, Brazil
[2] Technol Innovat Inst, Secure Syst Res Ctr, Abu Dhabi 9639, U Arab Emirates
关键词
Intrusion detection; Stream learning; Reject option; REJECT OPTION; REAL-TIME; ENSEMBLE; SVM;
D O I
10.1016/j.comnet.2021.108618
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Over the last years, several works have proposed highly accurate machine learning (ML) techniques for network-based intrusion detection systems (NIDS), that are hardly used in production environments. In practice, current intrusion detection schemes cannot easily handle network traffic's changing behavior over time, requiring frequent and complex model updates to be periodically performed. As a result, unfeasible amounts of labeled training data must be provided for model updates as time passes, making such proposals unfeasible for the real world. This paper proposes a new intrusion detection model based on stream learning with delayed model updates to make the model update task feasible with a twofold implementation. First, our model maintains the intrusion detection accuracy through a classification assessment approach, even with outdated underlying ML models. The classification with a reject option rationale also allows suppressing potential misclassifications caused by new network traffic behavior. Second, the rejected instances are stored for long periods and used for incremental model updates. As an insight, old rejected instances can be easily labeled through publicly available attack repositories without human assistance. Experiments conducted in a novel dataset containing a year of real network traffic with over 2.6 TB of data have shown that current techniques for intrusion detection cannot cope with the network traffic's evolving behavior, significantly degrading their accuracy over time if no model updates are performed. In contrast, the proposed model can maintain its classification accuracy for long periods without model updates, even improving the false-positive rates by up to 12% while rejecting only 8% of the instances. If periodic model updates are conducted, our proposal can improve the detection accuracy by up to 6% while rejecting only 2% of network events. In addition, the proposed model can perform model updates without human assistance, waiting up to 3 months for the proper event label to be provided without impact on accuracy, while demanding only 3.2% of the computational time and 2% of new instances to be labeled as time passes, making model updates in NIDS a feasible task.
引用
收藏
页数:14
相关论文
共 50 条
  • [41] Network-based intrusion detection with support vector machines
    Kim, DS
    Park, JS
    INFORMATION NETWORKING: NETWORKING TECHNOLOGIES FOR ENHANCED INTERNET SERVICES, 2003, 2662 : 747 - 756
  • [42] Policy management for network-based intrusion detection and prevention
    Chen, YM
    Yang, YY
    NOMS 2004: IEEE/IFIP NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM, APPLICATION SESSIONS: MANAGING NEXT GENERATION CONVERGENCE NETWORKS AND SERVICES, 2004, : 219 - 232
  • [43] Problems of network-based intrusion detection system and their countermeasures
    Zhang, Minglai
    Jin, Chengbiao
    Zhao, Wenyun
    Jisuanji Gongcheng/Computer Engineering, 2002, 28 (01):
  • [44] Network-based intrusion detection using Adaboost algorithm
    Hu, W
    Hu, WM
    2005 IEEE/WIC/ACM INTERNATIONAL CONFERENCE ON WEB INTELLIGENCE, PROCEEDINGS, 2005, : 712 - 717
  • [45] Network intrusion detection model based on fuzzy support vector machine
    Long, Yanjun
    Ouyang, Jianquan
    Sun, Xinwen
    Journal of Networks, 2013, 8 (06) : 1387 - 1394
  • [46] Agent-based intrusion detection for network-based application
    Zeng, Jianping
    Guo, Donghui
    International Journal of Network Security, 2009, 8 (03) : 201 - 210
  • [47] On the Evaluation of Sequential Machine Learning for Network Intrusion Detection
    Corsini, Andrea
    Yang, Shanchieh Jay
    Apruzzese, Giovanni
    ARES 2021: 16TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, 2021,
  • [48] Network intrusion detection system: A machine learning approach
    Panda, Mrutyunjaya
    Abraham, Ajith
    Das, Swagatam
    Patra, Manas Ranjan
    INTELLIGENT DECISION TECHNOLOGIES-NETHERLANDS, 2011, 5 (04): : 347 - 356
  • [49] A Review of Machine Learning Methodologies for Network Intrusion Detection
    Phadke, Aditya
    Kulkarni, Mohit
    Bhawalkar, Pranav
    Bhattad, Rashmi
    PROCEEDINGS OF THE 2019 3RD INTERNATIONAL CONFERENCE ON COMPUTING METHODOLOGIES AND COMMUNICATION (ICCMC 2019), 2019, : 272 - 275
  • [50] Application of adversarial machine learning in network intrusion detection
    Liu, Qixu
    Wang, Junnan
    Yin, Jie
    Chen, Yanhui
    Liu, Jiaxi
    Tongxin Xuebao/Journal on Communications, 2021, 42 (11): : 1 - 12