Developing a Siamese Network for Intrusion Detection Systems

被引:12
|
作者
Hindy, Hanan [1 ]
Tachtatzis, Christos [2 ]
Atkinson, Robert [2 ]
Bayne, Ethan [1 ]
Bellekens, Xavier [2 ]
机构
[1] Abertay Univ, Div Cyber Secur, Dundee, Scotland
[2] Univ Strathclyde, EEE Dept, Glasgow, Lanark, Scotland
关键词
D O I
10.1145/3437984.3458842
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Machine Learning (ML) for developing Intrusion Detection Systems (IDS) is a fast-evolving research area that has many unsolved domain challenges. Current IDS models face two challenges that limit their performance and robustness. Firstly, they require large datasets to train and their performance is highly dependent on the dataset size. Secondly, zero-day attacks demand that machine learning models are retrained in order to identify future attacks of this type. However, the sophistication and increasing rate of cyber attacks make retraining time prohibitive for practical implementation. This paper proposes a new IDS model that can learn from pair similarities rather than class discriminative features. Learning similarities requires less data for training and provides the ability to flexibly adapt to new cyber attacks, thus reducing the burden of retraining. The underlying model is based on Siamese Networks, therefore, given a number of instances, numerous similar and dissimilar pairs can be generated. The model is evaluated using three mainstream IDS datasets; CICIDS2017, KDD Cup'99, and NSL-KDD. The evaluation results confirm the ability of the Siamese Network model to suit IDS purposes by classifying cyber attacks based on similaritybased learning. This opens a new research direction for building adaptable IDS models using non-conventional ML techniques.
引用
收藏
页码:120 / 126
页数:7
相关论文
共 50 条
  • [21] A novel outlier detection scheme for network intrusion detection systems
    Prakobphol, Komsit
    Zhan, Justin
    PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON INFORMATION SECURITY AND ASSURANCE, 2008, : 555 - 560
  • [22] Genetic convolutional neural network for intrusion detection systems
    Nguyen, Minh Tuan
    Kim, Kiseon
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2020, 113 : 418 - 427
  • [23] Automated Technique for Debugging Network Intrusion Detection Systems
    Nehinbe, Joshua Ojo
    UKSIM-AMSS FIRST INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS, MODELLING AND SIMULATION, 2010, : 362 - 367
  • [24] Adversarial machine learning in Network Intrusion Detection Systems
    Alhajjar, Elie
    Maxwell, Paul
    Bastian, Nathaniel
    EXPERT SYSTEMS WITH APPLICATIONS, 2021, 186
  • [25] Neural network-based intrusion detection systems
    Hu, LX
    He, ZJ
    COMPUTER SCIENCE AND TECHNOLOGY IN NEW CENTURY, 2001, : 296 - 298
  • [26] Soft computing models for network intrusion detection systems
    Abraham, A
    Jain, R
    Classification and Clustering for Knowledge Discovery, 2005, 4 : 191 - 207
  • [27] Methods for Testing Network-Intrusion Detection Systems
    Khorkov, D. A.
    SCIENTIFIC AND TECHNICAL INFORMATION PROCESSING, 2012, 39 (02) : 120 - 126
  • [28] Predicting the Resource Consumption of Network Intrusion Detection Systems
    Dreger, Holger
    Feldmann, Anja
    Paxson, Vern
    Sommer, Robin
    SIGMETRICS'08: PROCEEDINGS OF THE 2008 INTERNATIONAL CONFERENCE ON MEASUREMENT & MODELING OF COMPUTER SYSTEMS, 2008, 36 (01): : 437 - 438
  • [29] Signal Processing Applications in Network Intrusion Detection Systems
    Huang, Chin-Tser
    Chang, Rocky K. C.
    Huang, Polly
    EURASIP JOURNAL ON ADVANCES IN SIGNAL PROCESSING, 2009,
  • [30] Class Imbalance Problem in the Network Intrusion Detection Systems
    Rodda, Sireesha
    Erothi, Uma Shankar Rao
    2016 INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONICS, AND OPTIMIZATION TECHNIQUES (ICEEOT), 2016, : 2685 - 2688