Poster: Speeding Up Network Intrusion Detection

被引:0
|
作者
Amado, Joao Romeiras [1 ]
Signorello, Salvatore [2 ]
Correia, Miguel [1 ]
Ramos, Fernando [1 ]
机构
[1] Univ Lisbon, Inst Super Tecn, Lisbon, Portugal
[2] Univ Lisbon, Fac Ciencias, Lisbon, Portugal
关键词
NIDS; programmable data planes; sketches;
D O I
10.1109/icnp49622.2020.9259349
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Modern network data planes have enabled new measurement approaches, including efficient sketch-based techniques with provable trade-offs between memory and accuracy, directly in the data plane, at line rate. We thus ask the question: can one leverage this richer measurement plane to improve network intrusion detection? Our answer is SPID, a push-based, feature-rich network monitoring approach to assist learning-based attack detection. SPID switches run a diverse set of measurement primitives and proactively push measurements to the monitoring system when relevant changes occur. Network measurements are then fed as input features to a classifier based on unsupervised learning to detect ongoing attacks, as they occur. In consequence, SPID aims to reduce attack detection time, when comparing to existing solutions present in large scale networks.
引用
收藏
页数:2
相关论文
共 50 条
  • [41] Deep Stacking Network for Intrusion Detection
    Tang, Yifan
    Gu, Lize
    Wang, Leiting
    SENSORS, 2022, 22 (01)
  • [42] Research on Network Intrusion Detection System
    Xu, Jiang
    Cao, Zhongwei
    MICRO NANO DEVICES, STRUCTURE AND COMPUTING SYSTEMS, 2011, 159 : 77 - +
  • [43] Data analytics for network intrusion detection
    Wang, Lidong
    Jones, Randy
    Journal of Cyber Security Technology, 2020, 4 (02) : 106 - 123
  • [44] Neural network ensembles for intrusion detection
    Golovko, Vladimir
    Kachurka, Pavel
    Vaitsekhovich, Leanid
    IDAACS 2007: PROCEEDINGS OF THE 4TH IEEE WORKSHOP ON INTELLIGENT DATA ACQUISITION AND ADVANCED COMPUTING SYSTEMS: TECHNOLOGY AND APPLICATIONS, 2007, : 578 - 583
  • [45] Improving the Speed of the Network Intrusion Detection
    Sadeghi, Zahra
    Bahrami, Asadollah Shah
    2013 5TH CONFERENCE ON INFORMATION AND KNOWLEDGE TECHNOLOGY (IKT), 2013, : 88 - 91
  • [46] Integrating intrusion detection and network management
    Qin, XH
    Lee, W
    Lewis, L
    Cabrera, JBD
    NOMS 2002: IEEE/IFIP NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM: MANAGEMENT SOLUTIONS FOR THE NEW COMMUNICATIONS WORLD, 2002, : 329 - 344
  • [47] Analysis of Autoencoders for Network Intrusion Detection
    Song, Youngrok
    Hyun, Sangwon
    Cheong, Yun-Gyung
    SENSORS, 2021, 21 (13)
  • [48] Developing expertise for network intrusion detection
    Goodall, John R.
    Lutters, Wayne G.
    Komlodi, Anita
    INFORMATION TECHNOLOGY & PEOPLE, 2009, 22 (02) : 92 - 108
  • [49] Fuzzy network profiling for intrusion detection
    Dickerson, JE
    Dickerson, JA
    PEACHFUZZ 2000 : 19TH INTERNATIONAL CONFERENCE OF THE NORTH AMERICAN FUZZY INFORMATION PROCESSING SOCIETY - NAFIPS, 2000, : 301 - 306
  • [50] A Sequential Approach to Network Intrusion Detection
    Lee, Nicholas
    Ooi, Shih Yin
    Pang, Ying Han
    COMPUTATIONAL SCIENCE AND TECHNOLOGY (ICCST 2019), 2020, 603 : 11 - 21