Transfer learning for detecting unknown network attacks

被引:0
|
作者
Juan Zhao
Sachin Shetty
Jan Wei Pan
Charles Kamhoua
Kevin Kwiat
机构
[1] Vanderbilt University Medical Center,Virginia Modeling Analysis and Simulation Center
[2] Old Dominion University,undefined
[3] AutoX Inc,undefined
[4] San Jose,undefined
[5] US Army Research Laboratory’s Network Security Branch,undefined
[6] Haloed Sun TEK,undefined
[7] LLC,undefined
[8] in affiliation with the CAESAR Group,undefined
[9] Sarasota,undefined
关键词
Network attacks detection; Machine learning; Transfer learning;
D O I
暂无
中图分类号
学科分类号
摘要
Network attacks are serious concerns in today’s increasingly interconnected society. Recent studies have applied conventional machine learning to network attack detection by learning the patterns of the network behaviors and training a classification model. These models usually require large labeled datasets; however, the rapid pace and unpredictability of cyber attacks make this labeling impossible in real time. To address these problems, we proposed utilizing transfer learning for detecting new and unseen attacks by transferring the knowledge of the known attacks. In our previous work, we have proposed a transfer learning-enabled framework and approach, called HeTL, which can find the common latent subspace of two different attacks and learn an optimized representation, which was invariant to attack behaviors’ changes. However, HeTL relied on manual pre-settings of hyper-parameters such as relativeness between the source and target attacks. In this paper, we extended this study by proposing a clustering-enhanced transfer learning approach, called CeHTL, which can automatically find the relation between the new attack and known attack. We evaluated these approaches by stimulating scenarios where the testing dataset contains different attack types or subtypes from the training set. We chose several conventional classification models such as decision trees, random forests, KNN, and other novel transfer learning approaches as strong baselines. Results showed that proposed HeTL and CeHTL improved the performance remarkably. CeHTL performed best, demonstrating the effectiveness of transfer learning in detecting new network attacks.
引用
收藏
相关论文
共 50 条
  • [1] Transfer learning for detecting unknown network attacks
    Zhao, Juan
    Shetty, Sachin
    Pan, Jan Wei
    Kamhoua, Charles
    Kwiat, Kevin
    EURASIP JOURNAL ON INFORMATION SECURITY, 2019, 2019 (1)
  • [2] A Deep Learning Ensemble Approach to Detecting Unknown Network Attacks
    Ahmad, Rasheed
    Alsmadi, Izzat
    Alhamdani, Wasim
    Tawalbeh, Lo'ai
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2022, 67
  • [3] Detecting Unknown Network Attacks with Attention Encoding and Deep Metric Learning
    Fu, Chunlan
    Han, Shirong
    Shen, Gang
    2022 IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS, TRUSTCOM, 2022, : 283 - 290
  • [4] A scalable network intrusion detection system towards detecting, discovering, and learning unknown attacks
    Zhang, Zhao
    Zhang, Yong
    Guo, Da
    Song, Mei
    INTERNATIONAL JOURNAL OF MACHINE LEARNING AND CYBERNETICS, 2021, 12 (06) : 1649 - 1665
  • [5] A scalable network intrusion detection system towards detecting, discovering, and learning unknown attacks
    Zhao Zhang
    Yong Zhang
    Da Guo
    Mei Song
    International Journal of Machine Learning and Cybernetics, 2021, 12 : 1649 - 1665
  • [6] Detecting unknown network attacks using language models
    Rieck, Konrad
    Laskov, Pavel
    DETECTION OF INTRUSIONS AND MALWARE & VULNERABILITY ASSESSMENT, PROCEEDINGS, 2006, 4064 : 74 - 90
  • [7] FlowHacker: Detecting Unknown Network Attacks in Big Traffic Data using Network Flows
    Sacramento, Luis
    Medeiros, Iberia
    Bota, Joao
    Correial, Miguel
    2018 17TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (IEEE TRUSTCOM) / 12TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (IEEE BIGDATASE), 2018, : 567 - 572
  • [8] Cybersecurity in Deep Learning Techniques: Detecting Network Attacks
    Ghazal, Shatha Fawaz
    Mjlae, Salameh A.
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2022, 13 (11) : 221 - 230
  • [9] DDoSNet: A Deep-Learning Model for Detecting Network Attacks
    Elsayed, Mahmoud Said
    Nhien-An Le-Khac
    Dev, Soumyabrata
    Jurcut, Anca Delia
    2020 21ST IEEE INTERNATIONAL SYMPOSIUM ON A WORLD OF WIRELESS, MOBILE AND MULTIMEDIA NETWORKS (IEEE WOWMOM 2020), 2020, : 391 - 396
  • [10] Detecting Network Attacks using Federated Learning for IoT Devices
    Shahid, Osama
    Mothukuri, Viraaji
    Pouriyeh, Seyedamin
    Parizi, Reza M.
    Shahriar, Hossain
    2021 IEEE 29TH INTERNATIONAL CONFERENCE ON NETWORK PROTOCOLS (ICNP 2021), 2021,