Transfer learning for detecting unknown network attacks

被引:0
|
作者
Juan Zhao
Sachin Shetty
Jan Wei Pan
Charles Kamhoua
Kevin Kwiat
机构
[1] Vanderbilt University Medical Center,Virginia Modeling Analysis and Simulation Center
[2] Old Dominion University,undefined
[3] AutoX Inc,undefined
[4] San Jose,undefined
[5] US Army Research Laboratory’s Network Security Branch,undefined
[6] Haloed Sun TEK,undefined
[7] LLC,undefined
[8] in affiliation with the CAESAR Group,undefined
[9] Sarasota,undefined
关键词
Network attacks detection; Machine learning; Transfer learning;
D O I
暂无
中图分类号
学科分类号
摘要
Network attacks are serious concerns in today’s increasingly interconnected society. Recent studies have applied conventional machine learning to network attack detection by learning the patterns of the network behaviors and training a classification model. These models usually require large labeled datasets; however, the rapid pace and unpredictability of cyber attacks make this labeling impossible in real time. To address these problems, we proposed utilizing transfer learning for detecting new and unseen attacks by transferring the knowledge of the known attacks. In our previous work, we have proposed a transfer learning-enabled framework and approach, called HeTL, which can find the common latent subspace of two different attacks and learn an optimized representation, which was invariant to attack behaviors’ changes. However, HeTL relied on manual pre-settings of hyper-parameters such as relativeness between the source and target attacks. In this paper, we extended this study by proposing a clustering-enhanced transfer learning approach, called CeHTL, which can automatically find the relation between the new attack and known attack. We evaluated these approaches by stimulating scenarios where the testing dataset contains different attack types or subtypes from the training set. We chose several conventional classification models such as decision trees, random forests, KNN, and other novel transfer learning approaches as strong baselines. Results showed that proposed HeTL and CeHTL improved the performance remarkably. CeHTL performed best, demonstrating the effectiveness of transfer learning in detecting new network attacks.
引用
收藏
相关论文
共 50 条
  • [21] On the difficulty of scalably detecting network attacks
    Levchenko, Kirill
    Paturi, Ramamohan
    Varghese, George
    Proc ACM Conf Computer Commun Secur, 1600, (12-20):
  • [22] Detecting network attacks at flow level
    Galtsev, A.A.
    Sukhov, A.M.
    Telecommunications and Radio Engineering (English translation of Elektrosvyaz and Radiotekhnika), 2013, 72 (13): : 1181 - 1188
  • [23] A Dynamic Intrusion Detection System Capable of Detecting Unknown Attacks
    Xing, Na
    Zhao, Shuai
    Wang, Yuehai
    Ning, Keqing
    Liu, Xiufeng
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2023, 14 (07) : 391 - 400
  • [24] Big Data Analysis System Concept for Detecting Unknown Attacks
    Ahn, Sung-Hwan
    Kim, Nam-Uk
    Chung, Tai-Myoung
    2014 16TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY (ICACT), 2014,
  • [25] A Method of Monitoring and Detecting APT Attacks Based on Unknown Domains
    Do Xuan Cho
    Ha Hai Nam
    PROCEEDINGS OF THE 13TH INTERNATIONAL SYMPOSIUM INTELLIGENT SYSTEMS 2018 (INTELS'18), 2019, 150 : 316 - 323
  • [26] A machine learning-based intrusion detection for detecting internet of things network attacks
    Saheed, Yakub Kayode
    Abiodun, Aremu Idris
    Misra, Sanjay
    Holone, Monica Kristiansen
    Colomo-Palacios, Ricardo
    ALEXANDRIA ENGINEERING JOURNAL, 2022, 61 (12) : 9395 - 9409
  • [27] NetSentry: A deep learning approach to detecting incipient large-scale network attacks
    Liu, Haoyu
    Patras, Paul
    COMPUTER COMMUNICATIONS, 2022, 191 : 119 - 132
  • [28] Detecting Network Attacks Based on Behavioral Commonalities
    Najafabadi, Maryam M.
    Khoshgoftaar, Taghi M.
    Napolitano, Amri
    INTERNATIONAL JOURNAL OF RELIABILITY QUALITY AND SAFETY ENGINEERING, 2016, 23 (01)
  • [29] Detecting novel network attacks with a data field
    Xie, Feng
    Bai, Shuo
    INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2006, 3917 : 66 - 72
  • [30] Detecting Homoglyph Attacks with a Siamese Neural Network
    Woodbridge, Jonathan
    Anderson, Hyrum S.
    Ahuja, Anjum
    Grant, Daniel
    2018 IEEE SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (SPW 2018), 2018, : 22 - 28