Skip to main content
Erschienen in: Neural Computing and Applications 23/2020

30.04.2020 | S.I. : Emerging applications of Deep Learning and Spiking ANN

A semi-self-taught network intrusion detection system

verfasst von: Feng Zhao, Hao Zhang, Jia Peng, Xiaohong Zhuang, Sang-Gyun Na

Erschienen in: Neural Computing and Applications | Ausgabe 23/2020

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The ever increasing threat and complexity of modern cyber-attacks requires search for integrated and flexible intelligent defense mechanisms. Such approaches can provide optimal countermeasures, reliable credentials extraction and self-adjusting potential. Given the widespread scale of modern networks and the complexity of cyber-attacks, the problem of self-adaptation goes far beyond the capabilities of network Intrusion Detection Systems (IDS). The main weakness of IDS is the fact that they cannot adapt to new network conditions (“zero day” attacks). This research tries to overcome the above limitation, by introducing a Semi-supervised Discriminant Autoencoder (AUE) which combines Denoising AUEs with a heuristic method of class separation. In essence, the proposed algorithm learns to remodel the displaced specimens instead of the original ones in the super-sphere defined by their closest neighbors. The purpose is to understand the nature of an attack, based on generalized transformed features derived directly from unknown web environments and data.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Sample C, Schaffer K (2013) An overview of anomaly detection—IEEE Journals & Magazine. IT Prof 15(1):8–11CrossRef Sample C, Schaffer K (2013) An overview of anomaly detection—IEEE Journals & Magazine. IT Prof 15(1):8–11CrossRef
2.
Zurück zum Zitat Rudd E et al (2016) A survey of stealth malware: attacks, mitigation measures, and steps toward autonomous open world solutions. arXiv preprint arXiv:1603.06028 Rudd E et al (2016) A survey of stealth malware: attacks, mitigation measures, and steps toward autonomous open world solutions. arXiv preprint arXiv:​1603.​06028
3.
Zurück zum Zitat Novikov D, Yampolskiy RV, Reznik L, (2006) Anomaly detection based intrusion detection. In: Proceedings of the third international conference on information technology: new generations, 10–12 April. IEEE Xplore Press, Las Vegas, pp 420–425 Novikov D, Yampolskiy RV, Reznik L, (2006) Anomaly detection based intrusion detection. In: Proceedings of the third international conference on information technology: new generations, 10–12 April. IEEE Xplore Press, Las Vegas, pp 420–425
4.
Zurück zum Zitat Tartakovsky AG, Rozovskii BL, Blazek RB, Kim H (2006) A novel approach to detection of intrusions in computer networks via adaptive sequential and batch-sequential change-point detection methods. IEEE Trans Signal Process 54(9):3372–3382CrossRef Tartakovsky AG, Rozovskii BL, Blazek RB, Kim H (2006) A novel approach to detection of intrusions in computer networks via adaptive sequential and batch-sequential change-point detection methods. IEEE Trans Signal Process 54(9):3372–3382CrossRef
6.
Zurück zum Zitat Bharti K, Jain S, Shukla S (2010) Fuzzy K-mean clustering via random forest for intrusiion detection system. Int J Comput Sci Eng 2(06):2197–2200 Bharti K, Jain S, Shukla S (2010) Fuzzy K-mean clustering via random forest for intrusiion detection system. Int J Comput Sci Eng 2(06):2197–2200
7.
Zurück zum Zitat Almubayed A, Hadi A, Atoum J (2015) A model for detecting tor encrypted traffic using supervised machine learning, I. J Comput Netw Inf Secur 7:10–23 Almubayed A, Hadi A, Atoum J (2015) A model for detecting tor encrypted traffic using supervised machine learning, I. J Comput Netw Inf Secur 7:10–23
8.
Zurück zum Zitat Sang-Jun H, Sung-Bae C (2005) Evolutionary neural networks for anomaly detection based on the behavior of a program. IEEE Trans Syst Man Cybern 36:559–570CrossRef Sang-Jun H, Sung-Bae C (2005) Evolutionary neural networks for anomaly detection based on the behavior of a program. IEEE Trans Syst Man Cybern 36:559–570CrossRef
9.
Zurück zum Zitat Kolter JZ, Maloof MA (2006) Learning to detect and classify malicious executables in the wild. J ML Res 7:2721–2744MathSciNetMATH Kolter JZ, Maloof MA (2006) Learning to detect and classify malicious executables in the wild. J ML Res 7:2721–2744MathSciNetMATH
10.
Zurück zum Zitat Hsu C-H, Huang C-Y, Chen K-T (2010) Fast-flux bot detection in real time. In: 13th International conference on recent advances in intrusion detection, ser. RAID’10 Hsu C-H, Huang C-Y, Chen K-T (2010) Fast-flux bot detection in real time. In: 13th International conference on recent advances in intrusion detection, ser. RAID’10
11.
Zurück zum Zitat Soltanaghaei E, Kharrazi M (2015) Detection of fast-flux botnets through DNS traffic analysis. Sci Iran 22(6):2389 Soltanaghaei E, Kharrazi M (2015) Detection of fast-flux botnets through DNS traffic analysis. Sci Iran 22(6):2389
12.
Zurück zum Zitat Gardiner J, Nagaraja S (2014) On the reliability of network measurement techniques used for malware traffic analysis. In: Security protocols XXII, pp 321–333 Gardiner J, Nagaraja S (2014) On the reliability of network measurement techniques used for malware traffic analysis. In: Security protocols XXII, pp 321–333
13.
Zurück zum Zitat Cheon EH, Huang Z, Lee YS (2013) Preventing SQL injection attack based on machine learning. Int J Adv Comput Technol 5(9):967–974 Cheon EH, Huang Z, Lee YS (2013) Preventing SQL injection attack based on machine learning. Int J Adv Comput Technol 5(9):967–974
14.
Zurück zum Zitat Burguera I, Zurutuza U, Nadjm-Tehrani S (2011) Crowdroid: behavior-based malware detection system for android. In: 1st ACM workshop on SPSM. ACM, pp 15–26 Burguera I, Zurutuza U, Nadjm-Tehrani S (2011) Crowdroid: behavior-based malware detection system for android. In: 1st ACM workshop on SPSM. ACM, pp 15–26
15.
Zurück zum Zitat Yeo M et al (2018) Flow-based malware detection using convolutional neural network. In: 2018 International conference on information networking (ICOIN), Chiang Mai, pp 910–913 Yeo M et al (2018) Flow-based malware detection using convolutional neural network. In: 2018 International conference on information networking (ICOIN), Chiang Mai, pp 910–913
16.
Zurück zum Zitat Sethi K, Kumar R, Sethi L, Bera P, Patra PK (2019) A novel machine learning based malware detection and classification framework. In: 2019 International conference on cyber security and protection of digital services (cyber security), Oxford, pp 1–4 Sethi K, Kumar R, Sethi L, Bera P, Patra PK (2019) A novel machine learning based malware detection and classification framework. In: 2019 International conference on cyber security and protection of digital services (cyber security), Oxford, pp 1–4
17.
Zurück zum Zitat Halimaa A, Sundarakantham K (2019) Machine learning based intrusion detection system. In: 2019 3rd international conference on trends in electronics and informatics (ICOEI), Tirunelveli, pp 916–920 Halimaa A, Sundarakantham K (2019) Machine learning based intrusion detection system. In: 2019 3rd international conference on trends in electronics and informatics (ICOEI), Tirunelveli, pp 916–920
18.
Zurück zum Zitat Dalvi N, Domingos P, Sanghai S, Verma D (2004) Adversarial classification. In Proceedings of the tenth ACM SIGKDD international conference on knowledge discovery and data mining (KDD), Seattle, 22–25 Aug 2004, pp 99–108 Dalvi N, Domingos P, Sanghai S, Verma D (2004) Adversarial classification. In Proceedings of the tenth ACM SIGKDD international conference on knowledge discovery and data mining (KDD), Seattle, 22–25 Aug 2004, pp 99–108
19.
Zurück zum Zitat Blount JJ, Tauritz DR, Mulder DR (2011) Adaptive rule-based malware detection employing learning classifier systems: a proof of concept. In: 2011 IEEE 35th annual computer software and applications conference workshops, Munich, pp 110–115 Blount JJ, Tauritz DR, Mulder DR (2011) Adaptive rule-based malware detection employing learning classifier systems: a proof of concept. In: 2011 IEEE 35th annual computer software and applications conference workshops, Munich, pp 110–115
20.
Zurück zum Zitat Lee P, Clark A, Alomair B, Bushnell L, Poovendran R (2016) Distributed adaptive patching strategies against malware propagation: a passivity approach. In: 2016 IEEE 55th conference on decision and control (CDC), Las Vegas, pp 2587–2594 Lee P, Clark A, Alomair B, Bushnell L, Poovendran R (2016) Distributed adaptive patching strategies against malware propagation: a passivity approach. In: 2016 IEEE 55th conference on decision and control (CDC), Las Vegas, pp 2587–2594
21.
Zurück zum Zitat Ali MH, Fadlizolkipi M, Firdaus A, Khidzir NZ (2018) A hybrid particle swarm optimization—extreme learning machine approach for intrusion detection system. In: 2018 IEEE student conference on research and development (SCOReD), Selangor, pp 1–4 Ali MH, Fadlizolkipi M, Firdaus A, Khidzir NZ (2018) A hybrid particle swarm optimization—extreme learning machine approach for intrusion detection system. In: 2018 IEEE student conference on research and development (SCOReD), Selangor, pp 1–4
22.
Zurück zum Zitat Usama M, Asim M, Latif S, Qadir J, Ala-Al-Fuqaha (2019) Generative adversarial networks for launching and thwarting adversarial attacks on network intrusion detection systems. In: 2019 15th international wireless communications & mobile computing conference (IWCMC), Tangier, pp 78–83 Usama M, Asim M, Latif S, Qadir J, Ala-Al-Fuqaha (2019) Generative adversarial networks for launching and thwarting adversarial attacks on network intrusion detection systems. In: 2019 15th international wireless communications & mobile computing conference (IWCMC), Tangier, pp 78–83
23.
Zurück zum Zitat Al-Dujaili A, Huang A, Hemberg E, O’Reilly U (2018) Adversarial deep learning for robust detection of binary encoded malware. In: 2018 IEEE security and privacy workshops (SPW), San Francisco, pp 76–82 Al-Dujaili A, Huang A, Hemberg E, O’Reilly U (2018) Adversarial deep learning for robust detection of binary encoded malware. In: 2018 IEEE security and privacy workshops (SPW), San Francisco, pp 76–82
24.
Zurück zum Zitat Haffner P, Sen S, Spatscheck O, Wang D (2005) ACAS: automated construction of application signatures. In: Proceedings of the ACM SIGCOMM, pp 197–202 Haffner P, Sen S, Spatscheck O, Wang D (2005) ACAS: automated construction of application signatures. In: Proceedings of the ACM SIGCOMM, pp 197–202
25.
Zurück zum Zitat Guntuku SC, Narang P, Hota C (2013) Real-time peer-to-peer botnet detection framework based on Bayesian regularized neural network. arXiv:1307.7464 [cs.NI] Guntuku SC, Narang P, Hota C (2013) Real-time peer-to-peer botnet detection framework based on Bayesian regularized neural network. arXiv:​1307.​7464 [cs.NI]
26.
Zurück zum Zitat Gou J, Yi Z, Du L, Xiong T (2012) A local mean-based k-nearest centroid neighbor classifier. Comput J 55(9):1058–1071CrossRef Gou J, Yi Z, Du L, Xiong T (2012) A local mean-based k-nearest centroid neighbor classifier. Comput J 55(9):1058–1071CrossRef
27.
Zurück zum Zitat Shah S, Singh M (2012) Comparison of a time efficient modified K-mean algorithm with K-mean and K-medoid algorithm. In: 2012 International conference on communication systems and network technologies, Rajkot, pp 435–437 Shah S, Singh M (2012) Comparison of a time efficient modified K-mean algorithm with K-mean and K-medoid algorithm. In: 2012 International conference on communication systems and network technologies, Rajkot, pp 435–437
28.
Zurück zum Zitat Chen Z, Yeo CK, Lee BS, Lau CT (2018) Autoencoder-based network anomaly detection. In: 2018 Wireless telecommunications symposium (WTS), Phoenix, pp 1–5 Chen Z, Yeo CK, Lee BS, Lau CT (2018) Autoencoder-based network anomaly detection. In: 2018 Wireless telecommunications symposium (WTS), Phoenix, pp 1–5
29.
Zurück zum Zitat Chapelle O, Schölkopf B, Zien A (2006) Semi-supervised learning in practice. In Semi-supervised learning, MITP, pp 331–331 Chapelle O, Schölkopf B, Zien A (2006) Semi-supervised learning in practice. In Semi-supervised learning, MITP, pp 331–331
30.
Zurück zum Zitat Goodfellow I, Bengio Y, Courville A (2016) Deep learning. MIT Press, CambridgeMATH Goodfellow I, Bengio Y, Courville A (2016) Deep learning. MIT Press, CambridgeMATH
31.
Zurück zum Zitat Wackerly D, Mendenhall W, Scheaffer RL (2008) Mathematical statistics with applications, 7th edn. Thomson Higher Education, BelmontMATH Wackerly D, Mendenhall W, Scheaffer RL (2008) Mathematical statistics with applications, 7th edn. Thomson Higher Education, BelmontMATH
32.
Zurück zum Zitat El-Khamy SE, Sadek RA, El-Khoreby MA (2015) An efficient brain mass detection with adaptive clustered based fuzzy C-mean and thresholding. In: 2015 IEEE international conference on signal and image processing applications (ICSIPA), pp 429–433 El-Khamy SE, Sadek RA, El-Khoreby MA (2015) An efficient brain mass detection with adaptive clustered based fuzzy C-mean and thresholding. In: 2015 IEEE international conference on signal and image processing applications (ICSIPA), pp 429–433
Metadaten
Titel
A semi-self-taught network intrusion detection system
verfasst von
Feng Zhao
Hao Zhang
Jia Peng
Xiaohong Zhuang
Sang-Gyun Na
Publikationsdatum
30.04.2020
Verlag
Springer London
Erschienen in
Neural Computing and Applications / Ausgabe 23/2020
Print ISSN: 0941-0643
Elektronische ISSN: 1433-3058
DOI
https://doi.org/10.1007/s00521-020-04914-7

Weitere Artikel der Ausgabe 23/2020

Neural Computing and Applications 23/2020 Zur Ausgabe

S.I. : Emerging applications of Deep Learning and Spiking ANN

An adversarial semi-supervised approach for action recognition from pose information

S.I. : Emerging applications of Deep Learning and Spiking ANN

Building an efficient OCR system for historical documents with little training data

S.I. : Emerging applications of Deep Learning and Spiking ANN

Critical infrastructure protection based on memory-augmented meta-learning framework

S.I. : Emerging applications of Deep Learning and Spiking ANN

A transformer-based approach to irony and sarcasm detection