Rasd: Semantic Shift Detection and Adaptation for Network Intrusion Detection

被引:0
|
作者
Alotaibi, Fahad [1 ]
Maffeis, Sergio [1 ]
机构
[1] Imperial Coll London, Dept Comp, London, England
关键词
Distribution Shift; Shift Detection and Adaptation; Network Security; Intrusion Detection;
D O I
10.1007/978-3-031-65175-5_2
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Network Intrusion Detection Systems (NIDSs) based on Deep Neural Network have demonstrated impressive performance in multi-class, closed-world settings, where training and test data follow the same distribution. However, when deployed in real networks, these systems have a limited ability to detect novel attacks which do not belong to already known classes. In this work, we aim to tackle semantic shift, that is the emergence of unknown classes, by proposing a two-phase approach to detect new classes and integrate them into the classification model, while minimising the need for human intervention. While contrastive learning is a promising techniques to tackle semantic shift, it has high computational cost and it is sensitive to imbalanced data. We propose a novel contrastive learning approach based on synthetic centroids which has low computational cost and is robust to class imbalance, making it suitable for application to NIDS. To integrate the shifted samples in the existing model, we also design a novel adaptation method that combines manual labeling and pseudo-labeling to reduce labeling costs. We evaluate our system, Rasd, on two NIDS datasets, finding it excels in both detection and adaptation. For example Rasd improves on the nearest detection baseline F1-score by 6.83% for IDS 2017 and 19.21% for IDS 2018.
引用
收藏
页码:16 / 30
页数:15
相关论文
共 50 条
  • [21] Robust Network Intrusion Detection Systems for Outlier Detection
    Desai, Rohan
    Venkatesh, T. G.
    2022 IEEE 27TH INTERNATIONAL WORKSHOP ON COMPUTER AIDED MODELING AND DESIGN OF COMMUNICATION LINKS AND NETWORKS (CAMAD), 2022, : 140 - 146
  • [22] A network intrusion detection method based on semantic Re-encoding and deep learning
    Wu, Zhendong
    Wang, Jingjing
    Hu, Liqin
    Zhang, Zhang
    Wu, Han
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2020, 164 (164)
  • [23] Recurrent network in Network Intrusion Detection System
    Xue, JS
    Sun, JZ
    Zhang, X
    PROCEEDINGS OF THE 2004 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2004, : 2676 - 2679
  • [24] The sound of intrusion: A novel network intrusion detection system
    Aldarwbi, Mohammed Y.
    Lashkari, Arash H.
    Ghorbani, Ali A.
    COMPUTERS & ELECTRICAL ENGINEERING, 2022, 104
  • [25] Markov chains in network intrusion detection
    Hixon, R
    Gruenbacher, DA
    PROCEEDINGS FROM THE FIFTH IEEE SYSTEMS, MAN AND CYBERNETICS INFORMATION ASSURANCE WORKSHOP, 2004, : 432 - 433
  • [26] Visualizing network data for intrusion detection
    Abdullah, K
    Lee, A
    Conti, G
    Copeland, JA
    PROCEEDINGS FROM THE SIXTH ANNUAL IEEE SYSTEMS, MAN AND CYBERNETICS INFORMATION ASSURANCE WORKSHOP, 2005, : 100 - 108
  • [27] Deep Stacking Network for Intrusion Detection
    Tang, Yifan
    Gu, Lize
    Wang, Leiting
    SENSORS, 2022, 22 (01)
  • [28] Research on Network Intrusion Detection System
    Xu, Jiang
    Cao, Zhongwei
    MICRO NANO DEVICES, STRUCTURE AND COMPUTING SYSTEMS, 2011, 159 : 77 - +
  • [29] Data analytics for network intrusion detection
    Wang, Lidong
    Jones, Randy
    Journal of Cyber Security Technology, 2020, 4 (02) : 106 - 123
  • [30] Neural network ensembles for intrusion detection
    Golovko, Vladimir
    Kachurka, Pavel
    Vaitsekhovich, Leanid
    IDAACS 2007: PROCEEDINGS OF THE 4TH IEEE WORKSHOP ON INTELLIGENT DATA ACQUISITION AND ADVANCED COMPUTING SYSTEMS: TECHNOLOGY AND APPLICATIONS, 2007, : 578 - 583