ZW-IDS: Zero-Watermarking-based network Intrusion Detection System using data provenance

被引:0
|
作者
Faraj, Omair [1 ,2 ]
Megias, David [3 ]
Garcia-Alfaro, Joaquin [2 ]
机构
[1] Univ Oberta Catalunya, Internet Interdisciplinary Inst, CYBERCAT Ctr Cybersecur Res Catalonia, Barcelona, Spain
[2] Inst Polytech Paris, SAMOVAR, Telecom SudParis, Palaiseau, France
[3] Univ Oberta Catalunya UOC, Internet Interdisciplinary Inst IN3, CYBERCAT Ctr Cybersecur Res Catalonia, Barcelona, Spain
关键词
Intrusion Detection System; Data Provenance; Data Hiding; Zero-Watermarking; Machine Learning; Support Vector Machine; INTERNET;
D O I
10.1145/3664476.3670933
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In the rapidly evolving digital world, network security is a critical concern. Traditional security measures often fail to detect unknown attacks, making anomaly-based Network Intrusion Detection Systems (NIDS) using Machine Learning (ML) vital. However, these systems face challenges such as computational complexity and misclassification errors. This paper presents ZW-IDS, an innovative approach to enhance anomaly-based NIDS performance. We propose a two-layer classification NIDS integrating zero-watermarking with data provenance and ML. The first layer uses Support Vector Machines (SVM) with ensemble learning model for feature selection. The second layer generates unique zero-watermarks for each data packet using data provenance information. This approach aims to reduce false alarms, improve computational efficiency, and boost NIDS classification performance. We evaluate ZW-IDS using the CICIDS2017 dataset and compare its performance with other multi-method ML and Deep Learning (DL) solutions.
引用
收藏
页数:11
相关论文
共 50 条
  • [1] ZIRCON: Zero-watermarking-based approach for data integrity and secure provenance in IoT networks
    Faraj, Omair
    Megias, David
    Garcia-Alfaro, Joaquin
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2024, 85
  • [2] Classification of Intrusion Detection System (IDS) Based on Computer Network
    Effendy, David Ahmad
    Kusrini, Kusrini
    Sudarmawan, Sudarmawan
    2017 2ND INTERNATIONAL CONFERENCES ON INFORMATION TECHNOLOGY, INFORMATION SYSTEMS AND ELECTRICAL ENGINEERING (ICITISEE): OPPORTUNITIES AND CHALLENGES ON BIG DATA FUTURE INNOVATION, 2017, : 90 - 94
  • [3] GNN-IDS: Graph Neural Network based Intrusion Detection System
    Sun, Zhenlu
    Teixeira, Andre M. H.
    Toor, Salman
    19TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY, ARES 2024, 2024,
  • [4] Using Data Mining Algorithms for Developing a Model for Intrusion Detection System (IDS)
    Duque, Solane
    bin Omar, Mohd Nizam
    COMPLEX ADAPTIVE SYSTEMS, 2015, 2015, 61 : 46 - 51
  • [6] A systematic literature review for network intrusion detection system (IDS)
    Abdulganiyu, Oluwadamilare Harazeem
    Tchakoucht, Taha Ait
    Saheed, Yakub Kayode
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2023, 22 (05) : 1125 - 1162
  • [7] A systematic literature review for network intrusion detection system (IDS)
    Oluwadamilare Harazeem Abdulganiyu
    Taha Ait Tchakoucht
    Yakub Kayode Saheed
    International Journal of Information Security, 2023, 22 : 1125 - 1162
  • [8] Computer Immunity Using An Intrusion Detection System (IDS)
    Konyeha, Susan
    Onibere, Emmanuel A.
    ADVANCES IN MATERIALS AND SYSTEMS TECHNOLOGIES IV, 2013, 824 : 200 - 205
  • [9] Network Intrusion Detection System Using Data Mining
    Lima de Campos, Lidio Mauro
    Limao de Oliveira, Roberto Celio
    Roisenberg, Mauro
    ENGINEERING APPLICATIONS OF NEURAL NETWORKS, 2012, 311 : 104 - 113
  • [10] Defend Against Ransomware Detection Using Intrusion Detection System (IDS)
    Alomary, Fahad Omar
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2020, 20 (07): : 11 - 16