3D-IDS: Doubly Disentangled Dynamic Intrusion Detection

被引:1
|
作者
Qiu, Chenyang [1 ]
Geng, Yingsheng [1 ]
Lu, Junrui [1 ]
Chen, Kaida [1 ]
Zhu, Shitong [1 ]
Su, Ya [2 ]
Nan, Guoshun [1 ]
Zhang, Can [1 ]
Fu, Junsong [1 ]
Cui, Qimei [1 ]
Tao, Xiaofeng [1 ]
机构
[1] Beijing Univ Posts & Telecommun, Beijing, Peoples R China
[2] HUAWEI Technol Co Ltd, Shenzhen, Peoples R China
基金
国家重点研发计划;
关键词
Intrusion Detection; Anomaly Detection; Network Security; DATASET; IOT;
D O I
10.1145/3580305.3599238
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Network-based intrusion detection system (NIDS) monitors network traffic for malicious activities, forming the frontline defense against increasing attacks over information infrastructures. Although promising, our quantitative analysis shows that existing methods perform inconsistently in declaring various unknown attacks (e.g., 9% and 35% F1 respectively for two distinct unknown threats for an SVM-based method) or detecting diverse known attacks (e.g., 31% F1 for the Backdoor and 93% F1 for DDoS by a GCN-based state-of-the-art method), and reveals that the underlying cause is entangled distributions of flow features. This motivates us to propose 3D-IDS, a novel method that aims to tackle the above issues through two-step feature disentanglements and a dynamic graph diffusion scheme. Specifically, we first disentangle traffic features by a non-parameterized optimization based on mutual information, automatically differentiating tens and hundreds of complex features of various attacks. Such differentiated features will be fed into a memory model to generate representations, which are further disentangled to highlight the attack-specific features. Finally, we use a novel graph diffusion method that dynamically fuses the network topology for spatial-temporal aggregation in evolving data streams. By doing so, we can effectively identify various attacks in encrypted traffics, including unknown threats and known ones that are not easily detected. Experiments show the superiority of our 3D-IDS. We also demonstrate that our two-step feature disentanglements benefit the explainability of NIDS.
引用
收藏
页码:1965 / 1977
页数:13
相关论文
共 50 条
  • [1] 3D-IDS: IaaS user-oriented Intrusion Detection System
    He, Jie
    Tang, Chuan
    Yang, Yuexiang
    Qiao, Yong
    Liu, Chaobin
    [J]. 2012 INTERNATIONAL SYMPOSIUM ON INFORMATION SCIENCE AND ENGINEERING (ISISE), 2012, : 12 - 15
  • [2] Study on 3D-IDS Based Spacecraft Development Mode
    Zhou Xiaolun
    Chen Haifeng
    Hao Ganggang
    Luo Cheng
    Zhu Wei
    [J]. 2019 5TH ASIA CONFERENCE ON MECHANICAL ENGINEERING AND AEROSPACE ENGINEERING (MEAE 2019), 2019, 288
  • [3] An intelligent lightweight intrusion detection system(IDS)
    Hu Zheng Bing
    Shirochin, V. P.
    Su Jun
    [J]. TENCON 2005 - 2005 IEEE REGION 10 CONFERENCE, VOLS 1-5, 2006, : 2202 - 2208
  • [4] An intelligent lightweight intrusion detection system(IDS)
    Hu, ZB
    Shirochin, VP
    Yang, YP
    [J]. Eurocon 2005: The International Conference on Computer as a Tool, Vol 1 and 2 , Proceedings, 2005, : 652 - 655
  • [5] A Survey on Intrusion Detection System (IDS) and Internal Intrusion Detection and Protection System (IIDPS)
    Borkar, Amol
    Donode, Akshay
    Kumari, Anjali
    [J]. PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INVENTIVE COMPUTING AND INFORMATICS (ICICI 2017), 2017, : 949 - 953
  • [6] Deep IDS : A deep learning approach for Intrusion detection based on IDS 2018
    Dey, Arunavo
    [J]. 2020 2ND INTERNATIONAL CONFERENCE ON SUSTAINABLE TECHNOLOGIES FOR INDUSTRY 4.0 (STI), 2020,
  • [7] Intrusion Detection Systems (IDS)-An Overview with a Generalized Framework
    Panigrahi, Ranjit
    Borah, Samarjeet
    Bhoi, Akash Kumar
    Mallick, Pradeep Kumar
    [J]. COGNITIVE INFORMATICS AND SOFT COMPUTING, 2020, 1040 : 107 - 117
  • [8] Computer Immunity Using An Intrusion Detection System (IDS)
    Konyeha, Susan
    Onibere, Emmanuel A.
    [J]. ADVANCES IN MATERIALS AND SYSTEMS TECHNOLOGIES IV, 2013, 824 : 200 - 205
  • [9] Difference between Intrusion Detection System (IDS) and Intrusion Prevention System (IPS)
    Ashoor, Asmaa Shaker
    Gore, Sharad
    [J]. ADVANCES IN NETWORK SECURITY AND APPLICATIONS, 2011, 196 : 497 - +
  • [10] A Study on IDS (Intrusion Detection System) and Introduction of IFS (Intrusion Filtration System)
    Dewanjee, Rita
    Vyas, Ranjana
    [J]. COMPUTING AND NETWORK SUSTAINABILITY, 2017, 12 : 119 - 126