End-to-End Adversarial Learning for Intrusion Detection in Computer Networks

被引:0
|
作者
Mohammadi, Bahram [1 ]
Sabokrou, Mohammad [2 ]
机构
[1] Sharif Univ Technol, Tehran, Iran
[2] Inst Res Fundamental Sci IPM, Tehran, Iran
关键词
SYSTEM;
D O I
10.1109/lcn44214.2019.8990759
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
This paper presents a simple yet efficient method for an anomaly-based Intrusion Detection System (IDS). In reality, IDSs can be defined as a one-class classification system, where the normal traffic is the target class. The high diversity of network attacks in addition to the need for generalization, motivate us to propose a semi-supervised method. Inspired by the successes of Generative Adversarial Networks (GANs) for training deep models in semi-unsupervised setting, we have proposed an end-to-end deep architecture for IDS. The proposed architecture is composed of two deep networks, each of which trained by competing with each other to understand the underlying concept of the normal traffic class. The key idea of this paper is to compensate the lack of anomalous traffic by approximately obtain them from normal flows. In this case, our method is not biased towards the available intrusions in the training set leading to more accurate detection. The proposed method has been evaluated on NSL-KDD dataset. The results confirm that our method outperforms the other state-of-the-art approaches.
引用
收藏
页码:270 / 273
页数:4
相关论文
共 50 条
  • [1] End-to-End Network Intrusion Detection Based on Contrastive Learning
    Li, Longlong
    Lu, Yuliang
    Yang, Guozheng
    Yan, Xuehu
    SENSORS, 2024, 24 (07)
  • [2] Adversarial Multi-task Learning for End-to-end Metaphor Detection
    Zhang, Shenglong
    Liu, Ying
    FINDINGS OF THE ASSOCIATION FOR COMPUTATIONAL LINGUISTICS, ACL 2023, 2023, : 1483 - 1497
  • [3] End-to-End Differentiable Adversarial Imitation Learning
    Baram, Nir
    Anschel, Oron
    Caspi, Itai
    Mannor, Shie
    INTERNATIONAL CONFERENCE ON MACHINE LEARNING, VOL 70, 2017, 70
  • [4] Intrusion Detection Using End-to-End Memory Network
    Long Chun
    Gao Xiaoxian
    Zhao Jing
    Wan Wei
    Shen Hanji
    Gao Peng
    PROCEEDINGS OF 2017 2ND INTERNATIONAL CONFERENCE ON COMMUNICATION AND INFORMATION SYSTEMS (ICCIS 2017), 2015, : 244 - 249
  • [5] An End-to-End Framework for Machine Learning-Based Network Intrusion Detection System
    De Carvalho Bertoli, Gustavo
    Pereira Junior, Lourenco Alves
    Saotome, Osamu
    Dos Santos, Aldri L.
    Verri, Filipe Alves Neto
    Marcondes, Cesar Augusto Cavalheiro
    Barbieri, Sidnei
    Rodrigues, Moises S.
    Parente De Oliveira, Jose M.
    IEEE ACCESS, 2021, 9 : 106790 - 106805
  • [6] An end-to-end learning approach for enhancing intrusion detection in Industrial-Internet of Things
    Hassini, Karima
    Khalis, Safae
    Habibi, Omar
    Chemmakha, Mohammed
    Lazaar, Mohamed
    KNOWLEDGE-BASED SYSTEMS, 2024, 294
  • [7] Peripheral Instance Augmentation for End-to-End Anomaly Detection Using Weighted Adversarial Learning
    Zong, Weixian
    Zhou, Fang
    Pavlovski, Martin
    Qian, Weining
    DATABASE SYSTEMS FOR ADVANCED APPLICATIONS, DASFAA 2022, PT II, 2022, : 506 - 522
  • [8] End-to-End Unpaired Image Denoising with Conditional Adversarial Networks
    Hong, Zhiwei
    Fan, Xiaocheng
    Jiang, Tao
    Feng, Jianxing
    THIRTY-FOURTH AAAI CONFERENCE ON ARTIFICIAL INTELLIGENCE, THE THIRTY-SECOND INNOVATIVE APPLICATIONS OF ARTIFICIAL INTELLIGENCE CONFERENCE AND THE TENTH AAAI SYMPOSIUM ON EDUCATIONAL ADVANCES IN ARTIFICIAL INTELLIGENCE, 2020, 34 : 4140 - 4149
  • [9] LithoGAN: End-to-End Lithography Modeling with Generative Adversarial Networks
    Ye, Wei
    Alawieh, Mohamed Baker
    Lin, Yibo
    Pan, David Z.
    PROCEEDINGS OF THE 2019 56TH ACM/EDAC/IEEE DESIGN AUTOMATION CONFERENCE (DAC), 2019,
  • [10] End-to-end Domain-Adversarial Voice Activity Detection
    Lavechin, Marvin
    Gill, Marie-Philippe
    Bousbib, Ruben
    Bredin, Herve
    Garcia-Perera, Leibny Paola
    INTERSPEECH 2020, 2020, : 3685 - 3689