End-to-End Adversarial Learning for Intrusion Detection in Computer Networks

被引:0
|
作者
Mohammadi, Bahram [1 ]
Sabokrou, Mohammad [2 ]
机构
[1] Sharif Univ Technol, Tehran, Iran
[2] Inst Res Fundamental Sci IPM, Tehran, Iran
关键词
SYSTEM;
D O I
10.1109/lcn44214.2019.8990759
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
This paper presents a simple yet efficient method for an anomaly-based Intrusion Detection System (IDS). In reality, IDSs can be defined as a one-class classification system, where the normal traffic is the target class. The high diversity of network attacks in addition to the need for generalization, motivate us to propose a semi-supervised method. Inspired by the successes of Generative Adversarial Networks (GANs) for training deep models in semi-unsupervised setting, we have proposed an end-to-end deep architecture for IDS. The proposed architecture is composed of two deep networks, each of which trained by competing with each other to understand the underlying concept of the normal traffic class. The key idea of this paper is to compensate the lack of anomalous traffic by approximately obtain them from normal flows. In this case, our method is not biased towards the available intrusions in the training set leading to more accurate detection. The proposed method has been evaluated on NSL-KDD dataset. The results confirm that our method outperforms the other state-of-the-art approaches.
引用
收藏
页码:270 / 273
页数:4
相关论文
共 50 条
  • [21] End-to-End Video-to-Speech Synthesis Using Generative Adversarial Networks
    Mira, Rodrigo
    Vougioukas, Konstantinos
    Ma, Pingchuan
    Petridis, Stavros
    Schuller, Bjoern W.
    Pantic, Maja
    IEEE TRANSACTIONS ON CYBERNETICS, 2023, 53 (06) : 3454 - 3466
  • [22] An End-to-End Detection Method for WebShell with Deep Learning
    Qi, Longchen
    Kong, Rui
    Lu, Yang
    Zhuang, Honglin
    2018 EIGHTH INTERNATIONAL CONFERENCE ON INSTRUMENTATION AND MEASUREMENT, COMPUTER, COMMUNICATION AND CONTROL (IMCCC 2018), 2018, : 660 - 665
  • [23] An end-to-end learning method for industrial defect detection
    Wu, Yupei
    Guo, Di
    Liu, Huaping
    Huang, Yao
    ASSEMBLY AUTOMATION, 2020, 40 (01) : 31 - 39
  • [24] An end-to-end computer vision system based on deep learning for pavement distress detection and quantification
    Cano-Ortiz, Sail
    Iglesias, Lara Lloret
    del Arbol, Pablo Martinez Ruiz
    Lastra-Gonzalez, Pedro
    Castro-Fresno, Daniel
    CONSTRUCTION AND BUILDING MATERIALS, 2024, 416
  • [25] End-to-End Speech Translation with Adversarial Training
    Li, Xuancai
    Chen, Kehai
    Zhao, Tiejun
    Yang, Muyun
    WORKSHOP ON AUTOMATIC SIMULTANEOUS TRANSLATION CHALLENGES, RECENT ADVANCES, AND FUTURE DIRECTIONS, 2020, : 10 - 14
  • [26] End-to-End Adversarial Retinal Image Synthesis
    Costa, Pedro
    Galdran, Adrian
    Meyer, Maria Ines
    Niemeijer, Meindert
    Abramoff, Michael
    Mendonca, Ana Maria
    Campilho, Aurelio
    IEEE TRANSACTIONS ON MEDICAL IMAGING, 2018, 37 (03) : 781 - 791
  • [27] Generative Adversarial Imitation Learning for End-to-End Autonomous Driving on Urban Environments
    Karl Couto, Gustavo Claudio
    Antonelo, Eric Aislan
    2021 IEEE SYMPOSIUM SERIES ON COMPUTATIONAL INTELLIGENCE (IEEE SSCI 2021), 2021,
  • [28] VISINGER: VARIATIONAL INFERENCE WITH ADVERSARIAL LEARNING FOR END-TO-END SINGING VOICE SYNTHESIS
    Zhang, Yongmao
    Cong, Jian
    Xue, Heyang
    Xie, Lei
    Zhu, Pengcheng
    Bi, Mengxiao
    2022 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING (ICASSP), 2022, : 7237 - 7241
  • [29] Network intrusion detection: Evasion, traffic normalization, and end-to-end protocol semantics
    Handley, M
    Paxson, V
    Kreibich, C
    USENIX ASSOCIATION PROCEEDINGS OF THE 10TH USENIX SECURITY SYMPOSIUM, 2001, : 115 - 131
  • [30] Conditional Variational Autoencoder with Adversarial Learning for End-to-End Text-to-Speech
    Kim, Jaehyeon
    Kong, Jungil
    Son, Juhee
    INTERNATIONAL CONFERENCE ON MACHINE LEARNING, VOL 139, 2021, 139