Toward feasible machine learning model updates in network-based intrusion detection

被引:16
|
作者
Horchulhack, Pedro [1 ]
Viegas, Eduardo K. [1 ,2 ]
Santin, Altair O. [1 ]
机构
[1] Pontificia Univ Catolica Parana, Grad Program Comp Sci, Curitiba, Parana, Brazil
[2] Technol Innovat Inst, Secure Syst Res Ctr, Abu Dhabi 9639, U Arab Emirates
关键词
Intrusion detection; Stream learning; Reject option; REJECT OPTION; REAL-TIME; ENSEMBLE; SVM;
D O I
10.1016/j.comnet.2021.108618
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Over the last years, several works have proposed highly accurate machine learning (ML) techniques for network-based intrusion detection systems (NIDS), that are hardly used in production environments. In practice, current intrusion detection schemes cannot easily handle network traffic's changing behavior over time, requiring frequent and complex model updates to be periodically performed. As a result, unfeasible amounts of labeled training data must be provided for model updates as time passes, making such proposals unfeasible for the real world. This paper proposes a new intrusion detection model based on stream learning with delayed model updates to make the model update task feasible with a twofold implementation. First, our model maintains the intrusion detection accuracy through a classification assessment approach, even with outdated underlying ML models. The classification with a reject option rationale also allows suppressing potential misclassifications caused by new network traffic behavior. Second, the rejected instances are stored for long periods and used for incremental model updates. As an insight, old rejected instances can be easily labeled through publicly available attack repositories without human assistance. Experiments conducted in a novel dataset containing a year of real network traffic with over 2.6 TB of data have shown that current techniques for intrusion detection cannot cope with the network traffic's evolving behavior, significantly degrading their accuracy over time if no model updates are performed. In contrast, the proposed model can maintain its classification accuracy for long periods without model updates, even improving the false-positive rates by up to 12% while rejecting only 8% of the instances. If periodic model updates are conducted, our proposal can improve the detection accuracy by up to 6% while rejecting only 2% of network events. In addition, the proposed model can perform model updates without human assistance, waiting up to 3 months for the proper event label to be provided without impact on accuracy, while demanding only 3.2% of the computational time and 2% of new instances to be labeled as time passes, making model updates in NIDS a feasible task.
引用
收藏
页数:14
相关论文
共 50 条
  • [41] Network intrusion detection model based on fuzzy support vector machine
    Long, Yanjun
    Ouyang, Jianquan
    Sun, Xinwen
    Journal of Networks, 2013, 8 (06) : 1387 - 1394
  • [42] Agent-based intrusion detection for network-based application
    Zeng, Jianping
    Guo, Donghui
    International Journal of Network Security, 2009, 8 (03) : 201 - 210
  • [43] Evaluation of Machine Learning Techniques for Network Intrusion Detection
    Zaman, Marzia
    Lung, Chung-Horng
    NOMS 2018 - 2018 IEEE/IFIP NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM, 2018,
  • [44] Adversarial machine learning in Network Intrusion Detection Systems
    Alhajjar, Elie
    Maxwell, Paul
    Bastian, Nathaniel
    EXPERT SYSTEMS WITH APPLICATIONS, 2021, 186
  • [45] On the Evaluation of Sequential Machine Learning for Network Intrusion Detection
    Corsini, Andrea
    Yang, Shanchieh Jay
    Apruzzese, Giovanni
    ARES 2021: 16TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, 2021,
  • [46] Network intrusion detection system: A machine learning approach
    Panda, Mrutyunjaya
    Abraham, Ajith
    Das, Swagatam
    Patra, Manas Ranjan
    INTELLIGENT DECISION TECHNOLOGIES-NETHERLANDS, 2011, 5 (04): : 347 - 356
  • [47] A Review of Machine Learning Methodologies for Network Intrusion Detection
    Phadke, Aditya
    Kulkarni, Mohit
    Bhawalkar, Pranav
    Bhattad, Rashmi
    PROCEEDINGS OF THE 2019 3RD INTERNATIONAL CONFERENCE ON COMPUTING METHODOLOGIES AND COMMUNICATION (ICCMC 2019), 2019, : 272 - 275
  • [48] Application of adversarial machine learning in network intrusion detection
    Liu, Qixu
    Wang, Junnan
    Yin, Jie
    Chen, Yanhui
    Liu, Jiaxi
    Tongxin Xuebao/Journal on Communications, 2021, 42 (11): : 1 - 12
  • [49] Network Intrusion Detection using Machine Learning Approaches
    Hossain, Zakir
    Sourov, Md Mahmudur Rahman
    Khan, Musharrat
    Rahman, Parves
    PROCEEDINGS OF THE 2021 FIFTH INTERNATIONAL CONFERENCE ON I-SMAC (IOT IN SOCIAL, MOBILE, ANALYTICS AND CLOUD) (I-SMAC 2021), 2021, : 303 - 307
  • [50] Network Intrusion Detection Using Machine Learning Techniques
    Almutairi, Yasmeen
    Alhazmi, Bader
    Munshi, Amr
    ADVANCES IN SCIENCE AND TECHNOLOGY-RESEARCH JOURNAL, 2022, 16 (03) : 193 - 206