Intelligent Cyber Attack Detection and Classification for Network-Based Intrusion Detection Systems

被引:45
|
作者
Oliveira, Nuno [1 ]
Praca, Isabel [1 ]
Maia, Eva [1 ]
Sousa, Orlando [1 ]
机构
[1] Porto Sch Engn ISEP, Res Grp Intelligent Engn & Comp Adv Innovat & De, P-4200072 Porto, Portugal
来源
APPLIED SCIENCES-BASEL | 2021年 / 11卷 / 04期
关键词
intrusion detection systems; machine learning; anomaly detection; sequential analysis; random forest; multi-layer perceptron; long-short term memory; MACHINE;
D O I
10.3390/app11041674
中图分类号
O6 [化学];
学科分类号
0703 ;
摘要
With the latest advances in information and communication technologies, greater amounts of sensitive user and corporate information are shared continuously across the network, making it susceptible to an attack that can compromise data confidentiality, integrity, and availability. Intrusion Detection Systems (IDS) are important security mechanisms that can perform the timely detection of malicious events through the inspection of network traffic or host-based logs. Many machine learning techniques have proven to be successful at conducting anomaly detection throughout the years, but only a few considered the sequential nature of data. This work proposes a sequential approach and evaluates the performance of a Random Forest (RF), a Multi-Layer Perceptron (MLP), and a Long-Short Term Memory (LSTM) on the CIDDS-001 dataset. The resulting performance measures of this particular approach are compared with the ones obtained from a more traditional one, which only considers individual flow information, in order to determine which methodology best suits the concerned scenario. The experimental outcomes suggest that anomaly detection can be better addressed from a sequential perspective. The LSTM is a highly reliable model for acquiring sequential patterns in network traffic data, achieving an accuracy of 99.94% and an f1-score of 91.66%.
引用
收藏
页码:1 / 21
页数:21
相关论文
共 50 条
  • [1] Neural network-based intrusion detection systems
    Hu, LX
    He, ZJ
    [J]. COMPUTER SCIENCE AND TECHNOLOGY IN NEW CENTURY, 2001, : 296 - 298
  • [2] A Neural Network Based System for Intrusion Detection and Attack Classification
    Subba, Basant
    Biswas, Santosh
    Karmakar, Sushanta
    [J]. 2016 TWENTY SECOND NATIONAL CONFERENCE ON COMMUNICATION (NCC), 2016,
  • [3] Characterizing the Effectiveness of Network-based Intrusion Detection Systems
    Ficke, Eric
    Schweitzer, Kristin M.
    Bateman, Raymond M.
    Xu, Shouhuai
    [J]. 2018 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM 2018), 2018, : 76 - 81
  • [4] Panacea: Automating Attack Classification for Anomaly-Based Network Intrusion Detection Systems
    Bolzoni, Damiano
    Etalle, Sandro
    Hartel, Pieter H.
    [J]. RECENT ADVANCES IN INTRUSION DETECTION, PROCEEDINGS, 2009, 5758 : 1 - 20
  • [5] Cyber-Attack Prediction Based on Network Intrusion Detection Systems for Alert Correlation Techniques: A Survey
    Albasheer, Hashim
    Siraj, Maheyzah Md
    Mubarakali, Azath
    Tayfour, Omer Elsier
    Salih, Sayeed
    Hamdan, Mosab
    Khan, Suleman
    Zainal, Anazida
    Kamarudeen, Sameer
    [J]. SENSORS, 2022, 22 (04)
  • [6] A Targeted Attack For Enhancing Resiliency of Intelligent Intrusion Detection Modules in Energy Cyber Physical Systems
    El Hariri, M.
    Harmon, E.
    Habib, H. F.
    Youssef, T.
    Mohammed, O. A.
    [J]. 2017 19TH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEM APPLICATION TO POWER SYSTEMS (ISAP), 2017,
  • [7] Towards a Framework for the Generation of Enhanced Attack and Background Network Traffic for Evaluation of Network-Based Intrusion Detection Systems
    Lo, Owen
    Graves, Jamie
    Buchanan, William
    [J]. PROCEEDINGS OF THE 9TH EUROPEAN CONFERENCE ON INFORMATION WARFARE AND SECURITY, 2010, : 190 - 200
  • [8] A Neural Network-Based Learning Algorithm for Intrusion Detection Systems
    Hassan I. Ahmed
    Nawal A. Elfeshawy
    S. F. Elzoghdy
    Hala S. El-sayed
    Osama S. Faragallah
    [J]. Wireless Personal Communications, 2017, 97 : 3097 - 3112
  • [9] A Neural Network-Based Learning Algorithm for Intrusion Detection Systems
    Ahmed, Hassan I.
    Elfeshawy, Nawal A.
    Elzoghdy, S. F.
    El-sayed, Hala S.
    Faragallah, Osama S.
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2017, 97 (02) : 3097 - 3112
  • [10] Research Trends in Network-Based Intrusion Detection Systems: A Review
    Kumar, Satish
    Gupta, Sunanda
    Arora, Sakshi
    [J]. IEEE ACCESS, 2021, 9 : 157761 - 157779