Developing a Siamese Network for Intrusion Detection Systems

被引:12
|
作者
Hindy, Hanan [1 ]
Tachtatzis, Christos [2 ]
Atkinson, Robert [2 ]
Bayne, Ethan [1 ]
Bellekens, Xavier [2 ]
机构
[1] Abertay Univ, Div Cyber Secur, Dundee, Scotland
[2] Univ Strathclyde, EEE Dept, Glasgow, Lanark, Scotland
关键词
D O I
10.1145/3437984.3458842
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Machine Learning (ML) for developing Intrusion Detection Systems (IDS) is a fast-evolving research area that has many unsolved domain challenges. Current IDS models face two challenges that limit their performance and robustness. Firstly, they require large datasets to train and their performance is highly dependent on the dataset size. Secondly, zero-day attacks demand that machine learning models are retrained in order to identify future attacks of this type. However, the sophistication and increasing rate of cyber attacks make retraining time prohibitive for practical implementation. This paper proposes a new IDS model that can learn from pair similarities rather than class discriminative features. Learning similarities requires less data for training and provides the ability to flexibly adapt to new cyber attacks, thus reducing the burden of retraining. The underlying model is based on Siamese Networks, therefore, given a number of instances, numerous similar and dissimilar pairs can be generated. The model is evaluated using three mainstream IDS datasets; CICIDS2017, KDD Cup'99, and NSL-KDD. The evaluation results confirm the ability of the Siamese Network model to suit IDS purposes by classifying cyber attacks based on similaritybased learning. This opens a new research direction for building adaptable IDS models using non-conventional ML techniques.
引用
收藏
页码:120 / 126
页数:7
相关论文
共 50 条
  • [31] Intrusion detection and prevention systems in industrial IoT network
    Sharma, Sangeeta
    Kumar, Ashish
    Rathore, Navdeep Singh
    Sharma, Shivanshu
    SADHANA-ACADEMY PROCEEDINGS IN ENGINEERING SCIENCES, 2024, 49 (03):
  • [32] Signal Processing Applications in Network Intrusion Detection Systems
    Chin-Tser Huang
    Rocky K.C. Chang
    Polly Huang
    EURASIP Journal on Advances in Signal Processing, 2009
  • [33] Study of Neural Network Technologies in Intrusion Detection Systems
    Fu Yanwei
    Zhu Yingying
    Yu Haiyang
    2009 5TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-8, 2009, : 4454 - +
  • [34] A mobile agent approach to intrusion detection in network systems
    Kolaczek, G
    Pieczynska-Kuchtiak, A
    Juszczyszyn, K
    Grzech, A
    Katarzyniak, RP
    Nguyen, NT
    KNOWLEDGE-BASED INTELLIGENT INFORMATION AND ENGINEERING SYSTEMS, PT 2, PROCEEDINGS, 2005, 3682 : 514 - 519
  • [35] Implementation of a Stateful Network Protocol Intrusion Detection Systems
    Seng, S.
    Garcia-Alfaro, J.
    Laarouci, Y.
    SECRYPT : PROCEEDINGS OF THE 19TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2022, : 398 - 405
  • [36] Network Systems Intrusion: Concept, Detection, Decision, and Prevention
    Pleskonjic, Dragan
    Omerovic, Sanida
    Tomazic, Saso
    IPSI BGD TRANSACTIONS ON INTERNET RESEARCH, 2007, 3 (01): : 40 - 49
  • [37] Predicting the Resource Consumption of Network Intrusion Detection Systems
    Dreger, Holger
    Feldmann, Anja
    Paxson, Vern
    Sornmer, Robin
    RECENT ADVANCES IN INTRUSION DETECTION, RAID 2008, 2008, 5230 : 135 - +
  • [38] Study of Intrusion Detection Systems (IDSs) in Network Security
    Wu Junqi
    Hu Zhengbing
    2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 4532 - +
  • [39] Fuzzy Logic based Network Intrusion Detection Systems
    Johanyak, Zsolt Csaba
    2020 IEEE 18TH WORLD SYMPOSIUM ON APPLIED MACHINE INTELLIGENCE AND INFORMATICS (SAMI 2020), 2020, : 15 - 15
  • [40] Network Intrusion Detection Systems Using Neural Networks
    Rodda, Sireesha
    INFORMATION SYSTEMS DESIGN AND INTELLIGENT APPLICATIONS, INDIA 2017, 2018, 672 : 903 - 908