Developing a Siamese Network for Intrusion Detection Systems

被引:12
|
作者
Hindy, Hanan [1 ]
Tachtatzis, Christos [2 ]
Atkinson, Robert [2 ]
Bayne, Ethan [1 ]
Bellekens, Xavier [2 ]
机构
[1] Abertay Univ, Div Cyber Secur, Dundee, Scotland
[2] Univ Strathclyde, EEE Dept, Glasgow, Lanark, Scotland
关键词
D O I
10.1145/3437984.3458842
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Machine Learning (ML) for developing Intrusion Detection Systems (IDS) is a fast-evolving research area that has many unsolved domain challenges. Current IDS models face two challenges that limit their performance and robustness. Firstly, they require large datasets to train and their performance is highly dependent on the dataset size. Secondly, zero-day attacks demand that machine learning models are retrained in order to identify future attacks of this type. However, the sophistication and increasing rate of cyber attacks make retraining time prohibitive for practical implementation. This paper proposes a new IDS model that can learn from pair similarities rather than class discriminative features. Learning similarities requires less data for training and provides the ability to flexibly adapt to new cyber attacks, thus reducing the burden of retraining. The underlying model is based on Siamese Networks, therefore, given a number of instances, numerous similar and dissimilar pairs can be generated. The model is evaluated using three mainstream IDS datasets; CICIDS2017, KDD Cup'99, and NSL-KDD. The evaluation results confirm the ability of the Siamese Network model to suit IDS purposes by classifying cyber attacks based on similaritybased learning. This opens a new research direction for building adaptable IDS models using non-conventional ML techniques.
引用
收藏
页码:120 / 126
页数:7
相关论文
共 50 条
  • [41] Pattern matching acceleration for network intrusion detection systems
    Kim, S
    EMBEDDED COMPUTER SYSTEMS: ARCHITECTURES, MODELING, AND SIMULATION, 2005, 3553 : 289 - 298
  • [42] Neuromorphic Computing Applications for Network Intrusion Detection Systems
    Garcia, Raymond C.
    Pino, Robinson E.
    MACHINE INTELLIGENCE AND BIO-INSPIRED COMPUTATION: THEORY AND APPLICATIONS VIII, 2014, 9119
  • [43] Implementation and Performance Evaluation of Network Intrusion Detection Systems
    Saber, Mohammed
    Ghaouth Belkasmi, Mohammed
    Chadli, Sara
    Emharraf, Mohamed
    UBIQUITOUS NETWORKING, UNET 2017, 2017, 10542 : 484 - 495
  • [44] Methods for testing network-intrusion detection systems
    D. A. Khorkov
    Scientific and Technical Information Processing, 2012, 39 (2) : 120 - 126
  • [45] NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems
    Chung, Chun-Jen
    Khatkar, Pankaj
    Xing, Tianyi
    Lee, Jeongkeun
    Huang, Dijiang
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2013, 10 (04) : 198 - 211
  • [46] Scalable Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems
    Hong, Jin B.
    Chung, Chun-Jen
    Huang, Dijiang
    Kim, Dong Seong
    ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, ICA3PP 2015, 2015, 9532 : 582 - 592
  • [47] Network Intrusion Detection System (NIDS) Based on Pseudo-Siamese Stacked Autoencoders in Fog Computing
    Tu, Shanshan
    Waqas, Muhammad
    Badshah, Akhtar
    Yin, Mingxi
    Abbas, Ghulam
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2023, 16 (06) : 4317 - 4327
  • [48] NETWORK INTRUSION DETECTION
    MUKHERJEE, B
    HEBERLEIN, LT
    LEVITT, KN
    IEEE NETWORK, 1994, 8 (03): : 26 - 41
  • [49] Algorithms to speedup pattern matching for network intrusion detection systems
    Zheng, Kai
    Cai, Zhiping
    Zhang, Xin
    Wang, Zhijun
    Yang, Baohua
    COMPUTER COMMUNICATIONS, 2015, 62 : 47 - 58
  • [50] A Survey on Wireless Sensor Network for Community Intrusion Detection Systems
    Mittal, Nikhil Kumar
    2016 3rd International Conference on Recent Advances in Information Technology (RAIT), 2016, : 107 - 111