Formulating Parallel Supervised Machine Learning Designs For Anomaly-Based Network Intrusion Detection in Resource Constrained Use Cases

被引:0
|
作者
Joshi, Varun [1 ]
Korah, John [2 ]
机构
[1] Georgia State Univ, Data Sci, Atlanta, GA 30303 USA
[2] Calif State Polytech Univ Pomona, Comp Sci, Pomona, CA 91768 USA
关键词
parallelization; gradient descent; anomaly detection; network intrusion detection; resource constraints;
D O I
10.1109/MASS56207.2022.00117
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
One of the main problems with using supervised machine learning for anomaly-based Network Intrusion Detection (NID) in large cyber networks is the massive and dynamic data sets used in training and the computational overhead they induce in the training phase. In resource-constrained situations, there is a lack of powerful machines that would be traditionally used to deal with a high computational load. We focus on parallel processing designs that work in such resource-constrained use cases by lowering the computational overhead of supervised machine learning for anomaly-based NID, specifically for Mini-batch gradient descent. We avoid the black-box approach of traditional parallelization frameworks and allow the user to maximize the utilization of their scarce computational resources by granting greater control over parallelization while leveraging key aspects of the optimization algorithms being implemented. To demonstrate this, we implemented initial data and model parallel based designs, using the Compute Unified Device Architecture (CUDA) and Message Passing Interface (MPI) libraries, aimed at maximizing the use of a limited number of CPUs and GPUs. We conducted an initial comparative performance study using a large real-world network intrusion dataset called the KDD cup 1999; our results demonstrate up to 8.5 times more epochs per second using just 1 GPU (4000 threads) and up to 37 times faster convergence using just 1 compute node (7 cores) when compared to a serial approach.
引用
收藏
页码:748 / 753
页数:6
相关论文
共 50 条
  • [1] Anomaly-based Network Intrusion Detection using Ensemble Machine Learning Approach
    Das, Abhijit
    Pramod
    Sunitha, B. S.
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2022, 13 (02) : 635 - 645
  • [2] Deep and Machine Learning Approaches for Anomaly-Based Intrusion Detection of Imbalanced Network Traffic
    Abdulhammed, Razan
    Faezipour, Miad
    Abuzneid, Abdelshakour
    AbuMallouh, Arafat
    [J]. IEEE SENSORS LETTERS, 2019, 3 (01)
  • [3] Into the Unknown: Unsupervised Machine Learning Algorithms for Anomaly-Based Intrusion Detection
    Zoppi, Tommaso
    Ceccarelli, Andrea
    Bondavalli, Andrea
    [J]. 2020 50TH ANNUAL IEEE-IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS-SUPPLEMENTAL VOLUME (DSN-S), 2020, : 81 - 81
  • [4] Anomaly-Based Intrusion Detection Using Machine Learning: An Ensemble Approach
    Lalduhsaka, R.
    Bora, Nilutpol
    Khan, Ajoy Kumar
    [J]. International Journal of Information Security and Privacy, 2022, 16 (01)
  • [5] Anomaly-Based Intrusion Detection by Machine Learning: A Case Study on Probing Attacks to an Institutional Network
    Tufan, Emrah
    Tezcan, Cihangir
    Acarturk, Cengiz
    [J]. IEEE ACCESS, 2021, 9 : 50078 - 50092
  • [6] ANOMALY-BASED NETWORK INTRUSION DETECTION METHODS
    Nevlud, Pavel
    Bures, Miroslav
    Kapicak, Lukas
    Zdralek, Jaroslav
    [J]. ADVANCES IN ELECTRICAL AND ELECTRONIC ENGINEERING, 2013, 11 (06) : 468 - 474
  • [7] Anomaly-Based Network Intrusion Detection System
    Villalba, L. J. G.
    Orozco, A. L. S.
    Vidal, J. M.
    [J]. IEEE LATIN AMERICA TRANSACTIONS, 2015, 13 (03) : 850 - 855
  • [8] LSTM for Anomaly-Based Network Intrusion Detection
    Althubiti, Sara A.
    Jones, Eric Marcell, Jr.
    Roy, Kaushik
    [J]. 2018 28TH INTERNATIONAL TELECOMMUNICATION NETWORKS AND APPLICATIONS CONFERENCE (ITNAC), 2018, : 293 - 295
  • [9] An anomaly-based Network Intrusion Detection System using Deep learning
    Nguyen Thanh Van
    Tran Ngoc Thinh
    Le Thanh Sach
    [J]. 2017 INTERNATIONAL CONFERENCE ON SYSTEM SCIENCE AND ENGINEERING (ICSSE), 2017, : 210 - 214
  • [10] Performance Analysis of Anomaly-Based Network Intrusion Detection Using Feature Selection and Machine Learning Techniques
    Seniaray, Sumedha
    Jindal, Rajni
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2024,