A Performance-Oriented Comparison of Neural Network Approaches for Anomaly-based Intrusion Detection

被引:0
|
作者
Iannucci, Stefano [1 ]
Ables, Jesse [1 ]
Anderson, William [1 ]
Abburi, Bhuvanesh [1 ]
Cardellini, Valeria [2 ]
Banicescu, Ioana [1 ]
机构
[1] Mississippi State Univ, Mississippi State, MS 39762 USA
[2] Univ Roma Tor Vergata, Rome, Italy
关键词
Performance Assessment; Anomaly Detection; Intrusion Detection;
D O I
10.1109/SSCI50451.2021.9660100
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Intrusion Detection Systems employ anomaly detection algorithms to detect malicious or unauthorized activities in real time. Anomaly detection algorithms that exploit artificial neural networks (ANN) have recently gained particular interest. These algorithms are usually evaluated and compared through effectiveness measures, which aim to quantify how well anomalies are identified based on detection capabilities. However, to the best of our knowledge, the performance characterization from the perspective of computational cost and space, training time, memory consumption, together with a quantitative analysis of the trade-offs between algorithm effectiveness and performance, have not been explored yet. In this work, we select four recently proposed unsupervised anomaly detection algorithms based on ANN, namely: REPresentations for a random nEarest Neighbor (REPEN), DevNet, OmniAnomaly, Multi-Objective Generative Adversarial Active Learning (MO-GAAL); we perform a variety of experiments to evaluate the trade-offs between the effectiveness and performance of the selected algorithms using two reference dataset: NSL-KDD and CIC-IDS-2017. Our results confirm the importance of this study, showing that none of the selected algorithms dominate the others in terms of both, effectiveness and performance. Furthermore, it shows that approaches based on Recurrent Neural Networks, which exploit the temporal dependency of the samples, have a clear advantage over the others in terms of effectiveness, while exhibiting the worst execution time.
引用
收藏
页数:7
相关论文
共 50 条
  • [21] Building Multiclass Classification Baselines for Anomaly-based Network Intrusion Detection Systems
    Shah, Ajay
    Clachar, Sophine
    Minimair, Manfred
    Cook, Davis
    [J]. 2020 IEEE 7TH INTERNATIONAL CONFERENCE ON DATA SCIENCE AND ADVANCED ANALYTICS (DSAA 2020), 2020, : 759 - 760
  • [22] POSEIDON: a 2-tier anomaly-based network intrusion detection system
    Bolzoni, Damiano
    Etalle, Sandro
    Hartel, Pieter
    Zambon, Emmanuele
    [J]. FOURTH IEEE INTERNATIONAL WORKSHOP ON INFORMATION ASSURANCE, PROCEEDINGS, 2006, : 144 - +
  • [23] Constant False Alarm Rate Anomaly-Based Approach for Network Intrusion Detection
    AlShaalan, Rayan
    AsSadhan, Basil
    Al-Muhtadi, Jalal
    Bin-Abbas, Hesham
    Abd El-Samie, Fathi
    Alshebeili, Saleh
    [J]. 2013 10TH INTERNATIONAL CONFERENCE ON HIGH CAPACITY OPTICAL NETWORKS AND ENABLING TECHNOLOGIES (HONET-CNS), 2013, : 141 - 145
  • [24] Hybrid Weighted K-Means Clustering and Artificial Neural Network for an Anomaly-Based Network Intrusion Detection System
    Samrin, Rafath
    Vasumathi, Devara
    [J]. JOURNAL OF INTELLIGENT SYSTEMS, 2018, 27 (02) : 135 - 147
  • [25] Performance Analysis of Anomaly-Based Network Intrusion Detection Using Feature Selection and Machine Learning Techniques
    Seniaray, Sumedha
    Jindal, Rajni
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2024, : 2321 - 2351
  • [26] A systematic literature review of methods and datasets for anomaly-based network intrusion detection
    Yang, Zhen
    Liu, Xiaodong
    Li, Tong
    Wu, Di
    Wang, Jinjiang
    Zhao, Yunwei
    Han, Han
    [J]. COMPUTERS & SECURITY, 2022, 116
  • [27] Anomaly-based Network Intrusion Detection Model using Deep Learning in Airports
    Sczari, Behrooz
    Moller, Dietmar P. F.
    Deutschmann, Andreas
    [J]. 2018 17TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (IEEE TRUSTCOM) / 12TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (IEEE BIGDATASE), 2018, : 1725 - 1729
  • [28] Game Theoretical Method for Anomaly-Based Intrusion Detection
    Wang, Zhiyong
    Xu, Shengwei
    Xu, Guoai
    Yin, Yongfeng
    Zhang, Miao
    Sun, Dawei
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2020, 2020
  • [29] Anomaly-based intrusion detection using Bayesian networks
    Tylman, Wojciech
    [J]. DEPCOS - RELCOMEX 2008: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON DEPENDABILITY OF COMPUTER SYSTEMS, 2008, : 211 - +
  • [30] Anomaly intrusion detection system based on neural network
    Li, Yuan-Bing
    Fang, Ding-Yi
    Wu, Xiao-Nan
    Chen, Xiao-Jiang
    [J]. Xi Tong Gong Cheng Yu Dian Zi Ji Shu/Systems Engineering and Electronics, 2005, 27 (09): : 1648 - 1651