Rasd: Semantic Shift Detection and Adaptation for Network Intrusion Detection

被引:0
|
作者
Alotaibi, Fahad [1 ]
Maffeis, Sergio [1 ]
机构
[1] Imperial Coll London, Dept Comp, London, England
来源
ICT SYSTEMS SECURITY AND PRIVACY PROTECTION, SEC 2024 | 2024年 / 710卷
关键词
Distribution Shift; Shift Detection and Adaptation; Network Security; Intrusion Detection;
D O I
10.1007/978-3-031-65175-5_2
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Network Intrusion Detection Systems (NIDSs) based on Deep Neural Network have demonstrated impressive performance in multi-class, closed-world settings, where training and test data follow the same distribution. However, when deployed in real networks, these systems have a limited ability to detect novel attacks which do not belong to already known classes. In this work, we aim to tackle semantic shift, that is the emergence of unknown classes, by proposing a two-phase approach to detect new classes and integrate them into the classification model, while minimising the need for human intervention. While contrastive learning is a promising techniques to tackle semantic shift, it has high computational cost and it is sensitive to imbalanced data. We propose a novel contrastive learning approach based on synthetic centroids which has low computational cost and is robust to class imbalance, making it suitable for application to NIDS. To integrate the shifted samples in the existing model, we also design a novel adaptation method that combines manual labeling and pseudo-labeling to reduce labeling costs. We evaluate our system, Rasd, on two NIDS datasets, finding it excels in both detection and adaptation. For example Rasd improves on the nearest detection baseline F1-score by 6.83% for IDS 2017 and 19.21% for IDS 2018.
引用
收藏
页码:16 / 30
页数:15
相关论文
共 50 条
  • [41] Developing expertise for network intrusion detection
    Goodall, John R.
    Lutters, Wayne G.
    Komlodi, Anita
    INFORMATION TECHNOLOGY & PEOPLE, 2009, 22 (02) : 92 - 108
  • [42] Fuzzy network profiling for intrusion detection
    Dickerson, JE
    Dickerson, JA
    PEACHFUZZ 2000 : 19TH INTERNATIONAL CONFERENCE OF THE NORTH AMERICAN FUZZY INFORMATION PROCESSING SOCIETY - NAFIPS, 2000, : 301 - 306
  • [43] A Novel Method for Network Intrusion Detection
    Wang, Hongmin
    Wei, Qiang
    Xie, Yaobin
    SCIENTIFIC PROGRAMMING, 2022, 2022
  • [44] Recent Developments in Network Intrusion Detection
    Chen, Thomas
    Fu, Zhi
    He, Liwen
    Strayer, Tim
    IEEE NETWORK, 2009, 23 (01): : 4 - 5
  • [45] Network stream splitting for intrusion detection
    Judd, JD
    McEachen, JC
    Michael, JB
    Ettlich, DW
    ICON 2003: 11TH IEEE INTERNATIONAL CONFERENCE ON NETWORKS, 2003, : 525 - 530
  • [46] The Intrusion Detection in Mobile Sensor Network
    Keung, Gabriel Y.
    Li, Bo
    Zhang, Qian
    IEEE-ACM TRANSACTIONS ON NETWORKING, 2012, 20 (04) : 1152 - 1161
  • [47] Performance of the Network Intrusion Detection Systems
    Murthy, M. V. Ramana
    Kumar, P. Ram
    Rao, E. Devender
    Sharma, A. C.
    Rajender, S.
    Rambabu, S.
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2009, 9 (10): : 198 - 202
  • [48] Network traffic clustering for intrusion detection
    Arina, Nikishova
    Irina, Ananina
    Evgeny, Ananin
    PROCEEDINGS OF THE IV INTERNATIONAL RESEARCH CONFERENCE INFORMATION TECHNOLOGIES IN SCIENCE, MANAGEMENT, SOCIAL SPHERE AND MEDICINE (ITSMSSM 2017), 2017, 72 : 252 - 256
  • [49] A Hybrid Approach for Network Intrusion Detection
    Mehmood, Mavra
    Javed, Talha
    Nebhen, Jamel
    Abbas, Sidra
    Abid, Rabia
    Bojja, Giridhar Reddy
    Rizwan, Muhammad
    CMC-COMPUTERS MATERIALS & CONTINUA, 2022, 70 (01): : 91 - 107
  • [50] Network Intrusion Detection in Encrypted Traffic
    Papadogiannaki, Eva
    Tsirantonakis, Giorgos
    Ioannidis, Sotiris
    2022 5TH IEEE CONFERENCE ON DEPENDABLE AND SECURE COMPUTING (IEEE DSC 2022), 2022,