A Hypergraph-Based Machine Learning Ensemble Network Intrusion Detection System

被引:0
作者
Lin, Zong-Zhi [1 ]
Pike, Thomas D. [1 ]
Bailey, Mark M. [1 ]
Bastian, Nathaniel D. [2 ]
机构
[1] Natl Intelligence Univ, Dept Cyber Intelligence & Data Sci, Bethesda, MD 20816 USA
[2] US Mil Acad, Army Cyber Inst, Dept Elect Engn & Comp Sci, West Point, NY 10996 USA
来源
IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS | 2024年 / 54卷 / 11期
关键词
Data models; Computational modeling; Training; Real-time systems; Adaptation models; Measurement; Feature extraction; Hypergraphs (HGs); intelligent systems; machine learning (ML); network intrusion detection; network science; FEATURE-SELECTION;
D O I
10.1109/TSMC.2024.3446635
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Network intrusion detection systems (NIDSs) to detect malicious attacks continue to meet challenges. NIDS are often developed offline while they face auto-generated port scan infiltration attempts, resulting in a significant time lag from adversarial adaption to NIDS response. To address these challenges, we use hypergraphs (HGs) focused on Internet protocol (IP) addresses and destination ports to capture evolving patterns of port scan attacks. The derived set of HG-based metrics are then used to train an ensemble machine learning (ML)-based NIDS that allows for real-time adaption in monitoring and detecting port scanning activities, other types of attacks, and adversarial intrusions at high accuracy, precision and recall performances. This ML adapting NIDS was developed through the combination of 1) intrusion examples; 2) NIDS update rules; 3) attack threshold choices to trigger NIDS retraining requests; and 4) a production environment with no prior knowledge of the nature of network traffic. 40 scenarios were auto-generated to evaluate the ML ensemble NIDS comprising three tree-based models. The resulting ML ensemble NIDS was extended and evaluated with the CIC-IDS2017 dataset. Results show that under the model settings of an Update-ALL-NIDS rule (specifically retrain and update all the three models upon the same NIDS retraining request) the proposed ML ensemble NIDS evolved intelligently and produced the best results with nearly 100% detection performance throughout the simulation.
引用
收藏
页码:6911 / 6923
页数:13
相关论文
共 34 条
[1]   Hypernetwork science via high-order hypergraph walks [J].
Aksoy, Sinan G. ;
Joslyn, Cliff ;
Marrero, Carlos Ortiz ;
Praggastis, Brenda ;
Purvine, Emilie .
EPJ DATA SCIENCE, 2020, 9 (01)
[2]   Adversarial machine learning in Network Intrusion Detection Systems [J].
Alhajjar, Elie ;
Maxwell, Paul ;
Bastian, Nathaniel .
EXPERT SYSTEMS WITH APPLICATIONS, 2021, 186
[3]  
Ali M., 2020, Pycaret Classification
[4]   Intrusion Detection Systems, Issues, Challenges, and Needs [J].
Aljanabi, Mohammad ;
Ismail, Mohd Arfian ;
Ali, Ahmed Hussein .
INTERNATIONAL JOURNAL OF COMPUTATIONAL INTELLIGENCE SYSTEMS, 2021, 14 (01) :560-571
[5]   Hypergraph clustering model-based association analysis of DDOS attacks in fog computing intrusion detection system [J].
An, Xingshuo ;
Su, Jingtao ;
Lue, Xing ;
Lin, Fuhong .
EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2018,
[6]  
Baluja S, 2017, Arxiv, DOI arXiv:1703.09387
[7]  
Bastian N. D., 2021, P WINT SIM C, P1
[8]  
Bielawski R., 2020, Rep. DOT HS 812 807
[9]  
Bierbrauer D. A., 2021, P AAAI FALL S ART IN, P1
[10]  
Bierbrauer DA, 2021, Arxiv, DOI arXiv:2105.06742