Towards Real-Time Network Intrusion Detection With Image-Based Sequential Packets Representation

被引:1
作者
Ghadermazi, Jalal [1 ]
Shah, Ankit [2 ,3 ]
Bastian, Nathaniel D. [4 ]
机构
[1] Univ S Florida, Ind & Management Syst Engn Dept, Tampa, FL 33620 USA
[2] Univ S Florida, Ind & Management Syst Engn, Tampa, FL 33620 USA
[3] Univ S Florida, Artificial Intelligence Res Lab Secure & Efficient, Tampa, FL 33620 USA
[4] United States Mil Acad, Syst Engn Math Sci & Comp, West Point, NY 10996 USA
关键词
Feature extraction; Telecommunication traffic; Payloads; Big Data; Data mining; Real-time systems; Convolutional neural networks; Early attack detection; network intrusion detection system; packet -based NIDS; sequential packets image representation; DEEP LEARNING APPROACH; CLASSIFICATION; CNN;
D O I
10.1109/TBDATA.2024.3403394
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Machine learning (ML) and deep learning (DL) advancements have greatly enhanced anomaly detection of network intrusion detection systems (NIDS) by empowering them to analyze Big Data and extract patterns. ML/DL-based NIDS are trained using either flow-based or packet-based features. Flow-based NIDS are suitable for offline traffic analysis, while packet-based NIDS can analyze traffic and detect attacks in real-time. Current packet-based approaches analyze packets independently, overlooking the sequential nature of network communication. This results in biased models that exhibit increased false negatives and positives. Additionally, most literature-proposed packet-based NIDS capture only payload data, neglecting crucial information from packet headers. This oversight can impair the ability to identify header-level attacks, such as denial-of-service attacks. To address these limitations, we propose a novel artificial intelligence-enabled methodological framework for packet-based NIDS that effectively analyzes header and payload data and considers temporal connections among packets. Our framework transforms sequential packets into two-dimensional images. It then develops a convolutional neural network-based intrusion detection model to process these images and detect malicious activities. Through experiments using publicly available big datasets, we demonstrate that our framework is able to achieve high detection rates of 97.7% to 99% across different attack types and displays promising resilience against adversarial examples.
引用
收藏
页码:157 / 173
页数:17
相关论文
共 56 条
  • [1] Abadi M., 2015, TensorFlow. Large-Scale Machine Learning on Heterogeneous Systems, V1
  • [2] Al Ger, 2019, Kerastuner
  • [3] Alani M. M., 2014, Guide to OSI and TCP/IP Models
  • [4] Alrawashdeh K, 2016, 2016 15TH IEEE INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND APPLICATIONS (ICMLA 2016), P195, DOI [10.1109/ICMLA.2016.167, 10.1109/ICMLA.2016.0040]
  • [5] [Anonymous], JAXA. 2022. Available at: https://www.eorc.jaxa.jp/ALOS/en/dataset/fnf_e.htm/. (Accessed: 11 May 2023)
  • [6] [Anonymous], CSO (Central Statistics Office), 2011. [online]. [Accessed November 2018]. Available from: https://www.cso.ie/en/releasesandpublications/ep/p-cp8iter/p8iter/p8itd/
  • [7] Dynamic Prototype Network Based on Sample Adaptation for Few-Shot Malware Detection
    Chai, Yuhan
    Du, Lei
    Qiu, Jing
    Yin, Lihua
    Tian, Zhihong
    [J]. IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2023, 35 (05) : 4754 - 4766
  • [8] DESC-IDS: Towards an efficient real-time automotive intrusion detection system based on deep evolving stream clustering
    Cheng, Pengzhou
    Han, Mu
    Liu, Gongshen
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2023, 140 : 266 - 281
  • [9] Troubleshooting an Intrusion Detection Dataset: the CICIDS2017 Case Study
    Engelen, Gints
    Rimmer, Vera
    Joosen, Wouter
    [J]. 2021 IEEE SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (SPW 2021), 2021, : 7 - 12
  • [10] Farahnakian F, 2018, INT CONF ADV COMMUN, P178, DOI 10.23919/ICACT.2018.8323688