From Machine Learning Based Intrusion Detection to Cost Sensitive Intrusion Response

被引:1
|
作者
Hussain, Tazar [1 ]
Beard, Alfie [2 ]
Chen, Liming [1 ]
Nugent, Chris [1 ]
Liu, Jun [1 ]
Moore, Adrian [1 ]
机构
[1] Ulster Univ, Jordanstown Co, Sch Comp, Belfast BT37 0BH, Antrim, North Ireland
[2] Martlesham Heath, BT Labs, Adastral Pk, Ipswich IP5 3RE, Suffolk, England
关键词
Intrusion Detection System (IDS); Intrusion Response System (IRS); Machine Learning (ML); Calibration; Random Forest (RF);
D O I
10.1109/CSP55486.2022.00031
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Machine learning (ML) based intrusion detection systems (IDS) are increasingly used to discover abnormal patterns in network data and predict cyberattacks. However, the construction of intrusion response systems (IRS) used to deploy countermeasures and prevent malicious activities is more challenging because they require in-depth understanding of attack patterns, attacker behavior, and the correlation between different types of attacks. Furthermore, IDSs generate a large number of false positives and the confidence with which an attack can be predicted is usually unknown. As a result of these challenges in IDS and IRSs, inappropriate actions may be deployed, which may reduce network performance and users' ability to perform typical tasks. Therefore, the present work proposes an intrusion detection and response method based on the Calibrated Random Forest (CRF) algorithm to overcome the key challenges related to the construction of an efficient IRS. The proposed CRF is used to quantify uncertainty in the prediction of cyberattacks and expresses each attack as a probability distribution. Subsequently, the predicted probabilities are used as confidence scores and integrated with domain expert knowledge for decision making in an IRS. We then use publicly available intrusion detection data sets to test and evaluate the proposed method based on three metrics: log loss, Brier score, and expected calibration error (ECE). Experimental results show that the proposed method makes intrusion response more reasonable and cost-sensitive, and has the ability to manage criticality, integrate domain knowledge and explain model behavior. It also demonstrates that this method provides an effective solution for security analysts in how to appropriately deploy and prioritize actions.
引用
收藏
页码:124 / 130
页数:7
相关论文
共 50 条
  • [1] A Cost-Sensitive Machine Learning Model With Multitask Learning for Intrusion Detection in IoT
    Telikani, Akbar
    Rudbardeh, Nima Esmi
    Soleymanpour, Shiva
    Shahbahrami, Asadollah
    Shen, Jun
    Gaydadjiev, Georgi
    Hassanpour, Reza
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2024, 20 (03) : 3880 - 3890
  • [2] Intrusion detection method based on machine learning
    Tian, Xin-Guang
    Gao, Li-Zhi
    Zhang, Er-Yang
    Tongxin Xuebao/Journal on Communications, 2006, 27 (06): : 108 - 114
  • [3] Machine Learning Based Network Intrusion Detection
    Lee, Chie-Hong
    Su, Yann-Yean
    Lin, Yu-Chun
    Lee, Shie-Jue
    2017 2ND IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND APPLICATIONS (ICCIA), 2017, : 79 - 83
  • [4] Intrusion detection system based on machine learning
    Wang, Xu-Ren
    Xu, Rong-Sheng
    Jisuanji Gongcheng/Computer Engineering, 2006, 32 (14): : 107 - 108
  • [5] RESEACH OF INTRUSION DETECTION BASED ON COST-SENSITIVE
    Fu, Desheng
    Hao, Xiaoke
    2011 INTERNATIONAL CONFERENCE ON INSTRUMENTATION, MEASUREMENT, CIRCUITS AND SYSTEMS (ICIMCS 2011), VOL 2: FUTURE COMMUNICATION AND NETWORKING, 2011, : 77 - 80
  • [6] Intrusion detection based on phishing detection with machine learning
    Jayaraj R.
    Pushpalatha A.
    Sangeetha K.
    Kamaleshwar T.
    Udhaya Shree S.
    Damodaran D.
    Measurement: Sensors, 2024, 31
  • [7] A survey of intrusion detection from the perspective of intrusion datasets and machine learning techniques
    Singh G.
    Khare N.
    International Journal of Computers and Applications, 2022, 44 (07) : 659 - 669
  • [8] Machine learning based intrusion detection system for IoMT
    Kulshrestha, Priyesh
    Vijay Kumar, T. V.
    INTERNATIONAL JOURNAL OF SYSTEM ASSURANCE ENGINEERING AND MANAGEMENT, 2024, 15 (05) : 1802 - 1814
  • [9] Anomaly Based Intrusion Detection for IoT with Machine Learning
    Shaver, Addison
    Liu, Zhipeng
    Thapa, Niraj
    Roy, Kaushik
    Gokaraju, Balakrishna
    Yuan, Xiaohon
    2020 IEEE APPLIED IMAGERY PATTERN RECOGNITION WORKSHOP (AIPR): TRUSTED COMPUTING, PRIVACY, AND SECURING MULTIMEDIA, 2020,
  • [10] Intrusion detection with autoencoder based deep learning machine
    Kaynar, Oguz
    Yuksek, Ahmet Gurkan
    Gormez, Yasin
    Isik, Yunus Emre
    2017 25TH SIGNAL PROCESSING AND COMMUNICATIONS APPLICATIONS CONFERENCE (SIU), 2017,