A Comparison of Neural-Network-Based Intrusion Detection against Signature-Based Detection in IoT Networks

被引:3
作者
Schroetter, Max [1 ]
Niemann, Andreas [1 ]
Schnor, Bettina [1 ]
机构
[1] Univ Potsdam, Dept Comp Sci, D-14476 Potsdam, Germany
关键词
IDS; dataset; deep learning; signature-based-IDS; IoT;
D O I
10.3390/info15030164
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Over the last few years, a plethora of papers presenting machine-learning-based approaches for intrusion detection have been published. However, the majority of those papers do not compare their results with a proper baseline of a signature-based intrusion detection system, thus violating good machine learning practices. In order to evaluate the pros and cons of the machine-learning-based approach, we replicated a research study that uses a deep neural network model for intrusion detection. The results of our replicated research study expose several systematic problems with the used datasets and evaluation methods. In our experiments, a signature-based intrusion detection system with a minimal setup was able to outperform the tested model even under small traffic changes. Testing the replicated neural network on a new dataset recorded in the same environment with the same attacks using the same tools showed that the accuracy of the neural network dropped to 54%. Furthermore, the often-claimed advantage of being able to detect zero-day attacks could not be seen in our experiments.
引用
收藏
页数:26
相关论文
共 72 条
[1]   Zero-day attack detection: a systematic literature review [J].
Ahmad, Rasheed ;
Alsmadi, Izzat ;
Alhamdani, Wasim ;
Tawalbeh, Lo'ai .
ARTIFICIAL INTELLIGENCE REVIEW, 2023, 56 (10) :10733-10811
[2]  
Ahrenholz J, 2008, IEEE MILIT COMMUN C, P3856
[3]   Multiclass Classification Procedure for Detecting Attacks on MQTT-IoT Protocol [J].
Alaiz-Moreton, Hector ;
Aveleira-Mata, Jose ;
Ondicol-Garcia, Jorge ;
Luis Munoz-Castaneda, Angel ;
Garcia, Isaias ;
Benavides, Carmen .
COMPLEXITY, 2019, 2019
[4]   SGAN-IDS: Self-Attention-Based Generative Adversarial Network against Intrusion Detection Systems [J].
Aldhaheri, Sahar ;
Alhuzali, Abeer .
SENSORS, 2023, 23 (18)
[5]   Deep Reinforcement Adversarial Learning Against Botnet Evasion Attacks [J].
Apruzzese, Giovanni ;
Andreolini, Mauro ;
Marchetti, Mirco ;
Venturi, Andrea ;
Colajanni, Michele .
IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2020, 17 (04) :1975-1987
[6]  
Arp D., 2020, P USENIX SEC S BOST
[7]  
Aveleira J., MQTT_UAD: MQTT Under Attack Dataset A Public Dataset for the Detection of Attacks in IoT Networks Using MQTT
[8]  
bsi.bund, BSI Grundlagen: 1. IDS-Grundlagen und Aktueller Stand
[9]  
Cahyo Aditya Nur, 2020, 2020 12th International Conference on Information Technology and Electrical Engineering (ICITEE), P92, DOI 10.1109/ICITEE49829.2020.9271727
[10]   Machine Learning (In) Security: A Stream of Problems [J].
Ceschin, Fabricio ;
Botacin, Marcus ;
Bifet, Albert ;
Pfahringer, Bernhard ;
Oliveira, Luiz S. ;
Gomes, Heitor Murilo ;
Gregio, Andre .
DIGITAL THREATS: RESEARCH AND PRACTICE, 2024, 5 (01)