A Comparison of Neural-Network-Based Intrusion Detection against Signature-Based Detection in IoT Networks

被引:5
作者
Schroetter, Max [1 ]
Niemann, Andreas [1 ]
Schnor, Bettina [1 ]
机构
[1] Univ Potsdam, Dept Comp Sci, D-14476 Potsdam, Germany
关键词
IDS; dataset; deep learning; signature-based-IDS; IoT;
D O I
10.3390/info15030164
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Over the last few years, a plethora of papers presenting machine-learning-based approaches for intrusion detection have been published. However, the majority of those papers do not compare their results with a proper baseline of a signature-based intrusion detection system, thus violating good machine learning practices. In order to evaluate the pros and cons of the machine-learning-based approach, we replicated a research study that uses a deep neural network model for intrusion detection. The results of our replicated research study expose several systematic problems with the used datasets and evaluation methods. In our experiments, a signature-based intrusion detection system with a minimal setup was able to outperform the tested model even under small traffic changes. Testing the replicated neural network on a new dataset recorded in the same environment with the same attacks using the same tools showed that the accuracy of the neural network dropped to 54%. Furthermore, the often-claimed advantage of being able to detect zero-day attacks could not be seen in our experiments.
引用
收藏
页数:26
相关论文
共 72 条
[21]   Utilising Deep Learning Techniques for Effective Zero-Day Attack Detection [J].
Hindy, Hanan ;
Atkinson, Robert ;
Tachtatzis, Christos ;
Colin, Jean-Noel ;
Bayne, Ethan ;
Bellekens, Xavier .
ELECTRONICS, 2020, 9 (10) :1-16
[22]  
Hindy Hanan, 2020, IEEE DataPort
[23]   A Taxonomy of Network Threats and the Effect of Current Datasets on Intrusion Detection Systems [J].
Hindy, Hanan ;
Brosset, David ;
Bayne, Ethan ;
Seeam, Amar ;
Tachtatzis, Christos ;
Atkinson, Robert ;
Bellekens, Xavier .
IEEE ACCESS, 2020, 8 :104650-104675
[24]  
Hindy Hanan., 2021, Em: Selected Papers from the 12th International Networking Conference: INC 2020, P73, DOI [10.1007/978-3-030-64758-2_6, DOI 10.1007/978-3-030-64758-2_6]
[25]   New Directions in Automated Traffic Analysis [J].
Holland, Jordan ;
Schmitt, Paul ;
Feamster, Nick ;
Mittal, Prateek .
CCS '21: PROCEEDINGS OF THE 2021 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2021, :3366-3383
[26]  
IBM, What Are Neural Networks?
[27]  
Jacobs Arthur S., 2022, CCS '22: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, P1537, DOI 10.1145/3548606.3560609
[28]   Feature Engineering and Machine Learning Framework for DDoS Attack Detection in the Standardized Internet of Things [J].
Kamaldeep, Manisha ;
Malik, Manisha ;
Dutta, Maitreyee .
IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (10) :8658-8669
[29]   A Deep Learning-Based Intrusion Detection System for MQTT Enabled IoT [J].
Khan, Muhammad Almas ;
Khan, Muazzam A. ;
Jan, Sana Ullah ;
Ahmad, Jawad ;
Jamal, Sajjad Shaukat ;
Shah, Awais Aziz ;
Pitropakis, Nikolaos ;
Buchanan, William J. .
SENSORS, 2021, 21 (21)
[30]   Survey of intrusion detection systems: techniques, datasets and challenges [J].
Khraisat, Ansam ;
Gondal, Iqbal ;
Vamplew, Peter ;
Kamruzzaman, Joarder .
CYBERSECURITY, 2019, 2 (01)