ARCADE: Adversarially Regularized Convolutional Autoencoder for Network Anomaly Detection

被引:20
作者
Lunardi, Willian Tessaro [1 ]
Lopez, Martin Andreoni [1 ]
Giacalone, Jean-Pierre [1 ]
机构
[1] Technol & Innovat Inst, Secure Syst Res Ctr, Abu Dhabi, U Arab Emirates
来源
IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT | 2023年 / 20卷 / 02期
关键词
Unsupervised anomaly detection; autoencoder; generative adversarial networks; automatic feature extraction; deep learning; cybersecurity;
D O I
10.1109/TNSM.2022.3229706
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As the number of heterogenous IP-connected devices and traffic volume increase, so does the potential for security breaches. The undetected exploitation of these breaches can bring severe cybersecurity and privacy risks. Anomaly-based Intrusion Detection Systems (IDSs) play an essential role in network security. In this paper, we present a practical unsupervised anomaly-based deep learning detection system called ARCADE (Adversarially Regularized Convolutional Autoencoder for unsupervised network anomaly DEtection). With a convolutional Autoencoder (AE), ARCADE automatically builds a profile of the normal traffic using a subset of raw bytes of a few initial packets of network flows so that potential network anomalies and intrusions can be efficiently detected before they cause more damage to the network. ARCADE is trained exclusively on normal traffic. An adversarial training strategy is proposed to regularize and decrease the AE's capabilities to reconstruct network flows that are out-of-the-normal distribution, thereby improving its anomaly detection capabilities. The proposed approach is more effective than state-of-the-art deep learning approaches for network anomaly detection. Even when examining only two initial packets of a network flow, ARCADE can effectively detect malware infection and network attacks. ARCADE presents 20 times fewer parameters than baselines, achieving significantly faster detection speed and reaction time.
引用
收藏
页码:1305 / 1318
页数:14
相关论文
共 38 条
[1]   Mobile Encrypted Traffic Classification Using Deep Learning: Experimental Evaluation, Lessons Learned, and Challenges [J].
Aceto, Giuseppe ;
Ciuonzo, Domenico ;
Montieri, Antonio ;
Pescape, Antonio .
IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2019, 16 (02) :445-458
[2]  
Ahmad T., 2022, ARXIV
[3]   Network intrusion detection system: A systematic study of machine learning and deep learning approaches [J].
Ahmad, Zeeshan ;
Shahid Khan, Adnan ;
Wai Shiang, Cheah ;
Abdullah, Johari ;
Ahmad, Farhan .
TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2021, 32 (01)
[4]   GANomaly: Semi-supervised Anomaly Detection via Adversarial Training [J].
Akcay, Samet ;
Atapour-Abarghouei, Amir ;
Breckon, Toby P. .
COMPUTER VISION - ACCV 2018, PT III, 2019, 11363 :622-637
[5]  
Arjovsky M, 2017, PR MACH LEARN RES, V70
[6]  
Bergman L, 2020, Arxiv, DOI [arXiv:2002.10445, DOI 10.48550/ARXIV.2002.10445]
[7]  
Bergmann P, 2019, Arxiv, DOI [arXiv:1807.02011, DOI 10.48550/ARXIV.1807.02011]
[8]  
Cisco, 2020, Cisco Annual Internet Report (2018-2023) White Paper
[9]  
Deng J, 2009, PROC CVPR IEEE, P248, DOI 10.1109/CVPRW.2009.5206848
[10]   Lucid: A Practical, Lightweight Deep Learning Solution for DDoS Attack Detection [J].
Doriguzzi-Corin, R. ;
Millar, S. ;
Scott-Hayward, S. ;
Martinez-del-Rincon, J. ;
Siracusa, D. .
IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2020, 17 (02) :876-889