Enhancing Network Intrusion Detection: An Online Methodology for Performance Analysis

被引:0
作者
Magnani, Simone [1 ,2 ]
Doriguzzi-Corin, Roberto [1 ]
Siracusa, Domenico [1 ]
机构
[1] Fdn Bruno Kessler, Cybersecur, Povo, Italy
[2] Univ Genoa, DIBRIS Dept, Genoa, Italy
来源
2023 IEEE 9TH INTERNATIONAL CONFERENCE ON NETWORK SOFTWARIZATION, NETSOFT | 2023年
关键词
Intrusion Detection; Performance; Methodology;
D O I
10.1109/NetSoft57336.2023.10175465
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Machine learning models have been extensively proposed for classifying network flows as benign or malicious, either in-network or at the endpoints of the infrastructure. Typically, the performance of such models is assessed by evaluating the trained model against a portion of the available dataset. However, in a production scenario, these models are fed by a monitoring stage that collects information from flows and provides inputs to a filtering stage that eventually blocks malicious traffic. To the best of our knowledge, no work has analysed the entire pipeline, focusing on its performance in terms of both inputs (i.e., the information collected from each flow) and outputs (i.e., the system's ability to prevent an attack from reaching the application layer). In this paper, we propose a methodology for evaluating the effectiveness of a Network Intrusion Detection System (NIDS) by placing the model evaluation test alongside an online test that simulates the entire monitoring-detection-mitigation pipeline. We assess the system's outputs based on different input configurations, using state-of-the-art detection models and datasets. Our results highlight the importance of inputs for the throughput of the NIDS, which can decrease by more than 50% with heavier configurations. Furthermore, our research indicates that relying solely on the performance of the detection model may not be enough to evaluate the effectiveness of the entire NIDS process. Indeed, even when achieving near-optimal False Negative Rate (FNR) values (e.g., 0.01), a substantial amount of malicious traffic (e.g., 70%) may still successfully reach its target.
引用
收藏
页码:510 / 515
页数:6
相关论文
共 22 条
[1]   Deep Learning for Network Traffic Monitoring and Analysis (NTMA): A Survey [J].
Abbasi, Mahmoud ;
Shahraki, Amin ;
Taherkordi, Amir .
COMPUTER COMMUNICATIONS, 2021, 170 :19-41
[2]   DAICS: A Deep Learning Solution for Anomaly Detection in Industrial Control Systems [J].
Abdelaty, Maged ;
Doriguzzi-Corin, Roberto ;
Siracusa, Domenico .
IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING, 2022, 10 (02) :1117-1129
[3]  
Antonakakis M, 2017, PROCEEDINGS OF THE 26TH USENIX SECURITY SYMPOSIUM (USENIX SECURITY '17), P1093
[4]  
Arduino, ARD NANO33 BLE
[5]   A Survey of Intrusion Detection Systems Leveraging Host Data [J].
Bridges, Robert A. ;
Glass-Vanderlan, Tarrah R. ;
Iannacone, Michael D. ;
Vincent, Maria S. ;
Chen, Qian .
ACM COMPUTING SURVEYS, 2020, 52 (06)
[6]   Supervised feature selection techniques in network intrusion detection: A critical review [J].
Di Mauro, M. ;
Galatro, G. ;
Fortino, G. ;
Liotta, A. .
ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE, 2021, 101
[7]  
Dimolianis M., 2021, PROC ICIN
[8]   Lucid: A Practical, Lightweight Deep Learning Solution for DDoS Attack Detection [J].
Doriguzzi-Corin, R. ;
Millar, S. ;
Scott-Hayward, S. ;
Martinez-del-Rincon, J. ;
Siracusa, D. .
IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2020, 17 (02) :876-889
[9]  
Doriguzzi-Corin R., LUCID dataset parser
[10]   A Self-Adaptive Deep Learning-Based System for Anomaly Detection in 5G Networks [J].
Fernandez Maimo, Lorenzo ;
Perales Gomez, Angel Luis ;
Garcia Clemente, Felix J. ;
Gil Perez, Manuel ;
Martinez Perez, Gregorio .
IEEE ACCESS, 2018, 6 :7700-7712