L-IDS: A Lifelong Learning Approach for Intrusion Detection

被引:0
作者
Doroud, Hossein [1 ]
Alkhateeb, Omar [1 ]
Jarchlo, Elnaz Alizadeh [2 ]
Dressler, Falko [1 ]
机构
[1] TU Berlin, Sch Elect Engn & Comp Sci, Berlin, Germany
[2] Scout24, Munich, Germany
来源
2023 INTERNATIONAL WIRELESS COMMUNICATIONS AND MOBILE COMPUTING, IWCMC | 2023年
关键词
Intrusion Detection System; Lifelong Learning; Snort; Deep Packet Inspection; Anomaly Detector; NETWORK;
D O I
10.1109/IWCMC58020.2023.10182443
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Intrusion detection systems (IDS) represent a class of defensive security tools with the purpose of protecting the network from intruders in the network administrator's arsenal. Despite the high precision of traditional signature-based IDS, its effectiveness is still under question due to the growth of a number of encrypted attacks and the volume of network traffic. This is considered one of the main motivations for researchers to develop anomaly-based IDS, which usually suffer from a higher false positive rate. In this paper, we propose and implement a lifelong-learning anomaly detection IDS (L-IDS) with the capability of the network environment's adaption to limit the false positive rate of anomaly detector in the range of signature-based IDS. We consider Snort as a baseline and UNSW-NB15 as the ground truth in the evaluation of our proposal. We demonstrate how L-IDS achieves a higher level of precision in comparison with the existing signature-based IDS.
引用
收藏
页码:482 / 487
页数:6
相关论文
共 24 条
  • [1] Using Word Embedding and Ensemble Learning for Highly Imbalanced Data Sentiment Analysis in Short Arabic Text
    Al-Azani, Sadam
    El-Alfy, El-Sayed M.
    [J]. 8TH INTERNATIONAL CONFERENCE ON AMBIENT SYSTEMS, NETWORKS AND TECHNOLOGIES (ANT-2017) AND THE 7TH INTERNATIONAL CONFERENCE ON SUSTAINABLE ENERGY INFORMATION TECHNOLOGY (SEIT 2017), 2017, 109 : 359 - 366
  • [2] Bhosale DA, 2015, PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON APPLIED AND THEORETICAL COMPUTING AND COMMUNICATION TECHNOLOGY (ICATCCT), P312, DOI 10.1109/ICATCCT.2015.7456901
  • [3] Network intrusion detection systems in high-speed traffic in computer networks
    Bul'ajoul, Waleed
    James, Anne
    Pannu, Mandeep
    [J]. 2013 IEEE 10TH INTERNATIONAL CONFERENCE ON E-BUSINESS ENGINEERING (ICEBE), 2013, : 168 - 175
  • [4] A Novel Online Incremental Learning Intrusion Prevention System
    Constantinides, Christos
    Shiaeles, Stavros
    Ghita, Bogdan
    Kolokotronis, Nicholas
    [J]. 2019 10TH IFIP INTERNATIONAL CONFERENCE ON NEW TECHNOLOGIES, MOBILITY AND SECURITY (NTMS), 2019,
  • [5] Erlacher F, 2018, IEEE IFIP NETW OPER
  • [6] Ertam F., 2017, International Artificial Intelligence and Data Processing Symposium (IDAP), P1
  • [7] Lifelong Machine Learning Architecture for Classification
    Hong, Xianbin
    Guan, Sheng-Uei
    Man, Ka Lok
    Wong, Prudence W. H.
    [J]. SYMMETRY-BASEL, 2020, 12 (05):
  • [8] Improving security using SVM-based anomaly detection: issues and challenges
    Hosseinzadeh, Mehdi
    Rahmani, Amir Masoud
    Vo, Bay
    Bidaki, Moazam
    Masdari, Mohammad
    Zangakani, Mehran
    [J]. SOFT COMPUTING, 2021, 25 (04) : 3195 - 3223
  • [9] Survey of intrusion detection systems: techniques, datasets and challenges
    Khraisat, Ansam
    Gondal, Iqbal
    Vamplew, Peter
    Kamruzzaman, Joarder
    [J]. CYBERSECURITY, 2019, 2 (01)
  • [10] Incremental on-line learning: A review and comparison of state of the art algorithms
    Losing, Viktor
    Hammer, Barbara
    Wersing, Heiko
    [J]. NEUROCOMPUTING, 2018, 275 : 1261 - 1274