Introducing Deep Learning Self-Adaptive Misuse Network Intrusion Detection Systems

被引:85
|
作者
Papamartzivanos, Dimitrios [1 ]
Gomez Marmol, Felix [2 ]
Kambourakis, Georgios [1 ]
机构
[1] Univ Aegean, Dept Informat & Commun Syst Engn, Samos 83200, Greece
[2] Univ Murcia, Dept Informat & Commun Engn, E-30100 Murcia, Spain
来源
IEEE ACCESS | 2019年 / 7卷
关键词
Adaptive intrusion detection systems; artificial neural networks; deep learning; information systems security; MAPE-K; sparse auto encoders; COMPREHENSIVE SURVEY; SWARM INTELLIGENCE;
D O I
10.1109/ACCESS.2019.2893871
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The intrusion detection systems (IDSs) are essential elements when it comes to the protection of an ICT infrastructure. A misuse IDS is a stable method that can achieve high attack detection rates (ADR) while keeping false alarm rates under acceptable levels. However, the misuse IDSs suffer from the lack of agility, as they are unqualified to adapt to new and "unknown'' environments. That is, such an IDS puts the security administrator into an intensive engineering task for keeping the IDS up-to-date every time it faces efficiency drops. Considering the extended size of modern networks and the complexity of big network traffic data, the problem exceeds the substantial limits of human managing capabilities. In this regard, we propose a novel methodology which combines the benefits of self-taught learning and MAPE-K frameworks to deliver a scalable, self-adaptive, and autonomous misuse IDS. Our methodology enables the misuse IDS to sustain high ADR, even if it is imposed on consecutive and drastic environmental changes. Through the utilization of deep-learning based methods, the IDS is able to grasp an attack's nature based on the generalized feature reconstructions stemming directly from the unknown environment and its unlabeled data. The experimental results reveal that our methodology can breathe new life into the IDS without the constant need for manually refreshing its training set. We evaluate our proposal under several classification metrics and demonstrate that the ADR of the IDS increases up to 73.37% in critical situations where a statically trained IDS is rendered totally ineffective.
引用
收藏
页码:13546 / 13560
页数:15
相关论文
共 50 条
  • [1] A New Model of Self-Adaptive Network Intrusion Detection
    Zhang Qing-hua
    Fu Yu-zhen
    Xu Bu-gong
    2008 IEEE CONGRESS ON EVOLUTIONARY COMPUTATION, VOLS 1-8, 2008, : 436 - +
  • [2] Adaptive deep learning for network intrusion detection by risk analysis
    Zhang, Lijun
    Lu, Xingyu
    Chen, Zhaoqiang
    Liu, Tianwei
    Chen, Qun
    Li, Zhanhuai
    NEUROCOMPUTING, 2022, 493 : 46 - 58
  • [3] Intrusion Detection Based on Self-adaptive Differential Evolutionary Extreme Learning Machine
    Ku, Junhua
    Yun, Dawei
    Zheng, Bing
    2017 INTERNATIONAL CONFERENCE ON COMPUTER NETWORK, ELECTRONIC AND AUTOMATION (ICCNEA), 2017, : 94 - 100
  • [4] Self-adaptive intrusion detection system for computational grid
    Jiancheng, Ni
    Zhishu, Li
    Jirong, Sun
    Jianchuan, Xing
    TASE 2007: FIRST JOINT IEEE/IFIP SYMPOSIUM ON THEORETICAL ASPECTS OF SOFTWARE ENGINEERING, PROCEEDINGS, 2007, : 97 - +
  • [5] Deep Learning Model Transposition for Network Intrusion Detection Systems
    Figueiredo, Joao
    Serrao, Carlos
    de Almeida, Ana Maria
    ELECTRONICS, 2023, 12 (02)
  • [6] Comparison of Machine Learning and Deep Learning Models for Network Intrusion Detection Systems
    Thapa, Niraj
    Liu, Zhipeng
    Kc, Dukka B.
    Gokaraju, Balakrishna
    Roy, Kaushik
    FUTURE INTERNET, 2020, 12 (10) : 1 - 16
  • [7] Self-Adaptive Approximate Mobile Deep Learning
    Knez, Timotej
    Machidon, Octavian
    Pejovic, Veljko
    ELECTRONICS, 2021, 10 (23)
  • [8] Deep Learning in Intrusion Detection Systems
    Karatas, Gozde
    Demir, Onder
    Sahingoz, Ozgur Koray
    2018 INTERNATIONAL CONGRESS ON BIG DATA, DEEP LEARNING AND FIGHTING CYBER TERRORISM (IBIGDELFT), 2018, : 113 - 116
  • [9] Self-Adaptive Frequency Scaling Architecture for Intrusion Detection System
    Lu, Qiuwen
    Zhou, Zhou
    Sha, Hongzhou
    Liu, Qingyun
    Sun, Hongcheng
    TRUSTWORTHY COMPUTING AND SERVICES (ISCTCS 2014), 2015, 520 : 74 - 82
  • [10] Application of deep extreme learning machine in network intrusion detection systems
    Wuke, Li
    Guangluan, Yin
    Xiaoxiao, Chen
    IAENG International Journal of Computer Science, 2020, 47 (02) : 136 - 143