POSTER: A Re-evaluation of Intrusion Detection Accuracy: an Alternative Evaluation Strategy

被引:12
作者
Al-Riyami, Said [1 ]
Coenen, Frans [1 ]
Lisitsa, Alexei [1 ]
机构
[1] Univ Liverpool, Liverpool, Merseyside, England
来源
PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18) | 2018年
关键词
Intrusion detection system; Network Security; Security and Privacy; Domain Adaptation; Machine Learning; Deep Learning;
D O I
10.1145/3243734.3278490
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This work tries to evaluate the existing approaches used to benchmark the performance of machine learning models applied to network based intrusion detection systems (NIDS). First, we demonstrate that we can reach a very high accuracy with most of the traditional machine learning and deep learning models by using the existing performance evaluation strategy. It just requires the right hyper-parameter tuning to outperform the existing reported accuracy results in deep learning models. We further question the value of the existing evaluation methods in which the same datasets are used for training and testing the models. We are proposing the use of an alternative strategy that aims to evaluate the practicality and the performance of the models and datasets as well. In this approach, different datasets with compatible sets of features are used for training and testing. When we evaluate the models that we created with the proposed strategy, we demonstrate that the performance is very bad. Thus, models have no practical usage, and it performs based on a pure randomness. This research is important for security-based machine learning applications to re-think about the datasets and the model's quality.
引用
收藏
页码:2195 / 2197
页数:3
相关论文
共 14 条
  • [1] A Neural Network Architecture Combining Gated Recurrent Unit (GRU) and Support Vector Machine (SVM) for Intrusion Detection in Network Traffic Data
    Agarap, Abien Fred M.
    [J]. PROCEEDINGS OF 2018 10TH INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND COMPUTING (ICMLC 2018), 2018, : 26 - 30
  • [2] [Anonymous], 2011, WORKSHOP BUILDING AN, DOI DOI 10.1145/1978672.1978676
  • [3] [Anonymous], 2017, INT SEC THREAT REP
  • [4] [Anonymous], 2008, P 7 AUSTR DAT MIN C
  • [5] Kaspersky Lab, 2017, NUMB YEAR 360000 MAL
  • [6] Mahoney MV, 2003, LECT NOTES COMPUT SC, V2820, P220
  • [7] McAfee Lab, 2017, THREAT REP
  • [8] McHugh J., 2000, ACM Transactions on Information and Systems Security, V3, P262, DOI 10.1145/382912.382923
  • [9] Pervez M.S., 2014, The 8th International Conference on Software, Knowledge, Information Management and Applications, P1, DOI DOI 10.1109/SKIMA.2014.7083539
  • [10] Rao B Basaveswara, 2017, INDIAN J SCI TECHNOL, V10, P14