Conditional Variational Autoencoder for Prediction and Feature Recovery Applied to Intrusion Detection in IoT

被引:174
作者
Lopez-Martin, Manuel [1 ]
Carro, Belen [1 ]
Sanchez-Esguevillas, Antonio [1 ]
Lloret, Jaime [2 ]
机构
[1] Univ Valladolid, ETSIT, Dpto TSyCeIT, Paseo Belen 15, E-47011 Valladolid, Spain
[2] Univ Politecn Valencia, Inst Invest Gest Integrada Zonas Costeras, Camino Vera S-N, E-46022 Valencia, Spain
关键词
intrusion detection; variational methods; conditional variational autoencoder; feature recovery; neural networks;
D O I
10.3390/s17091967
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
The purpose of a Network Intrusion Detection System is to detect intrusive, malicious activities or policy violations in a host or host's network. In current networks, such systems are becoming more important as the number and variety of attacks increase along with the volume and sensitiveness of the information exchanged. This is of particular interest to Internet of Things networks, where an intrusion detection system will be critical as its economic importance continues to grow, making it the focus of future intrusion attacks. In this work, we propose a new network intrusion detection method that is appropriate for an Internet of Things network. The proposed method is based on a conditional variational autoencoder with a specific architecture that integrates the intrusion labels inside the decoder layers. The proposed method is less complex than other unsupervised methods based on a variational autoencoder and it provides better classification results than other familiar classifiers. More important, the method can perform feature reconstruction, that is, it is able to recover missing features from incomplete training datasets. We demonstrate that the reconstruction accuracy is very high, even for categorical features with a high number of distinct values. This work is unique in the network intrusion detection field, presenting the first application of a conditional variational autoencoder and providing the first algorithm to perform feature recovery.
引用
收藏
页数:17
相关论文
共 28 条
[1]  
Aggarwal C.C, 2013, OUTLIER ANAL, P10
[2]  
Alom MZ, 2015, PROC NAECON IEEE NAT, P339, DOI 10.1109/NAECON.2015.7443094
[3]   Intrusion Detection Systems Based on Artificial Intelligence Techniques in Wireless Sensor Networks [J].
Alrajeh, Nabil Ali ;
Lloret, J. .
INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2013,
[4]  
An J., 2015, VARIATIONAL AUTOENCO
[5]  
[Anonymous], 2017, CORR
[6]  
[Anonymous], 2017, 2017 IEEE Wireless Communications and Networking Conference WCNC, DOI 10.1109/WCNC.2017.7925567.205
[7]  
[Anonymous], THESIS
[8]  
[Anonymous], 2016, Networks, Computers and Communications (ISNCC), 2016 International Symposium on, DOI [10.1109/ISNCC.2016.7746067, DOI 10.1109/ISNCC.2016.7746067]
[9]  
Bandgar M., 2013, IOSR J COMPUT ENG IO, V10, P66
[10]   Network Anomaly Detection: Methods, Systems and Tools [J].
Bhuyan, Monowar H. ;
Bhattacharyya, D. K. ;
Kalita, J. K. .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2014, 16 (01) :303-336