NBcoded: Network Attack Classifiers Based on Encoder and Naive Bayes Model for Resource Limited Devices

被引:5
作者
Segurola-Gil, Lander [1 ]
Zola, Francesco [1 ,2 ]
Echeberria-Barrio, Xabier [1 ]
Orduna-Urrutia, Raul [1 ]
机构
[1] Vicomtech Fdn, Basque Res & Technol Alliance BRTA, Donostia San Sebastian, Spain
[2] Univ Publ Navarra, Inst Smart Cities, Pamplona 31006, Spain
来源
MACHINE LEARNING AND PRINCIPLES AND PRACTICE OF KNOWLEDGE DISCOVERY IN DATABASES, PT II | 2021年 / 1525卷
关键词
Cybersecurity; Attack classification; Bayesian system; Autoencoder; Network traffic; AUTOENCODER;
D O I
10.1007/978-3-030-93733-1_4
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In the recent years, cybersecurity has gained high relevance, converting the detection of attacks or intrusions into a key task. In fact, a small breach in a system, application, or network, can cause huge damage for the companies. However, when this attack detection encounters the Artificial Intelligence paradigm, it can be addressed using high-quality classifiers which often need high resource demands in terms of computation or memory usage. This situation has a high impact when the attack classifiers need to be used with limited resourced devices or without overloading the performance of the devices, as it happens for example in IoT devices, or in industrial systems. For overcoming this issue, NBcoded, a novel light attack classification tool is proposed in this work. NBcoded works in a pipeline combining the removal of noisy data properties of the encoders with the low resources and timing consuming obtained by the Naive Bayes classifier. This work compares three different NBcoded implementations based on three different Naive Bayes likelihood distribution assumptions (Gaussian, Complement and Bernoulli). Then, the best NBcoded is compared with state of the art classifiers like Multilayer Perceptron and Random Forest. Our implementation shows to be the best model reducing the impact of training time and disk usage, even if it is outperformed by the other two in terms of Accuracy and F1-score (similar to 2%).
引用
收藏
页码:55 / 70
页数:16
相关论文
共 43 条
[1]   A taxonomy of cyber-harms: Defining the impacts of cyber-attacks and understanding how they propagate [J].
Agrafiotis, Ioannis ;
Nurse, Jason R. C. ;
Goldsmith, Michael ;
Creese, Sadie ;
Upton, David .
JOURNAL OF CYBERSECURITY, 2018, 4 (01)
[2]   Mitigating the Impacts of Covert Cyber Attacks in Smart Grids Via Reconstruction of Measurement Data Utilizing Deep Denoising Autoencoders [J].
Ahmed, Saeed ;
Lee, YoungDoo ;
Hyun, Seung-Ho ;
Koo, Insoo .
ENERGIES, 2019, 12 (16)
[3]   Deep Learning Approach Combining Sparse Autoencoder With SVM for Network Intrusion Detection [J].
Al-Qatf, Majjed ;
Yu Lasheng ;
Al-Habib, Mohammed ;
Al-Sabahi, Kamal .
IEEE ACCESS, 2018, 6 :52843-52856
[4]   Experimental Evaluation of a Multi-Layer Feed-Forward Artificial Neural Network Classifier for Network Intrusion Detection System [J].
Al-Zewairi, Malek ;
Almajali, Sufyan ;
Awajan, Arafat .
2017 INTERNATIONAL CONFERENCE ON NEW TRENDS IN COMPUTING SCIENCES (ICTCS), 2017, :167-172
[5]  
[Anonymous], 2006, U B C
[6]  
Bayes T., 1763, Phil. Trans. R. Soc. London Ser. I, V1, P370
[7]   Performance evaluation of intrusion detection based on machine learning using Apache Spark [J].
Belouch, Mustapha ;
El Hadaj, Salah ;
Idhammad, Mohamed .
PROCEEDINGS OF THE FIRST INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING IN DATA SCIENCES (ICDS2017), 2018, 127 :1-6
[8]   AUTO-ASSOCIATION BY MULTILAYER PERCEPTRONS AND SINGULAR VALUE DECOMPOSITION [J].
BOURLARD, H ;
KAMP, Y .
BIOLOGICAL CYBERNETICS, 1988, 59 (4-5) :291-294
[9]   The industrial internet of things (IIoT): An analysis framework [J].
Boyes, Hugh ;
Hallaq, Bit ;
Cunningham, Joe ;
Watson, Tim .
COMPUTERS IN INDUSTRY, 2018, 101 :1-12
[10]  
Burnaev E, 2016, INT CONF DAT MIN WOR, P273, DOI [10.1109/ICDMW.2016.157, 10.1109/ICDMW.2016.0046]