On the Evaluation of Sequential Machine Learning for Network Intrusion Detection

被引:12
作者
Corsini, Andrea [1 ]
Yang, Shanchieh Jay [2 ]
Apruzzese, Giovanni [3 ]
机构
[1] Univ Modena & Reggio Emilia, Modena, Italy
[2] Rochester Inst Technol, Rochester, NY 14623 USA
[3] Univ Liechtenstein, Vaduz, Liechtenstein
来源
ARES 2021: 16TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY | 2021年
关键词
Long Short Term Memory; Machine Learning; Network Intrusion Detection; Cybersecurity; Network Flows; Deep Learning; BOTNET;
D O I
10.1145/3465481.3470065
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recent advances in deep learning renewed the research interests in machine learning for Network Intrusion Detection Systems (NIDS). Specifically, attention has been given to sequential learning models, due to their ability to extract the temporal characteristics of network traffic flows (NetFlows), and use them for NIDS tasks. However, the applications of these sequential models often consist of transferring and adapting methodologies directly from other fields, without an in-depth investigation on how to leverage the specific circumstances of cybersecurity scenarios; moreover, there is a lack of comprehensive studies on sequential models that rely on NetFlow data, which presents significant advantages over traditional full packet captures. We tackle this problem in this paper. We propose a detailed methodology to extract temporal sequences of NetFlows that denote patterns of malicious activities. Then, we apply this methodology to compare the efficacy of sequential learning models against traditional static learning models. In particular, we perform a fair comparison of a 'sequential' Long Short-Term Memory (LSTM) against a 'static' Feedforward Neural Networks (FNN) in distinct environments represented by two well-known datasets for NIDS: the CICIDS2017 and the CTU13. Our results highlight that LSTM achieves comparable performance to FNN in the CICIDS2017 with over 99.5% F1-score; while obtaining superior performance in the CTU13, with 95.7% F1-score against 91.5%. This paper thus paves the way to future applications of sequential learning models for NIDS.
引用
收藏
页数:10
相关论文
共 36 条
[1]  
Alaeddine B., 2020, Int. J. Electr. Comput. Eng. (IJECE), V10, ppp3315, DOI [10.11591/ijece.v10i3, DOI 10.11591/IJECE.V10I3.PP3315-3322]
[2]   Deep Reinforcement Adversarial Learning Against Botnet Evasion Attacks [J].
Apruzzese, Giovanni ;
Andreolini, Mauro ;
Marchetti, Mirco ;
Venturi, Andrea ;
Colajanni, Michele .
IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2020, 17 (04) :1975-1987
[3]   A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection [J].
Buczak, Anna L. ;
Guven, Erhan .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2016, 18 (02) :1153-1176
[4]   Combating imbalance in network intrusion datasets [J].
Cieslak, David A. ;
Chawla, Nitesh V. ;
Striegel, Aaron .
2006 IEEE INTERNATIONAL CONFERENCE ON GRANULAR COMPUTING, 2006, :732-+
[5]  
Cisco, 2021, IOS NETFLOW
[6]  
Dey R, 2017, MIDWEST SYMP CIRCUIT, P1597, DOI 10.1109/MWSCAS.2017.8053243
[7]   Bidirectional Grid Long Short-Term Memory (BiGridLSTM): A Method to Address Context-Sensitivity and Vanishing Gradient [J].
Fei, Hongxiao ;
Tan, Fengyun .
ALGORITHMS, 2018, 11 (11)
[8]   An empirical comparison of botnet detection methods [J].
Garcia, S. ;
Grill, M. ;
Stiborek, J. ;
Zunino, A. .
COMPUTERS & SECURITY, 2014, 45 :100-123
[9]  
Gwon H., 2019, ARXIV PREPRINT ARXIV
[10]   STIDM: A Spatial and Temporal Aware Intrusion Detection Model [J].
Han, Xueying ;
Yin, Rongchao ;
Lu, Zhigang ;
Jiang, Bo ;
Liu, Yuling ;
Liu, Song ;
Wang, Chonghua ;
Li, Ning .
2020 IEEE 19TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2020), 2020, :370-377