Autoencoder-based IDS for cloud and mobile devices

被引:10
作者
Faber, Kamil [1 ]
Faber, Lukasz [1 ]
Sniezynski, Bartlomiej [1 ]
机构
[1] AGH Univ Sci & Technol, Inst Comp Sci, Krakow, Poland
来源
21ST IEEE/ACM INTERNATIONAL SYMPOSIUM ON CLUSTER, CLOUD AND INTERNET COMPUTING (CCGRID 2021) | 2021年
关键词
intrusion detection system; autoencoder; machine learning; security; mobile cloud computing; INTRUSION-DETECTION; NETWORK;
D O I
10.1109/CCGrid51090.2021.00088
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Along with the popularization of cloud computing and the increase in responsibilities of mobile devices, there is a need for intrusion detection systems available for working in these two new areas. At the same time, the increase in computational power of mobile devices gives us the possibility to use them to do a part of data preprocessing. Similarly, more complex operations can be executed in the cloud - this concept is known as mobile cloud computing. In this paper, we propose an autoencoder-based intrusion detection system applicable to cloud and mobile environments. The system provides multiple data gathering points, allowing to monitor either fully controlled networks, like virtual networks in the cloud, or mobile devices scattered in different networks. The monitoring process uses both mobile devices and cloud computational power. Gathered network traffic records are sent to a proper intrusion detection node, which executes the detection process. In case of suspicious behavior, an alert of a possible intrusion can be sent to the device owner. The detection process is based on an autoencoder neural network, which brings significant advantages: an anomaly-based approach, training only on benign samples, and a good performance. To improve detection results, we created time-window-based features, and there is also a possibility to share computed statistics between intrusion detection nodes. In the experiments, we construct three models using pure network flows data and time-window-based features. The results show that the autoencoder-based approach can detect with a high performance attacks not known during the training process. We also prove that created derived features have a significant impact on detection results.
引用
收藏
页码:728 / 736
页数:9
相关论文
共 32 条
[1]   Deep and Machine Learning Approaches for Anomaly-Based Intrusion Detection of Imbalanced Network Traffic [J].
Abdulhammed, Razan ;
Faezipour, Miad ;
Abuzneid, Abdelshakour ;
AbuMallouh, Arafat .
IEEE SENSORS LETTERS, 2019, 3 (01)
[2]  
Aksu D, 2018, 2018 INTERNATIONAL CONGRESS ON BIG DATA, DEEP LEARNING AND FIGHTING CYBER TERRORISM (IBIGDELFT), P77, DOI 10.1109/IBIGDELFT.2018.8625370
[3]  
Aygun R. Can, 2017, 2017 IEEE 4th International Conference on Cyber-Security and Cloud Computing (CSCloud), P193, DOI 10.1109/CSCloud.2017.39
[4]  
Canadian Institute for Cybersecurity, 2021, CICFLOWMETER NETW TR
[5]  
Chiba Z., 2019, P 2 INT C NETW INF, DOI DOI 10.1145/3320326.3320394
[6]   Towards a taxonomy of intrusion-detection systems [J].
Debar, H ;
Dacier, M ;
Wespi, A .
COMPUTER NETWORKS-THE INTERNATIONAL JOURNAL OF COMPUTER AND TELECOMMUNICATIONS NETWORKING, 1999, 31 (08) :805-822
[7]   A machine learning based intrusion detection scheme for data fusion in mobile clouds involving heterogeneous client networks [J].
Dey, Saurabh ;
Ye, Qiang ;
Sampalli, Srinivas .
INFORMATION FUSION, 2019, 49 :205-215
[8]  
Farahnakian F, 2018, INT CONF ADV COMMUN, P178, DOI 10.23919/ICACT.2018.8323688
[9]   An introduction to ROC analysis [J].
Fawcett, Tom .
PATTERN RECOGNITION LETTERS, 2006, 27 (08) :861-874
[10]   Deep learning for cyber security intrusion detection: Approaches, datasets, and comparative study [J].
Ferrag, Mohamed Amine ;
Maglaras, Leandros ;
Moschoyiannis, Sotiris ;
Janicke, Helge .
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2020, 50