Collaborative Feature Maps of Networks and Hosts for AI-driven Intrusion Detection

被引:6
作者
Liu, Jinxin [1 ]
Simsek, Murat [1 ]
Kantarci, Burak [1 ]
Bagheri, Mehran [2 ]
Djukic, Petar [2 ]
机构
[1] Univ Ottawa, Sch Elect Engn & Comp Sci, Ottawa, ON, Canada
[2] Ciena Corp, AI & Analyt, Ottawa, ON, Canada
来源
2022 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM 2022) | 2022年
关键词
Cybersecurity; Machine Learning; Deep Learning; Intrusion Detection System; Network-based Intrusion Detection System; Host-based Intrusion Detection System;
D O I
10.1109/GLOBECOM48099.2022.10000985
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Intrusion Detection Systems (IDS) are critical security mechanisms that protect against a wide variety of network threats and malicious behaviors on networks or hosts. As both Network-based IDS (NIDS) or Host-based IDS (HIDS) have been widely investigated, this paper aims to present a Combined Intrusion Detection System (CIDS) that integrates network and host data in order to improve IDS performance. Due to the scarcity of datasets that include both network packet and host data, we present a novel CIDS dataset formation framework that can handle log files from a variety of operating systems and align log entities with network flows. A new CIDS dataset named SCVIC-CIDS-2021 is derived from the meta-data from the well-known benchmark dataset, CIC-IDS-2018 by utilizing the proposed framework. Furthermore, a transformer-based deep learning model named CIDS-Net is proposed that can take network flow and host features as inputs and outperform baseline models that rely on network flow features only. Experimental results to evaluate the proposed CIDS-Net under the SCVICCIDS-2021 dataset support the hypothesis for the benefits of combining host and flow features as the proposed CIDS-Net can improve the macro F1 score of baseline solutions by 6.36% (up to 99.89%).
引用
收藏
页码:2662 / 2667
页数:6
相关论文
共 20 条
[1]  
[Anonymous], IDS 2018 DATASETS RE
[2]  
[Anonymous], KDD CUP 1999 DAT
[3]  
Atefinia R., 2021, J SUPER COMPUTING, V77
[4]  
Basnet R., 2019, DETECTING CLASSIFYIN
[5]   Exploratory Data Analysis of a Unified Host and Network Dataset [J].
Beazley, Catherine ;
Gadiya, Karan ;
Ravi, Rakesh K. U. ;
Roden, David ;
Ye, Boda ;
Abraham, Brendan ;
Brown, Donald E. ;
Veeraraghavan, Malathi .
2019 SYSTEMS AND INFORMATION ENGINEERING DESIGN SYMPOSIUM (SIEDS), 2019, :136-140
[6]   DeepLog: Anomaly Detection and Diagnosis from System Logs through Deep Learning [J].
Du, Min ;
Li, Feifei ;
Zheng, Guineng ;
Srikumar, Vivek .
CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2017, :1285-1298
[7]  
Fitni Qusyairi Ridho Saeful, 2020, 2020 IEEE International Conference on Industry 4.0, Artificial Intelligence, and Communications Technology (IAICT). Proceedings, P118, DOI 10.1109/IAICT50021.2020.9172014
[8]  
James G., 1997, Tech. Rep
[9]   A Survey on Anomaly Based Host Intrusion Detection System [J].
Jose, Shijoe ;
Malathi, D. ;
Reddy, Bharath ;
Jayaseeli, Dorathi .
PROCEEDINGS OF THE 10TH NATIONAL CONFERENCE ON MATHEMATICAL TECHNIQUES AND ITS APPLICATIONS (NCMTA 18), 2018, 1000
[10]  
Kent A. D., 2015, Dynamic Networks in Cybersecurity