Intrusion Detection Model Updates Through GAN Data Augmentation and Transfer Learning

被引:0
作者
Horchulhack, Pedro [1 ]
Viegas, Eduardo K. [1 ,2 ]
Santin, Altair O. [1 ]
Geremias, Jhonatan [1 ]
机构
[1] Pontificia Univ Catolica Parana PUCPR, Grad Program Comp Sci PPGIa, Curitiba, Parana, Brazil
[2] Technol Innovat Inst TII, Secure Syst Res Ctr, Abu Dhabi, U Arab Emirates
来源
2022 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM 2022) | 2022年
关键词
Network-based Intrusion Detection; Data Augmentation; Machine Learning;
D O I
10.1109/GLOBECOM48099.2022.10000666
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Current machine learning techniques for networkbased intrusion detection cannot handle the evolving behavior of network traffic, requiring periodic model updates to be conducted. Besides requiring huge amounts of labeled network traffic to be provided, traditional model updates demand expressive computational costs. This paper proposes a new feasible model update procedure implemented in two steps. First, we use a Generative Adversarial Network (GAN) to augment the sampled network traffic. Next, we use the augmented dataset to perform model updates through a transfer learning-based approach. Thus, our model can decrease both the number of instances that must be labeled and the computational costs during model updates. Our experiments on a one-year dataset with over 8 TB of data show that literature techniques cannot handle changes in network traffic behavior. In contrast, the proposed model without updates improved true-positive rates by up to 25.6%. With monthly model updates, it requires only 14% of computational costs and 2.3% of instances to be provided.
引用
收藏
页码:2668 / 2673
页数:6
相关论文
共 23 条
[1]  
Abreu Vilmar, 2020, Advanced Information Networking and Applications. Proceedings of the 34th International Conference on Advanced Information Networking and Applications (AINA-2020). Advances in Intelligent Systems and Computing (AISC 1151), P1215, DOI 10.1007/978-3-030-44041-1_104
[2]   GAN augmentation to deal with imbalance in imaging-based intrusion detection [J].
Andresini, Giuseppina ;
Appice, Annalisa ;
De Rose, Luca ;
Malerba, Donato .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2021, 123 (123) :108-127
[3]  
[Anonymous], 2006, NSPW 06
[4]  
[Anonymous], 2022, KASPERSKY REPORTS DD
[5]  
[Anonymous], 2010, P 6 INT C EM NETW EX
[6]   A Review: Collaborative Intrusion Detection for IoT integrating the Blockchain technologies [J].
Benaddi, Hafsa ;
Ibrahimi, Khalil .
2020 8TH INTERNATIONAL CONFERENCE ON WIRELESS NETWORKS AND MOBILE COMMUNICATIONS (WINCOM 2020), 2020, :72-77
[7]  
Bulle BB, 2020, IEEE IND ELEC, P691, DOI [10.1109/iecon43393.2020.9255062, 10.1109/IECON43393.2020.9255062]
[8]  
dos Santos R. R., 2021, 2021 IEEE GLOB COMM
[9]   Online and Scalable Unsupervised Network Anomaly Detection Method [J].
Dromard, Juliette ;
Roudiere, Gilles ;
Owezarski, Philippe .
IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2017, 14 (01) :34-47
[10]   An Adaptive Ensemble Machine Learning Model for Intrusion Detection [J].
Gao, Xianwei ;
Shan, Chun ;
Hu, Changzhen ;
Niu, Zequn ;
Liu, Zhen .
IEEE ACCESS, 2019, 7 :82512-82521