Unknown network attack detection based on open-set recognition and active learning in drone network

被引:19
作者
Zhang, Zhao [1 ]
Zhang, Yong [1 ,2 ]
Niu, Jie [1 ]
Guo, Da [1 ]
机构
[1] Beijing Univ Posts & Telecommun, Sch Elect Engn, Beijing 100876, Peoples R China
[2] Beijing Univ Posts & Telecommun, Beijing Key Lab Work Safety Intelligent Monitorin, Beijing, Peoples R China
基金
中国国家自然科学基金;
关键词
INTRUSION DETECTION; SECURITY; FRAMEWORK; SYSTEMS;
D O I
10.1002/ett.4212
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
With the technical support of 5G, the drone network plays a critical role in the autonomous and digital era. However, due to wireless and autonomy characteristics, the drone network is prone to diverse malicious attacks, so it's vital to deploy network intrusion detection system to detect network attacks. For a real open drone network environment, unknown attacks will occur constantly, but the existing intrusion detection methods are usually designed for a static and closed-set scenario and will fail to recognize the unknown attacks correctly, threatening the security of drone network. Therefore, we design an intrusion detection system to detect unknown network attacks in the drone network. Based on open-set recognition, we propose the Open-CNN model to implement intrusion detection and detect unknown attacks. Further to detect unknown attacks, we also propose an active learning (AL) approach for unknown attacks based on the least confidence query strategy, allowing the intrusion detection model to learn efficiently from the unknown attack instances detected by Open-CNN at small labeling budgets. Extensive experiments demonstrate the effectiveness of Open-CNN in detecting unknown attacks, with the accuracy improvement of 9% to 30% over the compared methods, and the proposed AL approach achieves good performance when retraining with only 1% of labeled unknown attack samples.
引用
收藏
页数:16
相关论文
共 41 条
[1]  
Arthur M.P., 2019, 2019 INT C COMP INF, P1, DOI DOI 10.1109/CITS.2019.8862148
[2]   Towards Open Set Deep Networks [J].
Bendale, Abhijit ;
Boult, Terrance E. .
2016 IEEE CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR), 2016, :1563-1572
[3]  
Choudhary G, 2018, INT WIREL COMMUN, P560, DOI 10.1109/IWCMC.2018.8450305
[4]   Network intrusion detection system for UAV ad-hoc communication: From methodology design to real test validation [J].
Condomines, Jean-Philippe ;
Zhang, Ruohao ;
Larrieu, Nicolas .
AD HOC NETWORKS, 2019, 90
[5]   DeliveryCoin: An IDS and Blockchain-Based Delivery Framework for Drone-Delivered Services [J].
Ferrag, Mohamed Amine ;
Maglaras, Leandros .
COMPUTERS, 2019, 8 (03)
[6]  
Hendrycks Dan, 2017, INT C LEARN REPR ICL, DOI DOI 10.48550/ARXIV.1610.02136
[7]  
Husodo AY, 2019, 2019 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATION, NETWORKS AND SATELLITE (COMNETSAT), P35, DOI [10.1109/comnetsat.2019.8844103, 10.1109/COMNETSAT.2019.8844103]
[8]  
Jacob S, 2020, IEEE CONF COMPUT, P1219, DOI 10.1109/INFOCOMWKSHPS50562.2020.9162676
[9]   Dual-mode power reduction technique for real-time image and video processing board [J].
Jacob, Sunil ;
Menon, Varun G. ;
Joseph, Saira ;
Sehdev, Paramjit .
JOURNAL OF REAL-TIME IMAGE PROCESSING, 2020, 17 (06) :1991-2004
[10]  
Kacem T, 2016, IEEE TRUST BIG, P544, DOI [10.1109/TrustCom.2016.107, 10.1109/TrustCom.2016.0108]