Real Time Attack Detection with Deep Learning

被引:9
作者
Callegari, Christian [1 ,2 ]
Bucchianeri, Elena [2 ]
Giordano, Stefano [2 ]
Pagano, Michele [2 ]
机构
[1] RaSS Natl Lab CNIT, Pisa, Italy
[2] Univ Pisa, Dept Informat Engn, Pisa, Italy
来源
2019 16TH ANNUAL IEEE INTERNATIONAL CONFERENCE ON SENSING, COMMUNICATION, AND NETWORKING (SECON) | 2019年
关键词
D O I
10.1109/sahcn.2019.8824811
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The Internet of Things (IoT) significantly extends the attack surface of the Internet, making the use of an Anomaly-based Intrusion Detection System of paramount importance. Despite in the last years big research efforts have focused on the application of Deep Learning techniques to attack detection, an ultimate real-time solution, able to provide a high detection rate with an acceptable false alarm rate while processing raw network traffic in real time, has still to be identified. For this reason, in this paper we propose an Intrusion Detection System that, leveraging on probabilistic data structures and Deep Learning, is able to process in real time the traffic collected in a backbone network, offering almost optimal detection performance and low false alarm rate. Indeed, the extensive experimental tests, run to validate and evaluate our system, confirm that, with a proper parameter setting, we can achieve about 90% of detection rate, with an accuracy of 0.871.
引用
收藏
页数:5
相关论文
共 9 条
[1]   Improving stability of PCA-based network anomaly detection by means of kernel-PCA [J].
Callegari, Christian ;
Donatini, Lisa ;
Giordano, Stefano ;
Pagano, Michele .
INTERNATIONAL JOURNAL OF COMPUTATIONAL SCIENCE AND ENGINEERING, 2018, 16 (01) :9-16
[2]  
Cannady J., 1998, NA TIONAL INFORM SYS, V26
[3]  
Kumari VV, 2017, 2017 INTERNATIONAL CONFERENCE ON I-SMAC (IOT IN SOCIAL, MOBILE, ANALYTICS AND CLOUD) (I-SMAC), P481, DOI 10.1109/I-SMAC.2017.8058397
[4]   An Empirical Study on Network Anomaly Detection using Convolutional Neural Networks [J].
Kwon, Donghwoon ;
Natarajan, Kathiravan ;
Suh, Sang C. ;
Kim, Hyunjoo ;
Kim, Jinoh .
2018 IEEE 38TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS (ICDCS), 2018, :1595-1598
[5]  
Li Z., 2017, ICONIP
[6]   Spectral Clustering Technique for Classifying Network Attacks [J].
Little, Anna ;
Mountrouidou, Xenia ;
Moseley, Daniel .
2016 IEEE 2ND INTERNATIONAL CONFERENCE ON BIG DATA SECURITY ON CLOUD (BIGDATASECURITY), IEEE INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE AND SMART COMPUTING (HPSC), AND IEEE INTERNATIONAL CONFERENCE ON INTELLIGENT DATA AND SECURITY (IDS), 2016, :406-411
[7]  
Moradi M., 2004, IEEE INT C ADV INTEL
[8]  
Vinayakumar R, 2017, 2017 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), P2353, DOI 10.1109/ICACCI.2017.8126198
[9]   A Deep Learning Approach for Intrusion Detection Using Recurrent Neural Networks [J].
Yin, Chuanlong ;
Zhu, Yuefei ;
Fei, Jinlong ;
He, Xinzheng .
IEEE ACCESS, 2017, 5 :21954-21961