A Performance-Oriented Comparison of Neural Network Approaches for Anomaly-based Intrusion Detection

被引:0
作者
Iannucci, Stefano [1 ]
Ables, Jesse [1 ]
Anderson, William [1 ]
Abburi, Bhuvanesh [1 ]
Cardellini, Valeria [2 ]
Banicescu, Ioana [1 ]
机构
[1] Mississippi State Univ, Mississippi State, MS 39762 USA
[2] Univ Roma Tor Vergata, Rome, Italy
来源
2021 IEEE SYMPOSIUM SERIES ON COMPUTATIONAL INTELLIGENCE (IEEE SSCI 2021) | 2021年
关键词
Performance Assessment; Anomaly Detection; Intrusion Detection;
D O I
10.1109/SSCI50451.2021.9660100
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Intrusion Detection Systems employ anomaly detection algorithms to detect malicious or unauthorized activities in real time. Anomaly detection algorithms that exploit artificial neural networks (ANN) have recently gained particular interest. These algorithms are usually evaluated and compared through effectiveness measures, which aim to quantify how well anomalies are identified based on detection capabilities. However, to the best of our knowledge, the performance characterization from the perspective of computational cost and space, training time, memory consumption, together with a quantitative analysis of the trade-offs between algorithm effectiveness and performance, have not been explored yet. In this work, we select four recently proposed unsupervised anomaly detection algorithms based on ANN, namely: REPresentations for a random nEarest Neighbor (REPEN), DevNet, OmniAnomaly, Multi-Objective Generative Adversarial Active Learning (MO-GAAL); we perform a variety of experiments to evaluate the trade-offs between the effectiveness and performance of the selected algorithms using two reference dataset: NSL-KDD and CIC-IDS-2017. Our results confirm the importance of this study, showing that none of the selected algorithms dominate the others in terms of both, effectiveness and performance. Furthermore, it shows that approaches based on Recurrent Neural Networks, which exploit the temporal dependency of the samples, have a clear advantage over the others in terms of effectiveness, while exhibiting the worst execution time.
引用
收藏
页数:7
相关论文
共 27 条
[1]   Deep learning approaches for anomaly-based intrusion detection systems: A survey, taxonomy, and open issues [J].
Aldweesh, Arwa ;
Derhab, Abdelouahid ;
Emam, Ahmed Z. .
KNOWLEDGE-BASED SYSTEMS, 2020, 189
[2]  
[Anonymous], DARPA 98 DARPA 99 DA
[3]  
[Anonymous], Food Additives Contaminants
[4]  
[Anonymous], KDDCUP 99 DATASET
[5]  
[Anonymous], Sklearn time series split
[6]  
Duplyakin D, 2019, PROCEEDINGS OF THE 2019 USENIX ANNUAL TECHNICAL CONFERENCE, P1
[7]   A Comparative Evaluation of Unsupervised Anomaly Detection Algorithms for Multivariate Data [J].
Goldstein, Markus ;
Uchida, Seiichi .
PLOS ONE, 2016, 11 (04)
[8]   A Taxonomy of Network Threats and the Effect of Current Datasets on Intrusion Detection Systems [J].
Hindy, Hanan ;
Brosset, David ;
Bayne, Ethan ;
Seeam, Amar ;
Tachtatzis, Christos ;
Atkinson, Robert ;
Bellekens, Xavier .
IEEE ACCESS, 2020, 8 :104650-104675
[9]   A Comparison of Graph-Based Synthetic Data Generators for Benchmarking Next-Generation Intrusion Detection Systems [J].
Iannucci, Stefano ;
Kholidy, Hisham A. ;
Ghimire, Amrita Dhakal ;
Jia, Rui ;
Abdelwahed, Sherif ;
Banicescu, Ioana .
2017 IEEE INTERNATIONAL CONFERENCE ON CLUSTER COMPUTING (CLUSTER), 2017, :278-289
[10]  
Kingma D. P., 2014, PROC 2014 INT C LEAR