A Performance-Oriented Comparison of Neural Network Approaches for Anomaly-based Intrusion Detection

被引:0
作者
Iannucci, Stefano [1 ]
Ables, Jesse [1 ]
Anderson, William [1 ]
Abburi, Bhuvanesh [1 ]
Cardellini, Valeria [2 ]
Banicescu, Ioana [1 ]
机构
[1] Mississippi State Univ, Mississippi State, MS 39762 USA
[2] Univ Roma Tor Vergata, Rome, Italy
来源
2021 IEEE SYMPOSIUM SERIES ON COMPUTATIONAL INTELLIGENCE (IEEE SSCI 2021) | 2021年
关键词
Performance Assessment; Anomaly Detection; Intrusion Detection;
D O I
10.1109/SSCI50451.2021.9660100
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Intrusion Detection Systems employ anomaly detection algorithms to detect malicious or unauthorized activities in real time. Anomaly detection algorithms that exploit artificial neural networks (ANN) have recently gained particular interest. These algorithms are usually evaluated and compared through effectiveness measures, which aim to quantify how well anomalies are identified based on detection capabilities. However, to the best of our knowledge, the performance characterization from the perspective of computational cost and space, training time, memory consumption, together with a quantitative analysis of the trade-offs between algorithm effectiveness and performance, have not been explored yet. In this work, we select four recently proposed unsupervised anomaly detection algorithms based on ANN, namely: REPresentations for a random nEarest Neighbor (REPEN), DevNet, OmniAnomaly, Multi-Objective Generative Adversarial Active Learning (MO-GAAL); we perform a variety of experiments to evaluate the trade-offs between the effectiveness and performance of the selected algorithms using two reference dataset: NSL-KDD and CIC-IDS-2017. Our results confirm the importance of this study, showing that none of the selected algorithms dominate the others in terms of both, effectiveness and performance. Furthermore, it shows that approaches based on Recurrent Neural Networks, which exploit the temporal dependency of the samples, have a clear advantage over the others in terms of effectiveness, while exhibiting the worst execution time.
引用
收藏
页数:7
相关论文
共 27 条
[21]   A Deep Learning Approach to Network Intrusion Detection [J].
Shone, Nathan ;
Tran Nguyen Ngoc ;
Vu Dinh Phai ;
Shi, Qi .
IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTATIONAL INTELLIGENCE, 2018, 2 (01) :41-50
[22]   A systematic analysis of performance measures for classification tasks [J].
Sokolova, Marina ;
Lapalme, Guy .
INFORMATION PROCESSING & MANAGEMENT, 2009, 45 (04) :427-437
[23]   Robust Anomaly Detection for Multivariate Time Series through Stochastic Recurrent Neural Network [J].
Su, Ya ;
Zhao, Youjian ;
Niu, Chenhao ;
Liu, Rong ;
Sun, Wei ;
Pei, Dan .
KDD'19: PROCEEDINGS OF THE 25TH ACM SIGKDD INTERNATIONAL CONFERENCCE ON KNOWLEDGE DISCOVERY AND DATA MINING, 2019, :2828-2837
[24]  
Sugiyama M, 2013, ADV NEURAL INFORM PR, P467
[25]  
Tavallaee M., 2009, 2009 IEEE S COMPUTAT, P1
[26]  
Zhang BA, 2018, IEEE INT CONF COMM
[27]   Unsupervised Anomaly Detectors to Detect Intrusions in the Current Threat Landscape [J].
Zoppi, Tommaso ;
Ceccarelli, Andrea ;
Capecchi, Tommaso ;
Bondavalli, Andrea .
ACM/IMS Transactions on Data Science, 2021, 2 (02)