Transfer learning for detecting unknown network attacks

被引:0
|
作者
Juan Zhao
Sachin Shetty
Jan Wei Pan
Charles Kamhoua
Kevin Kwiat
机构
[1] Vanderbilt University Medical Center,Virginia Modeling Analysis and Simulation Center
[2] Old Dominion University,undefined
[3] AutoX Inc,undefined
[4] San Jose,undefined
[5] US Army Research Laboratory’s Network Security Branch,undefined
[6] Haloed Sun TEK,undefined
[7] LLC,undefined
[8] in affiliation with the CAESAR Group,undefined
[9] Sarasota,undefined
来源
EURASIP Journal on Information Security | / 2019卷
关键词
Network attacks detection; Machine learning; Transfer learning;
D O I
暂无
中图分类号
学科分类号
摘要
Network attacks are serious concerns in today’s increasingly interconnected society. Recent studies have applied conventional machine learning to network attack detection by learning the patterns of the network behaviors and training a classification model. These models usually require large labeled datasets; however, the rapid pace and unpredictability of cyber attacks make this labeling impossible in real time. To address these problems, we proposed utilizing transfer learning for detecting new and unseen attacks by transferring the knowledge of the known attacks. In our previous work, we have proposed a transfer learning-enabled framework and approach, called HeTL, which can find the common latent subspace of two different attacks and learn an optimized representation, which was invariant to attack behaviors’ changes. However, HeTL relied on manual pre-settings of hyper-parameters such as relativeness between the source and target attacks. In this paper, we extended this study by proposing a clustering-enhanced transfer learning approach, called CeHTL, which can automatically find the relation between the new attack and known attack. We evaluated these approaches by stimulating scenarios where the testing dataset contains different attack types or subtypes from the training set. We chose several conventional classification models such as decision trees, random forests, KNN, and other novel transfer learning approaches as strong baselines. Results showed that proposed HeTL and CeHTL improved the performance remarkably. CeHTL performed best, demonstrating the effectiveness of transfer learning in detecting new network attacks.
引用
收藏
相关论文
共 50 条
  • [1] Transfer learning for detecting unknown network attacks
    Zhao, Juan
    Shetty, Sachin
    Pan, Jan Wei
    Kamhoua, Charles
    Kwiat, Kevin
    EURASIP JOURNAL ON INFORMATION SECURITY, 2019, 2019 (1)
  • [2] FlowHacker: Detecting Unknown Network Attacks in Big Traffic Data using Network Flows
    Sacramento, Luis
    Medeiros, Iberia
    Bota, Joao
    Correial, Miguel
    2018 17TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (IEEE TRUSTCOM) / 12TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (IEEE BIGDATASE), 2018, : 567 - 572
  • [3] Detecting Network Attacks using Federated Learning for IoT Devices
    Shahid, Osama
    Mothukuri, Viraaji
    Pouriyeh, Seyedamin
    Parizi, Reza M.
    Shahriar, Hossain
    2021 IEEE 29TH INTERNATIONAL CONFERENCE ON NETWORK PROTOCOLS (ICNP 2021), 2021,
  • [4] Machine Learning for Detecting Brute Force Attacks at the Network Level
    Najafabadi, Maryam M.
    Khoshgoftaar, Taghi M.
    Kemp, Clifford
    Seliya, Naeem
    Zuech, Richard
    2014 IEEE INTERNATIONAL CONFERENCE ON BIOINFORMATICS AND BIOENGINEERING (BIBE), 2014, : 379 - 385
  • [5] Detecting Unknown Shilling Attacks in Recommendation Systems
    Singh, Pradeep Kumar
    Pramanik, Pijush Kanti Dutta
    Sinhababu, Nilanjan
    Choudhury, Prasenjit
    WIRELESS PERSONAL COMMUNICATIONS, 2024, 137 (01) : 259 - 286
  • [6] Detecting APT Attacks Based on Network Traffic Using Machine Learning
    Xuan, Cho Do
    JOURNAL OF WEB ENGINEERING, 2021, 20 (01): : 171 - 190
  • [7] A Real Time Deep Learning Based Approach for Detecting Network Attacks
    Callegari, Christian
    Giordano, Stefano
    Pagano, Michele
    BIG DATA RESEARCH, 2024, 36
  • [8] Detecting Unknown Attacks in IoT Environments: An Open Set Classifier for Enhanced Network Intrusion Detection
    Farrukh, Yasir Ali
    Wali, Syed
    Khan, Irfan
    Bastian, Nathaniel D.
    MILCOM 2023 - 2023 IEEE MILITARY COMMUNICATIONS CONFERENCE, 2023,
  • [9] Approach to Detecting Attacks against Machine Learning Systems with a Generative Adversarial Network
    Kotenko, I. V.
    Saenko, I. B.
    Lauta, O. S.
    Vasilev, N. A.
    Sadovnikov, V. E.
    PATTERN RECOGNITION AND IMAGE ANALYSIS, 2024, 34 (03) : 589 - 596
  • [10] A machine learning-based intrusion detection for detecting internet of things network attacks
    Saheed, Yakub Kayode
    Abiodun, Aremu Idris
    Misra, Sanjay
    Holone, Monica Kristiansen
    Colomo-Palacios, Ricardo
    ALEXANDRIA ENGINEERING JOURNAL, 2022, 61 (12) : 9395 - 9409