4.5 Article

A New Method for Flow-Based Network Intrusion Detection Using the Inverse Potts Model

Journal

IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT
Volume 18, Issue 2, Pages 1125-1136

Publisher

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/TNSM.2021.3075503

Keywords

Adaptation models; Network intrusion detection; Training; Data models; Real-time systems; Security; Machine learning algorithms; Flow-based network intrusion detection; anomaly-based network intrusion detection; network flow classification; network intrusion detection systems; energy-based flow classifier; inverse Potts model; domain adaptation

Funding

  1. National Science Foundation [OAC-1739025]
  2. Project EAGER: USBRCCR: Collaborative: Securing Networks in the Programmable Data Plane Era - NSF (National Science Foundation)
  3. RNP (Brazilian National Research Network)
  4. GigaCandanga
  5. Fundacao de Amparo a Pesquisa do Estado de Sao Paulo (FAPESP) [2020/05152-7]

Ask authors/readers for more resources

Network Intrusion Detection Systems (NIDS) are crucial tools for identifying potential network threats, with flow-based NIDS using Machine Learning (ML) algorithms being proposed recently. To overcome limitations of classical ML-based classifiers, a new Energy-based Flow Classifier (EFC) is introduced, which effectively uses inverse statistics to infer statistical models and displays adaptability and explainability in binary flow classification.
Network Intrusion Detection Systems (NIDS) play an important role as tools for identifying potential network threats. In the context of ever-increasing traffic volume on computer networks, flow-based NIDS arise as good solutions for real-time traffic classification. In recent years, different flow-based classifiers have been proposed using Machine Learning (ML) algorithms. Nevertheless, classical ML-based classifiers have some limitations. For instance, they require large amounts of labeled data for training, which might be difficult to obtain. Additionally, most ML-based classifiers are not capable of domain adaptation, i.e., after being trained on an specific data distribution, they are not general enough to be applied to other related data distributions. And, finally, many of the models inferred by these algorithms are black boxes, which do not provide explainable results. To overcome these limitations, we propose a new algorithm, called Energy-based Flow Classifier (EFC). This anomaly-based classifier uses inverse statistics to infer a statistical model based on labeled benign examples. We show that EFC is capable of accurately performing binary flow classification and is more adaptable to different data distributions than classical ML-based classifiers. Given the positive results obtained on three different datasets (CIDDS-001, CICIDS17 and CICDDoS19), we consider EFC to be a promising algorithm to perform robust flow-based traffic classification.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.5
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

Article Multidisciplinary Sciences

Trivial and nontrivial error sources account for misidentification of protein partners in mutual information approaches

Camila Pontes, Miguel Andrade, Jose Fiorote, Werner Treptow

Summary: The problem of finding the correct set of partners for a given pair of interacting protein families based on multi-sequence alignments has been a challenge, with a genetic algorithm and machine learning classification algorithm offering solutions with higher true positive rates.

SCIENTIFIC REPORTS (2021)

Article Engineering, Electrical & Electronic

ARTIFICIAL INTELLIGENCE-DRIVEN FOG RADIO ACCESS NETWORKS Integrating Decision Making Considering Different Time Granularities

Jonathan M. DeAlmeida, Luiz A. DaSilva, Cristiano B. Both, Celia G. Ralha, Marcelo A. Marotta

IEEE VEHICULAR TECHNOLOGY MAGAZINE (2021)

Article Biochemistry & Molecular Biology

Assessing the accuracy of contact and distance predictions in CASP14

Victoria Ruiz-Serra, Camila Pontes, Edoardo Milanetti, Andriy Kryshtafovych, Rosalba Lepore, Alfonso Valencia

Summary: The study evaluated the performance of groups in intramolecular residue-residue contact and distance predictions in the 14th round of the CASP experiment. The results showed that predictions by the tFold framework, TripletRes, and DeepPotential were the most accurate in both categories. Additionally, there was no discernible difference in contact prediction performance compared to CASP13, possibly due to the increased difficulty of the CASP14 FM targets.

PROTEINS-STRUCTURE FUNCTION AND BIOINFORMATICS (2021)

Article Computer Science, Information Systems

Abnormal Behavior Detection Based on Traffic Pattern Categorization in Mobile Networks

Jonathan M. DeAlmeida, Camila F. T. Pontes, Luiz A. DaSilva, Cristiano B. Both, Joao J. C. Gondim, Celia G. Ralha, Marcelo A. Marotta

Summary: Abnormal behavior in mobile cellular networks can lead to network faults and cell outages, causing operational cost increase and revenue loss for operators. Monitoring and quantifying abnormal behavior is important for self-healing control, infrastructure updates, and public policy creation. Using a unsupervised learning solution for anomaly detection in mobile networks can improve performance and consider diverse geographic traffic patterns often overlooked in existing literature.

IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT (2021)

Article Computer Science, Information Systems

Optimized Solutions for Deploying a Militarized 4G/LTE Network With Maximum Coverage and Minimum Interference

Emerson de O. Antunes, Marcos F. Caetano, Marcelo A. Marotta, Aleteia Araujo, Lucas Bondan, Rodolfo Meneguette, Geraldo P. Rocha Filho

Summary: This work proposes a solution to the maximal covering location problem for the Mobile Operations Coordination Center (CCOp Mv) in order to improve operational command support for the Brazilian Army. The proposed analytical modeling and optimization solutions, E-ALLOCATOR and M-ALLOCATOR, demonstrate efficiencies in terms of quality and resource savings. E-ALLOCATOR is suitable for low network workload, while M-ALLOCATOR is suitable for high workload scenarios, providing nearly optimal solutions within adequate computational time.

IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT (2022)

Article Computer Science, Information Systems

Applying One-Class Algorithms for Data Stream-Based Insider Threat Detection

Rafael Bruno Peccatiello, Joao Jose Costa Gondim, Luis Paulo Faina Garcia

Summary: An insider threat refers to individuals who have legitimate access to an organization's network and use it to harm the organization. Their actions can be intentional or unintentional, and they are usually motivated by personal discontent, financial issues, or coercion. Traditional security solutions are not effective against insider threats, leading researchers to propose the use of Machine Learning to address this issue. Batch learning and stream learning approaches have been used, with stream approaches being more comprehensive and feasible. This study proposes a framework that combines different data science techniques, such as semi-supervised and supervised machine learning, data stream analysis, and periodic retraining procedures. The ISOF algorithm achieved the best results in terms of recall for both the positive and negative class.

IEEE ACCESS (2023)

Proceedings Paper Computer Science, Information Systems

Botnet detection based on network flow analysis using inverse statistics

Daniele A. G. Lopes, Marcelo A. Marotta, Marcelo Ladeira, Joao J. C. Gondim

Summary: This article explores the mechanism of botnet detection based on network flow behavior and proposes a new technique called EFC which uses inverse statistics to detect anomalies. The experimental results show that EFC is more stable compared to other traditional algorithms.

2022 17TH IBERIAN CONFERENCE ON INFORMATION SYSTEMS AND TECHNOLOGIES (CISTI) (2022)

Proceedings Paper Computer Science, Information Systems

Integrating Zero Trust in the cyber supply chain security

Thiago Melo Stuckert do Amaral, Joao Jose Costa Gondim

Summary: The use of a Zero Trust architecture in a cyber supply chain can enhance security by revising trust in all relationships and assuming the presence of internal threats. This study contributes to the improvement of cyber supply chain security by proposing security controls organization, providing a control checklist, and suggesting ways to visualize the results.

2021 WORKSHOP ON COMMUNICATION NETWORKS AND POWER SYSTEMS (WCNPS) (2021)

Proceedings Paper Computer Science, Information Systems

NERD: a Network Exfiltration Rootkit Detector based on a Multi-agent Artificial Immune System

Mateus B. S. Terra, Joao J. C. Gondim

Summary: With the expansion of the Internet, cyber threats have increased significantly, with Advanced Persistent Threats (APTs) and rootkits being among the main threats. Researchers have proposed the MADEX architecture and NERD, achieving good results in detecting rootkits obfuscating network traffic.

2021 WORKSHOP ON COMMUNICATION NETWORKS AND POWER SYSTEMS (WCNPS) (2021)

Article Biochemistry & Molecular Biology

Unraveling the molecular basis of host cell receptor usage in SARS-CoV-2 and other human pathogenic β-CoVs

Camila Pontes, Victoria Ruiz-Serra, Rosalba Lepore, Alfonso Valencia

Summary: The recent emergence of SARS-CoV-2 has led to a global public health crisis, and analysis of conservation patterns in the beta-CoV spike protein family can provide valuable insights into the specificity of the virus to different host cell receptors.

COMPUTATIONAL AND STRUCTURAL BIOTECHNOLOGY JOURNAL (2021)

No Data Available