4.5 Article

DFAID: Density-aware and feature-deviated active intrusion detection over network traffic streams

Journal

COMPUTERS & SECURITY
Volume 118, Issue -, Pages -

Publisher

ELSEVIER ADVANCED TECHNOLOGY
DOI: 10.1016/j.cose.2022.102719

Keywords

Intrusion detection; Network traffic streams; Active learning; Incremental update; Domain knowledge

Funding

  1. National Key Research and Devel-opment Program of China [2016YFB1000101]
  2. National Natural Science Foundation of China [61379052]
  3. Science Founda-tion of Ministry of Education of China [2018A02002]
  4. Natural Science Foundation for Distinguished Young Scholars of Hunan Province [14JJ1026]

Ask authors/readers for more resources

This paper addresses the problem of active intrusion detection over network traffic streams and proposes the DFAID framework along with its variation DFAID-DK. DFAID effectively detects novel attack classes and concept drift through the design of mask density score and feature deviation score. It also leverages robust incremental clustering structures and domain knowledge to improve detection performance. Experimental results on benchmark datasets demonstrate significant improvement in terms of f1-score for DFAID and DFAID-DK compared to related methods, with a much faster running speed.
We study the problem of active intrusion detection over network traffic streams. Existing works create clusters for known classes and manually label instances outside the clusters for detecting novel attack classes and concept drift, yet several challenges are present. First, these methods assume that different classes of network traffic distribute far from each other in feature space, while similar attack classes could violate this assumption. It makes the true novel classes and concept drift undetectable, therefore a degraded performance. Second, prior works depending on heavily calculating and retraining cannot achieve efficient incremental updates over the infinite and high-speed streams of network traffic. Last, related methods rarely leverage the domain knowledge in intrusion detection. To address these issues, we propose DFAID, a Density-aware and Feature-deviated Active Intrusion Detection framework over network traffic streams. We first design the mask density score and the feature deviation score to maximize the effectiveness of labeled instances, effectively detecting novel attack classes and the concept drift when similar classes exist. Then, DFAID leverages robust incremental clustering structures to group instances in local regions, relieving the burden on the speed and reducing effects of noisy instances. Last, we further present DFAID-DK by incorporating the Domain Knowledge of temporal correlations between network attacks to correct the wrong predictions. Extensive experiments on two well-known benchmarks, CICIDS2017 and ISCX-2012, demonstrate that DFAID and its variation DFAID-DK both achieve significant improvement compared with related methods in terms of f1-score (21.7%, 22.7%) on average, and its running speed is an order of magnitude faster. 71585> 2022 Elsevier Ltd. All rights reserved.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.5
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available