B. Pratomo, Ahmad Ibnu Fajar, Abdul Munif, R. Ijtihadie, H. Studiawan, B. J. Santoso
{"title":"Training Autoencoders with Noisy Training Sets for Detecting Low-rate Attacks on the Network","authors":"B. Pratomo, Ahmad Ibnu Fajar, Abdul Munif, R. Ijtihadie, H. Studiawan, B. J. Santoso","doi":"10.1109/CyberneticsCom55287.2022.9865559","DOIUrl":null,"url":null,"abstract":"A Network-based Intrusion Detection System (NIDS) monitors network traffic and analyses it to look for any sign of malicious behaviour. A NIDS may be using of these two methods to look for malicious activities, signature-based or anomaly-based. A Signature-based NIDS relies on a database of rulesets to determine whether a packet or a flow is malicious. Therefore, it suffers when the database is not updated regularly or when a zero-day attack appears. An Anomaly-based NIDS works by learning the behaviour of normal traffic and looking for anomalous activities. The anomalous activities are then deemed malicious. In doing so, this kind of NIDS does not have to rely on an updated database. It can identify deviation from the normal behaviour by training itself with some training data obtained from the organisation network traffic. The issue is cleaning the network traffic data from a real-world capture is time-consuming. Thus, in this paper, we proposed an anomaly detection method that was trained with network traffic that contains malicious activities. We were looking for evidence of whether using Autoencoders is robust to noisy data in the training set. Our experiments show that the detection method can achieve an F2-score of 0.87 for FTP traffic, 0.83 for HTTP traffic, and 0.98 for SMTP traffic. These results were obtained from models that had been trained with a training set which contains 0.3% of malicious traffic.","PeriodicalId":178279,"journal":{"name":"2022 IEEE International Conference on Cybernetics and Computational Intelligence (CyberneticsCom)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 IEEE International Conference on Cybernetics and Computational Intelligence (CyberneticsCom)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CyberneticsCom55287.2022.9865559","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
A Network-based Intrusion Detection System (NIDS) monitors network traffic and analyses it to look for any sign of malicious behaviour. A NIDS may be using of these two methods to look for malicious activities, signature-based or anomaly-based. A Signature-based NIDS relies on a database of rulesets to determine whether a packet or a flow is malicious. Therefore, it suffers when the database is not updated regularly or when a zero-day attack appears. An Anomaly-based NIDS works by learning the behaviour of normal traffic and looking for anomalous activities. The anomalous activities are then deemed malicious. In doing so, this kind of NIDS does not have to rely on an updated database. It can identify deviation from the normal behaviour by training itself with some training data obtained from the organisation network traffic. The issue is cleaning the network traffic data from a real-world capture is time-consuming. Thus, in this paper, we proposed an anomaly detection method that was trained with network traffic that contains malicious activities. We were looking for evidence of whether using Autoencoders is robust to noisy data in the training set. Our experiments show that the detection method can achieve an F2-score of 0.87 for FTP traffic, 0.83 for HTTP traffic, and 0.98 for SMTP traffic. These results were obtained from models that had been trained with a training set which contains 0.3% of malicious traffic.