Training Autoencoders with Noisy Training Sets for Detecting Low-rate Attacks on the Network

B. Pratomo, Ahmad Ibnu Fajar, Abdul Munif, R. Ijtihadie, H. Studiawan, B. J. Santoso
{"title":"Training Autoencoders with Noisy Training Sets for Detecting Low-rate Attacks on the Network","authors":"B. Pratomo, Ahmad Ibnu Fajar, Abdul Munif, R. Ijtihadie, H. Studiawan, B. J. Santoso","doi":"10.1109/CyberneticsCom55287.2022.9865559","DOIUrl":null,"url":null,"abstract":"A Network-based Intrusion Detection System (NIDS) monitors network traffic and analyses it to look for any sign of malicious behaviour. A NIDS may be using of these two methods to look for malicious activities, signature-based or anomaly-based. A Signature-based NIDS relies on a database of rulesets to determine whether a packet or a flow is malicious. Therefore, it suffers when the database is not updated regularly or when a zero-day attack appears. An Anomaly-based NIDS works by learning the behaviour of normal traffic and looking for anomalous activities. The anomalous activities are then deemed malicious. In doing so, this kind of NIDS does not have to rely on an updated database. It can identify deviation from the normal behaviour by training itself with some training data obtained from the organisation network traffic. The issue is cleaning the network traffic data from a real-world capture is time-consuming. Thus, in this paper, we proposed an anomaly detection method that was trained with network traffic that contains malicious activities. We were looking for evidence of whether using Autoencoders is robust to noisy data in the training set. Our experiments show that the detection method can achieve an F2-score of 0.87 for FTP traffic, 0.83 for HTTP traffic, and 0.98 for SMTP traffic. These results were obtained from models that had been trained with a training set which contains 0.3% of malicious traffic.","PeriodicalId":178279,"journal":{"name":"2022 IEEE International Conference on Cybernetics and Computational Intelligence (CyberneticsCom)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 IEEE International Conference on Cybernetics and Computational Intelligence (CyberneticsCom)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CyberneticsCom55287.2022.9865559","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

A Network-based Intrusion Detection System (NIDS) monitors network traffic and analyses it to look for any sign of malicious behaviour. A NIDS may be using of these two methods to look for malicious activities, signature-based or anomaly-based. A Signature-based NIDS relies on a database of rulesets to determine whether a packet or a flow is malicious. Therefore, it suffers when the database is not updated regularly or when a zero-day attack appears. An Anomaly-based NIDS works by learning the behaviour of normal traffic and looking for anomalous activities. The anomalous activities are then deemed malicious. In doing so, this kind of NIDS does not have to rely on an updated database. It can identify deviation from the normal behaviour by training itself with some training data obtained from the organisation network traffic. The issue is cleaning the network traffic data from a real-world capture is time-consuming. Thus, in this paper, we proposed an anomaly detection method that was trained with network traffic that contains malicious activities. We were looking for evidence of whether using Autoencoders is robust to noisy data in the training set. Our experiments show that the detection method can achieve an F2-score of 0.87 for FTP traffic, 0.83 for HTTP traffic, and 0.98 for SMTP traffic. These results were obtained from models that had been trained with a training set which contains 0.3% of malicious traffic.
基于噪声训练集的自编码器网络低速率攻击检测
基于网络的入侵检测系统(NIDS)监控网络流量并对其进行分析,以寻找任何恶意行为的迹象。NIDS可能使用这两种方法来查找基于签名或基于异常的恶意活动。基于签名的入侵防御依赖于规则集数据库来确定数据包或流是否是恶意的。因此,当数据库不定期更新或出现零日攻击时,它就会受到影响。基于异常的NIDS通过学习正常流量的行为并寻找异常活动来工作。然后将异常活动视为恶意活动。这样,这种NIDS就不必依赖于更新的数据库。它可以通过从组织网络流量中获得一些训练数据来训练自己,从而识别出与正常行为的偏差。问题是,从实际捕获中清除网络流量数据非常耗时。因此,在本文中,我们提出了一种使用包含恶意活动的网络流量进行训练的异常检测方法。我们正在寻找使用自动编码器是否对训练集中的噪声数据具有鲁棒性的证据。实验表明,该检测方法对FTP流量、HTTP流量和SMTP流量的F2-score分别为0.87、0.83和0.98。这些结果是从使用包含0.3%恶意流量的训练集训练的模型中获得的。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信