DP-ADA: Differentially Private Adversarial Domain Adaptation for Training Deep Learning based Network Intrusion Detection Systems

Ankush Singla, E. Bertino
{"title":"DP-ADA: Differentially Private Adversarial Domain Adaptation for Training Deep Learning based Network Intrusion Detection Systems","authors":"Ankush Singla, E. Bertino","doi":"10.1109/CIC56439.2022.00023","DOIUrl":null,"url":null,"abstract":"Recent work has shown that deep learning (DL) techniques are highly effective for assisting network intrusion detection systems (NIDS) in identifying attacks on networks. Training DL classification models, however, requires vast amounts of labeled data which is often expensive and time-consuming to collect. Also, DL models trained using data from one type of network may not be able to identify attacks on other types of network or identify new families of attacks discovered over time. In this paper, we introduce a differentially private adversarial DA (DP-ADA) workflow which allows organizations to share their labeled data with other organizations in a privacy preserving way. This workflow allows for more collaboration and sharing, so that more effective DL based NIDS models can be created for deployment on different types of networks and can detect newer attack families with very little effort. Our solution provides a much better performance than fine-tuning based transfer learning mechanism and almost matches the performance of adversarial DA when the actual source dataset is used, while at the same time reducing the size of data shared between the two parties. Our solution also provides privacy protection for heterogeneous DA, where source and target datasets have different feature dimensions.","PeriodicalId":170721,"journal":{"name":"2022 IEEE 8th International Conference on Collaboration and Internet Computing (CIC)","volume":"102 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 IEEE 8th International Conference on Collaboration and Internet Computing (CIC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CIC56439.2022.00023","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Recent work has shown that deep learning (DL) techniques are highly effective for assisting network intrusion detection systems (NIDS) in identifying attacks on networks. Training DL classification models, however, requires vast amounts of labeled data which is often expensive and time-consuming to collect. Also, DL models trained using data from one type of network may not be able to identify attacks on other types of network or identify new families of attacks discovered over time. In this paper, we introduce a differentially private adversarial DA (DP-ADA) workflow which allows organizations to share their labeled data with other organizations in a privacy preserving way. This workflow allows for more collaboration and sharing, so that more effective DL based NIDS models can be created for deployment on different types of networks and can detect newer attack families with very little effort. Our solution provides a much better performance than fine-tuning based transfer learning mechanism and almost matches the performance of adversarial DA when the actual source dataset is used, while at the same time reducing the size of data shared between the two parties. Our solution also provides privacy protection for heterogeneous DA, where source and target datasets have different feature dimensions.
DP-ADA:训练基于深度学习的网络入侵检测系统的差分私有对抗域自适应
最近的研究表明,深度学习(DL)技术在协助网络入侵检测系统(NIDS)识别网络攻击方面非常有效。然而,训练DL分类模型需要大量的标记数据,而这些数据的收集通常既昂贵又耗时。此外,使用来自一种网络类型的数据训练的深度学习模型可能无法识别对其他类型网络的攻击,也无法识别随着时间的推移发现的新攻击家族。在本文中,我们引入了一种差分私有对抗性数据处理(DP-ADA)工作流,该工作流允许组织以隐私保护的方式与其他组织共享其标记数据。该工作流允许更多的协作和共享,因此可以创建更有效的基于DL的NIDS模型,用于部署在不同类型的网络上,并且可以轻松地检测到新的攻击家族。我们的解决方案提供了比基于微调的迁移学习机制更好的性能,并且在使用实际源数据集时几乎匹配对抗性数据处理的性能,同时减少了双方共享的数据大小。我们的解决方案还为异构数据处理提供隐私保护,其中源数据集和目标数据集具有不同的特征维度。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信