{"title":"Individual Packet Features are a Risk to Model Generalization in ML-Based Intrusion Detection","authors":"Kahraman Kostas;Mike Just;Michael A. Lones","doi":"10.1109/LNET.2025.3525901","DOIUrl":null,"url":null,"abstract":"Machine learning is increasingly employed for intrusion detection in IoT networks. This letter provides the first empirical evidence of the risks associated with modeling network traffic using individual packet features (IPF). Through a comprehensive literature review and novel experimental case studies, we identify critical limitations of IPF, such as information leakage and low data complexity. We offer the first in-depth critique of IPF-based detection systems, highlighting their risks for real-world deployment. Our results demonstrate that IPF-based models can achieve deceptively high detection rates (up to 100% in some cases), but these rates fail to generalize to new datasets, with performance dropping by more than 90% in cross-session tests. These findings underscore the importance of considering packet interactions and contextual information, rather than relying solely on IPF, for developing robust and reliable intrusion detection systems in IoT environments.","PeriodicalId":100628,"journal":{"name":"IEEE Networking Letters","volume":"7 1","pages":"66-70"},"PeriodicalIF":0.0000,"publicationDate":"2025-01-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Networking Letters","FirstCategoryId":"1085","ListUrlMain":"https://ieeexplore.ieee.org/document/10824899/","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Machine learning is increasingly employed for intrusion detection in IoT networks. This letter provides the first empirical evidence of the risks associated with modeling network traffic using individual packet features (IPF). Through a comprehensive literature review and novel experimental case studies, we identify critical limitations of IPF, such as information leakage and low data complexity. We offer the first in-depth critique of IPF-based detection systems, highlighting their risks for real-world deployment. Our results demonstrate that IPF-based models can achieve deceptively high detection rates (up to 100% in some cases), but these rates fail to generalize to new datasets, with performance dropping by more than 90% in cross-session tests. These findings underscore the importance of considering packet interactions and contextual information, rather than relying solely on IPF, for developing robust and reliable intrusion detection systems in IoT environments.