{"title":"Leveraging Inter-Arrival Time for Efficient Threat Filtering: A Parsimonious Approach","authors":"Onur Sahin , Suleyman Uludag","doi":"10.1016/j.cose.2025.104471","DOIUrl":null,"url":null,"abstract":"<div><div>In this study, we propose a streamlined approach to intrusion detection by leveraging the Interpacket Arrival Time (IAT) as a primary metric for identifying malicious network traffic. Our objective is to enhance the efficiency of intrusion detection systems by implementing a preliminary filtering layer that rapidly identifies easily detectable attacks, thereby reducing the computational load on more sophisticated, resource-intensive models. Using datasets such as CICIoT2023, CIC-IDS-2017, and UNSW-NB15, we conducted extensive experiments to validate the effectiveness of our approach. The study employed techniques like SMOTE to address dataset imbalances and Min-Max scaling to normalize the IAT feature, ensuring optimal performance of machine learning models. We evaluated models such as Random Forest, K-Nearest Neighbors, and Multilayer Perceptron, with a particular emphasis on their ability to generalize across various datasets. Our findings demonstrate that by focusing on a single, well-chosen feature like IAT, it is possible to achieve high detection accuracy while significantly reducing training and prediction times. This method not only improves the overall efficiency of intrusion detection systems but also suggests a practical solution for real- time applications where resource constraints are a critical concern.</div></div>","PeriodicalId":51004,"journal":{"name":"Computers & Security","volume":"154 ","pages":"Article 104471"},"PeriodicalIF":4.8000,"publicationDate":"2025-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Computers & Security","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S0167404825001609","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0
Abstract
In this study, we propose a streamlined approach to intrusion detection by leveraging the Interpacket Arrival Time (IAT) as a primary metric for identifying malicious network traffic. Our objective is to enhance the efficiency of intrusion detection systems by implementing a preliminary filtering layer that rapidly identifies easily detectable attacks, thereby reducing the computational load on more sophisticated, resource-intensive models. Using datasets such as CICIoT2023, CIC-IDS-2017, and UNSW-NB15, we conducted extensive experiments to validate the effectiveness of our approach. The study employed techniques like SMOTE to address dataset imbalances and Min-Max scaling to normalize the IAT feature, ensuring optimal performance of machine learning models. We evaluated models such as Random Forest, K-Nearest Neighbors, and Multilayer Perceptron, with a particular emphasis on their ability to generalize across various datasets. Our findings demonstrate that by focusing on a single, well-chosen feature like IAT, it is possible to achieve high detection accuracy while significantly reducing training and prediction times. This method not only improves the overall efficiency of intrusion detection systems but also suggests a practical solution for real- time applications where resource constraints are a critical concern.
期刊介绍:
Computers & Security is the most respected technical journal in the IT security field. With its high-profile editorial board and informative regular features and columns, the journal is essential reading for IT security professionals around the world.
Computers & Security provides you with a unique blend of leading edge research and sound practical management advice. It is aimed at the professional involved with computer security, audit, control and data integrity in all sectors - industry, commerce and academia. Recognized worldwide as THE primary source of reference for applied research and technical expertise it is your first step to fully secure systems.