A Comparative Study of AI-based Intrusion Detection Techniques in
Critical Infrastructures
- URL: http://arxiv.org/abs/2008.00088v1
- Date: Fri, 24 Jul 2020 20:55:57 GMT
- Title: A Comparative Study of AI-based Intrusion Detection Techniques in
Critical Infrastructures
- Authors: Safa Otoum and Burak Kantarci and Hussein Mouftah
- Abstract summary: We present a comparative study of Artificial Intelligence (AI)-driven intrusion detection systems for wirelessly connected sensors that track crucial applications.
Specifically, we present an in-depth analysis of the use of machine learning, deep learning and reinforcement learning solutions to recognize intrusive behavior in the collected traffic.
Results present the performance metrics for three different IDSs namely the Adaptively Supervised and Clustered Hybrid IDS, Boltzmann Machine-based Clustered IDS and Q-learning based IDS.
- Score: 4.8041243535151645
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: Volunteer computing uses Internet-connected devices (laptops, PCs, smart
devices, etc.), in which their owners volunteer them as storage and computing
power resources, has become an essential mechanism for resource management in
numerous applications. The growth of the volume and variety of data traffic in
the Internet leads to concerns on the robustness of cyberphysical systems
especially for critical infrastructures. Therefore, the implementation of an
efficient Intrusion Detection System for gathering such sensory data has gained
vital importance. In this paper, we present a comparative study of Artificial
Intelligence (AI)-driven intrusion detection systems for wirelessly connected
sensors that track crucial applications. Specifically, we present an in-depth
analysis of the use of machine learning, deep learning and reinforcement
learning solutions to recognize intrusive behavior in the collected traffic. We
evaluate the proposed mechanisms by using KD'99 as real attack data-set in our
simulations. Results present the performance metrics for three different IDSs
namely the Adaptively Supervised and Clustered Hybrid IDS (ASCH-IDS),
Restricted Boltzmann Machine-based Clustered IDS (RBC-IDS) and Q-learning based
IDS (QL-IDS) to detect malicious behaviors. We also present the performance of
different reinforcement learning techniques such as
State-Action-Reward-State-Action Learning (SARSA) and the Temporal Difference
learning (TD). Through simulations, we show that QL-IDS performs with 100%
detection rate while SARSA-IDS and TD-IDS perform at the order of 99.5%.
Related papers
- Enhanced Anomaly Detection in Industrial Control Systems aided by Machine Learning [2.2457306746668766]
This study investigates whether combining both network and process data can improve attack detection in ICSs environments.
Our findings suggest that integrating network traffic with operational process data can enhance detection capabilities.
Although the results are promising, they are preliminary and highlight the need for further studies.
arXiv Detail & Related papers (2024-10-25T17:41:33Z) - Effective Intrusion Detection in Heterogeneous Internet-of-Things Networks via Ensemble Knowledge Distillation-based Federated Learning [52.6706505729803]
We introduce Federated Learning (FL) to collaboratively train a decentralized shared model of Intrusion Detection Systems (IDS)
FLEKD enables a more flexible aggregation method than conventional model fusion techniques.
Experiment results show that the proposed approach outperforms local training and traditional FL in terms of both speed and performance.
arXiv Detail & Related papers (2024-01-22T14:16:37Z) - Random resistive memory-based deep extreme point learning machine for
unified visual processing [67.51600474104171]
We propose a novel hardware-software co-design, random resistive memory-based deep extreme point learning machine (DEPLM)
Our co-design system achieves huge energy efficiency improvements and training cost reduction when compared to conventional systems.
arXiv Detail & Related papers (2023-12-14T09:46:16Z) - Online Self-Supervised Deep Learning for Intrusion Detection Systems [1.2952596966415793]
This paper proposes a novel Self-Supervised Intrusion Detection (SSID) framework, which enables a fully online Deep Learning (DL) based Intrusion Detection System (IDS)
The proposed framework analyzes and labels incoming traffic packets based only on the decisions of the IDS itself.
This approach avoids human errors in data labeling, and human labor and computational costs of model training and data collection.
arXiv Detail & Related papers (2023-06-22T16:46:35Z) - Distributed intelligence on the Edge-to-Cloud Continuum: A systematic
literature review [62.997667081978825]
This review aims at providing a comprehensive vision of the main state-of-the-art libraries and frameworks for machine learning and data analytics available today.
The main simulation, emulation, deployment systems, and testbeds for experimental research on the Edge-to-Cloud Continuum available today are also surveyed.
arXiv Detail & Related papers (2022-04-29T08:06:05Z) - Sensitivity analysis in differentially private machine learning using
hybrid automatic differentiation [54.88777449903538]
We introduce a novel textithybrid automatic differentiation (AD) system for sensitivity analysis.
This enables modelling the sensitivity of arbitrary differentiable function compositions, such as the training of neural networks on private data.
Our approach can enable the principled reasoning about privacy loss in the setting of data processing.
arXiv Detail & Related papers (2021-07-09T07:19:23Z) - Multi-Source Data Fusion for Cyberattack Detection in Power Systems [1.8914160585516038]
We show that fusing information from multiple data sources can help identify cyber-induced incidents and reduce false positives.
We perform multi-source data fusion for training IDS in a cyber-physical power system testbed.
Results are presented using the proposed data fusion application to infer False Data and Command injection-based Man-in- The-Middle attacks.
arXiv Detail & Related papers (2021-01-18T06:34:45Z) - Deep Learning based Covert Attack Identification for Industrial Control
Systems [5.299113288020827]
We develop a data-driven framework that can be used to detect, diagnose, and localize a type of cyberattack called covert attacks on smart grids.
The framework has a hybrid design that combines an autoencoder, a recurrent neural network (RNN) with a Long-Short-Term-Memory layer, and a Deep Neural Network (DNN)
arXiv Detail & Related papers (2020-09-25T17:48:43Z) - Identity-Aware Attribute Recognition via Real-Time Distributed Inference
in Mobile Edge Clouds [53.07042574352251]
We design novel models for pedestrian attribute recognition with re-ID in an MEC-enabled camera monitoring system.
We propose a novel inference framework with a set of distributed modules, by jointly considering the attribute recognition and person re-ID.
We then devise a learning-based algorithm for the distributions of the modules of the proposed distributed inference framework.
arXiv Detail & Related papers (2020-08-12T12:03:27Z) - Data Mining with Big Data in Intrusion Detection Systems: A Systematic
Literature Review [68.15472610671748]
Cloud computing has become a powerful and indispensable technology for complex, high performance and scalable computation.
The rapid rate and volume of data creation has begun to pose significant challenges for data management and security.
The design and deployment of intrusion detection systems (IDS) in the big data setting has, therefore, become a topic of importance.
arXiv Detail & Related papers (2020-05-23T20:57:12Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.