Efficient Intrusion Detection Using Evidence Theory
- URL: http://arxiv.org/abs/2103.08585v1
- Date: Mon, 15 Mar 2021 17:54:16 GMT
- Title: Efficient Intrusion Detection Using Evidence Theory
- Authors: Islam Debicha, Thibault Debatty, Wim Mees and Jean-Michel Dricot
- Abstract summary: Intrusion Detection Systems (IDS) are now an essential element when it comes to securing computers and networks.
This paper proposes a novel contextual discounting method based on sources' reliability and their distinguishing ability between normal and abnormal behavior.
- Score: 0.0
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: Intrusion Detection Systems (IDS) are now an essential element when it comes
to securing computers and networks. Despite the huge research efforts done in
the field, handling sources' reliability remains an open issue. To address this
problem, this paper proposes a novel contextual discounting method based on
sources' reliability and their distinguishing ability between normal and
abnormal behavior. Dempster-Shafer theory, a general framework for reasoning
under uncertainty, is used to construct an evidential classifier. The NSL-KDD
dataset, a significantly revised and improved version of the existing KDDCUP'99
dataset, provides the basis for assessing the performance of our new detection
approach. While giving comparable results on the KDDTest+ dataset, our approach
outperformed some other state-of-the-art methods on the KDDTest-21 dataset
which is more challenging.
Related papers
- Statistical Inference for Clustering-based Anomaly Detection [7.10052009802944]
Unsupervised anomaly detection is a fundamental problem in machine learning and statistics.
We propose SI-CLAD (Statistical Inference for CLustering-based Anomaly Detection), a novel statistical framework for testing the clustering-based AD results.
arXiv Detail & Related papers (2025-04-25T18:21:26Z) - Deep evolving semi-supervised anomaly detection [14.027613461156864]
The aim of this paper is to formalise the task of continual semi-supervised anomaly detection (CSAD)
The paper introduces a baseline model of a variational autoencoder (VAE) to work with semi-supervised data along with a continual learning method of deep generative replay with outlier rejection.
arXiv Detail & Related papers (2024-12-01T15:48:37Z) - What If the Input is Expanded in OOD Detection? [77.37433624869857]
Out-of-distribution (OOD) detection aims to identify OOD inputs from unknown classes.
Various scoring functions are proposed to distinguish it from in-distribution (ID) data.
We introduce a novel perspective, i.e., employing different common corruptions on the input space.
arXiv Detail & Related papers (2024-10-24T06:47:28Z) - Trustworthy Intrusion Detection: Confidence Estimation Using Latent Space [7.115540429006041]
This work introduces a novel method for enhancing confidence in anomaly detection in Intrusion Detection Systems (IDS)
By developing a confidence metric derived from latent space representations, we aim to improve the reliability of IDS predictions against cyberattacks.
Applying to the NSL-KDD dataset, our approach focuses on binary classification tasks to effectively distinguish between normal and malicious network activities.
arXiv Detail & Related papers (2024-09-19T08:09:44Z) - FedAD-Bench: A Unified Benchmark for Federated Unsupervised Anomaly Detection in Tabular Data [11.42231457116486]
FedAD-Bench is a benchmark for evaluating unsupervised anomaly detection algorithms within the context of federated learning.
We identify key challenges such as model aggregation inefficiencies and metric unreliability.
Our work aims to establish a standardized benchmark to guide future research and development in federated anomaly detection.
arXiv Detail & Related papers (2024-08-08T13:14:19Z) - Simple Ingredients for Offline Reinforcement Learning [86.1988266277766]
offline reinforcement learning algorithms have proven effective on datasets highly connected to the target downstream task.
We show that existing methods struggle with diverse data: their performance considerably deteriorates as data collected for related but different tasks is simply added to the offline buffer.
We show that scale, more than algorithmic considerations, is the key factor influencing performance.
arXiv Detail & Related papers (2024-03-19T18:57:53Z) - Binary Classification with Confidence Difference [100.08818204756093]
This paper delves into a novel weakly supervised binary classification problem called confidence-difference (ConfDiff) classification.
We propose a risk-consistent approach to tackle this problem and show that the estimation error bound the optimal convergence rate.
We also introduce a risk correction approach to mitigate overfitting problems, whose consistency and convergence rate are also proven.
arXiv Detail & Related papers (2023-10-09T11:44:50Z) - On Pitfalls of Test-Time Adaptation [82.8392232222119]
Test-Time Adaptation (TTA) has emerged as a promising approach for tackling the robustness challenge under distribution shifts.
We present TTAB, a test-time adaptation benchmark that encompasses ten state-of-the-art algorithms, a diverse array of distribution shifts, and two evaluation protocols.
arXiv Detail & Related papers (2023-06-06T09:35:29Z) - Diffusion Denoising Process for Perceptron Bias in Out-of-distribution
Detection [67.49587673594276]
We introduce a new perceptron bias assumption that suggests discriminator models are more sensitive to certain features of the input, leading to the overconfidence problem.
We demonstrate that the diffusion denoising process (DDP) of DMs serves as a novel form of asymmetric, which is well-suited to enhance the input and mitigate the overconfidence problem.
Our experiments on CIFAR10, CIFAR100, and ImageNet show that our method outperforms SOTA approaches.
arXiv Detail & Related papers (2022-11-21T08:45:08Z) - Benchmarking Unsupervised Anomaly Detection and Localization [22.54926506414486]
This paper extensively compares 13 papers in terms of the performance in unsupervised anomaly detection and localization tasks.
Considering the proposal of the new MVTec 3D-AD dataset, this paper also conducts experiments using the existing state-of-the-art 2D methods on this new dataset.
arXiv Detail & Related papers (2022-05-30T04:57:25Z) - Decomposed Adversarial Learned Inference [118.27187231452852]
We propose a novel approach, Decomposed Adversarial Learned Inference (DALI)
DALI explicitly matches prior and conditional distributions in both data and code spaces.
We validate the effectiveness of DALI on the MNIST, CIFAR-10, and CelebA datasets.
arXiv Detail & Related papers (2020-04-21T20:00:35Z) - Regularized Cycle Consistent Generative Adversarial Network for Anomaly
Detection [5.457279006229213]
We propose a new Regularized Cycle Consistent Generative Adversarial Network (RCGAN) in which deep neural networks are adversarially trained to better recognize anomalous samples.
Experimental results on both real-world and synthetic data show that our model leads to significant and consistent improvements on previous anomaly detection benchmarks.
arXiv Detail & Related papers (2020-01-18T03:35:05Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.