Big data analysis and distributed deep learning for next-generation
intrusion detection system optimization
- URL: http://arxiv.org/abs/2209.13961v1
- Date: Wed, 28 Sep 2022 09:46:16 GMT
- Title: Big data analysis and distributed deep learning for next-generation
intrusion detection system optimization
- Authors: Khloud Al Jallad, Mohamad Aljnidi, Mohammad Said Desouki
- Abstract summary: This paper proposes a solution to detect new threats with higher detection rate and lower false positive than already used IDS.
We achieve those results by using Networking, a deep recurrent neural network: Long Short Term Memory (LSTM) on top of Apache Spark Framework.
We propose a model that describes the network abstract normal behavior from a sequence of millions of packets within their context and analyzes them in near real-time to detect point, collective and contextual anomalies.
- Score: 0.0
- License: http://creativecommons.org/licenses/by-nc-nd/4.0/
- Abstract: With the growing use of information technology in all life domains, hacking
has become more negatively effective than ever before. Also with developing
technologies, attacks numbers are growing exponentially every few months and
become more sophisticated so that traditional IDS becomes inefficient detecting
them. This paper proposes a solution to detect not only new threats with higher
detection rate and lower false positive than already used IDS, but also it
could detect collective and contextual security attacks. We achieve those
results by using Networking Chatbot, a deep recurrent neural network: Long
Short Term Memory (LSTM) on top of Apache Spark Framework that has an input of
flow traffic and traffic aggregation and the output is a language of two words,
normal or abnormal. We propose merging the concepts of language processing,
contextual analysis, distributed deep learning, big data, anomaly detection of
flow analysis. We propose a model that describes the network abstract normal
behavior from a sequence of millions of packets within their context and
analyzes them in near real-time to detect point, collective and contextual
anomalies. Experiments are done on MAWI dataset, and it shows better detection
rate not only than signature IDS, but also better than traditional anomaly IDS.
The experiment shows lower false positive, higher detection rate and better
point anomalies detection. As for prove of contextual and collective anomalies
detection, we discuss our claim and the reason behind our hypothesis. But the
experiment is done on random small subsets of the dataset because of hardware
limitations, so we share experiment and our future vision thoughts as we wish
that full prove will be done in future by other interested researchers who have
better hardware infrastructure than ours.
Related papers
- SIRST-5K: Exploring Massive Negatives Synthesis with Self-supervised
Learning for Robust Infrared Small Target Detection [53.19618419772467]
Single-frame infrared small target (SIRST) detection aims to recognize small targets from clutter backgrounds.
With the development of Transformer, the scale of SIRST models is constantly increasing.
With a rich diversity of infrared small target data, our algorithm significantly improves the model performance and convergence speed.
arXiv Detail & Related papers (2024-03-08T16:14:54Z) - A Geometrical Approach to Evaluate the Adversarial Robustness of Deep
Neural Networks [52.09243852066406]
Adversarial Converging Time Score (ACTS) measures the converging time as an adversarial robustness metric.
We validate the effectiveness and generalization of the proposed ACTS metric against different adversarial attacks on the large-scale ImageNet dataset.
arXiv Detail & Related papers (2023-10-10T09:39:38Z) - Intrusion Detection in Internet of Things using Convolutional Neural
Networks [4.718295605140562]
We propose a novel solution to the intrusion attacks against IoT devices using CNNs.
The data is encoded as the convolutional operations to capture the patterns from the sensors data along time.
The experimental results show significant improvement in both true positive rate and false positive rate compared to the baseline using LSTM.
arXiv Detail & Related papers (2022-11-18T07:27:07Z) - Anomaly Detection with Test Time Augmentation and Consistency Evaluation [13.709281244889691]
We propose a simple, yet effective anomaly detection algorithm named Test Time Augmentation Anomaly Detection (TTA-AD)
We observe that in-distribution data enjoy more consistent predictions for its original and augmented versions on a trained network than out-distribution data.
Experiments on various high-resolution image benchmark datasets demonstrate that TTA-AD achieves comparable or better detection performance.
arXiv Detail & Related papers (2022-06-06T04:27:06Z) - Unsupervised Abnormal Traffic Detection through Topological Flow
Analysis [1.933681537640272]
topological connectivity component of a malicious flow is less exploited.
We present a simple method that facilitate the use of connectivity graph features in unsupervised anomaly detection algorithms.
arXiv Detail & Related papers (2022-05-14T18:52:49Z) - DAAIN: Detection of Anomalous and Adversarial Input using Normalizing
Flows [52.31831255787147]
We introduce a novel technique, DAAIN, to detect out-of-distribution (OOD) inputs and adversarial attacks (AA)
Our approach monitors the inner workings of a neural network and learns a density estimator of the activation distribution.
Our model can be trained on a single GPU making it compute efficient and deployable without requiring specialized accelerators.
arXiv Detail & Related papers (2021-05-30T22:07:13Z) - Zero-bias Deep Learning Enabled Quick and Reliable Abnormality Detection
in IoT [18.474662677341012]
This paper integrates zero-bias DNN and Quickest Event Detection algorithms.
It provides a holistic framework for quick and reliable detection of both abnormalities and time-dependent abnormal events.
We demonstrate the effectiveness of the framework using both massive signal records from real-world aviation communication systems and simulated data.
arXiv Detail & Related papers (2021-04-08T03:31:50Z) - Robust and Transferable Anomaly Detection in Log Data using Pre-Trained
Language Models [59.04636530383049]
Anomalies or failures in large computer systems, such as the cloud, have an impact on a large number of users.
We propose a framework for anomaly detection in log data, as a major troubleshooting source of system information.
arXiv Detail & Related papers (2021-02-23T09:17:05Z) - Edge-Detect: Edge-centric Network Intrusion Detection using Deep Neural
Network [0.0]
Edge nodes are crucial for detection against multitudes of cyber attacks on Internet-of-Things endpoints.
We develop a novel light, fast and accurate 'Edge-Detect' model, which detects Denial of Service attack on edge nodes using DLM techniques.
arXiv Detail & Related papers (2021-02-03T04:24:34Z) - TadGAN: Time Series Anomaly Detection Using Generative Adversarial
Networks [73.01104041298031]
TadGAN is an unsupervised anomaly detection approach built on Generative Adversarial Networks (GANs)
To capture the temporal correlations of time series, we use LSTM Recurrent Neural Networks as base models for Generators and Critics.
To demonstrate the performance and generalizability of our approach, we test several anomaly scoring techniques and report the best-suited one.
arXiv Detail & Related papers (2020-09-16T15:52:04Z) - Contextual-Bandit Anomaly Detection for IoT Data in Distributed
Hierarchical Edge Computing [65.78881372074983]
IoT devices can hardly afford complex deep neural networks (DNN) models, and offloading anomaly detection tasks to the cloud incurs long delay.
We propose and build a demo for an adaptive anomaly detection approach for distributed hierarchical edge computing (HEC) systems.
We show that our proposed approach significantly reduces detection delay without sacrificing accuracy, as compared to offloading detection tasks to the cloud.
arXiv Detail & Related papers (2020-04-15T06:13:33Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.