Abstract

As network attacks are constantly and dramatically evolving, demonstrating new patterns, intelligent Network Intrusion Detection Systems (NIDS), using deep-learning techniques, have been actively studied to tackle these problems. Recently, various autoencoders have been used for NIDS in order to accurately and promptly detect unknown types of attacks (i.e., zero-day attacks) and also alleviate the burden of the laborious labeling task. Although the autoencoders are effective in detecting unknown types of attacks, it takes tremendous time and effort to find the optimal model architecture and hyperparameter settings of the autoencoders that result in the best detection performance. This can be an obstacle that hinders practical applications of autoencoder-based NIDS. To address this challenge, we rigorously study autoencoders using the benchmark datasets, NSL-KDD, IoTID20, and N-BaIoT. We evaluate multiple combinations of different model structures and latent sizes, using a simple autoencoder model. The results indicate that the latent size of an autoencoder model can have a significant impact on the IDS performance.

Highlights

  • It is critical to defend network systems and information assets from network attacks, and there exist various techniques to deal with network attacks

  • We chose the best-performing latent size based on the Matthews Correlation Coefficient (MCC) score for each model structure and present its performance scores along with its latent size and threshold

  • Various autoencoder models have shown to be effective in detecting intrusions, identifying the optimal model architecture to provide the best detection performance requires tremendous effort, and this hinders its practical application to Network Intrusion Detection Systems (NIDS)

Read more

Summary

Introduction

It is critical to defend network systems and information assets from network attacks, and there exist various techniques to deal with network attacks. Signature-based methods rely on pre-labeled train data, but the labeling process generally needs tremendous human efforts These limitations were addressed by the anomaly-based approach, which enables us to quickly detect and respond to unknown attack patterns to stabilize network operation while reducing human intervention [20,21,22,23,24]. We can classify an input instance as an attack if its reconstruction error is larger than a predefined threshold; otherwise, we can classify the input instance as normal In this fashion, an autoencoder-based NIDS is capable of detecting unknown types of attacks when their patterns deviate from the learned normal patterns. We conclude with a summary and suggestions for future work

Related Work
Intrusion Detection with Deep-Learning and Ensemble Learning
Autoencoders for Feature Reduction
Autoencoders for Anomaly Detection
Datasets
NSL-KDD Data
IoTID20 Data
N-BaIoT Data
Approach
Overview
Model Design
The Evaluation Metrics
Results and Analysis
Model Configurations
Results
Model Structure and Performance
Analysis of Reconstruction Errors and Threshold
Threats-to-Validity of Experimental Results
Conclusions
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call