Intelligent methods for intrusion detection in local area networks

Annotation: Review of intelligent methods for intrusion detection in local area networks is presented. Publically available datasets of intrusions are shortly described. A problem of imbalanced classes appointed and approach for batch training of a neural network intrusion classifier with imbalanced classes is presented. In computer simulation, it is shown that such approach helps to train on classes with small amount of examples by the cost of larger classes.

[1]  Muhammad Salman Khan,et al.  Multiscale Hebbian neural network for cyber threat detection , 2017, 2017 International Joint Conference on Neural Networks (IJCNN).

[2]  J. Friedman Special Invited Paper-Additive logistic regression: A statistical view of boosting , 2000 .

[3]  Hossein Gharaee,et al.  A new feature selection IDS based on genetic algorithm and SVM , 2016, 2016 8th International Symposium on Telecommunications (IST).

[4]  Ali A. Ghorbani,et al.  A detailed analysis of the KDD CUP 99 data set , 2009, 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications.

[5]  SU Yang Research on Network Behavior Anomaly Analysis Based on Bidirectional LSTM , 2019, 2019 IEEE 3rd Information Technology, Networking, Electronic and Automation Control Conference (ITNEC).

[6]  Kim-Kwang Raymond Choo,et al.  Outlier Dirichlet Mixture Mechanism: Adversarial Statistical Learning for Anomaly Detection in the Fog , 2019, IEEE Transactions on Information Forensics and Security.

[7]  Elias Bou-Harb,et al.  Tackling Class Imbalance in Cyber Security Datasets , 2018, 2018 IEEE International Conference on Information Reuse and Integration (IRI).

[8]  Songge Xiao,et al.  Constructing an Intrusion Detection Model based on Long Short-term Neural Networks , 2018, 2018 IEEE/ACIS 17th International Conference on Computer and Information Science (ICIS).

[9]  Ali A. Ghorbani,et al.  Toward Generating a New Intrusion Detection Dataset and Intrusion Traffic Characterization , 2018, ICISSP.

[10]  Jiankun Hu,et al.  A New Threat Intelligence Scheme for Safeguarding Industry 4.0 Systems , 2018, IEEE Access.

[11]  S. E. Smaha Haystack: an intrusion detection system , 1988, [Proceedings 1988] Fourth Aerospace Computer Security Applications.

[12]  Jiajun Lin,et al.  A Multiple-Layer Representation Learning Model for Network-Based Attack Detection , 2019, IEEE Access.

[13]  Iftikhar Ahmad,et al.  Date of publication xxxx 00, 0000, date of current version xxxx 00, 0000 , 2018 .

[14]  Haibo Liu,et al.  A Method for Guaranteeing Wireless Communication Based on a Combination of Deep and Shallow Learning , 2019, IEEE Access.

[15]  Zeki Erdem,et al.  Network anomaly detection with deep learning , 2018, 2018 26th Signal Processing and Communications Applications Conference (SIU).

[16]  Eugene H. Spafford,et al.  A PATTERN MATCHING MODEL FOR MISUSE INTRUSION DETECTION , 1994 .

[17]  Hervé Debar,et al.  A neural network component for an intrusion detection system , 1992, Proceedings 1992 IEEE Computer Society Symposium on Research in Security and Privacy.

[18]  Slavko Gajin,et al.  Ensemble classifiers for supervised anomaly based network intrusion detection , 2017, 2017 13th IEEE International Conference on Intelligent Computer Communication and Processing (ICCP).

[19]  Lucas M. Venter,et al.  Applying mobile agents in an immune-system-based intrusion detection system , 2005, South Afr. Comput. J..

[20]  Kim-Kwang Raymond Choo,et al.  An Ensemble Intrusion Detection Technique Based on Proposed Statistical Flow Features for Protecting Network Traffic of Internet of Things , 2019, IEEE Internet of Things Journal.

[21]  H. Pomares,et al.  Statistical analysis of different artificial intelligent techniques applied to Intrusion Detection System , 2012, 2012 International Conference on Multimedia Computing and Systems.

[22]  Jill Slay,et al.  Novel Geometric Area Analysis Technique for Anomaly Detection Using Trapezoidal Area Estimation on Large-Scale Networks , 2019, IEEE Transactions on Big Data.

[23]  Rasool Jalili,et al.  Detection of Distributed Denial of Service Attacks Using Statistical Pre-processor and Unsupervised Neural Networks , 2005, ISPEC.

[24]  Chongfu Zhang,et al.  Developed Density Peak Clustering With Support Vector Data Description for Access Network Intrusion Detection , 2018, IEEE Access.

[25]  Ping Wang,et al.  Using convolutional neural networks to network intrusion detection for cyber threats , 2018, 2018 IEEE International Conference on Applied System Invention (ICASI).

[26]  K. P. Soman,et al.  Deep Learning Approach for Intelligent Intrusion Detection System , 2019, IEEE Access.

[27]  Billy Peralta,et al.  A proposal for mixture of experts with entropic regularization , 2017, 2017 XLIII Latin American Computer Conference (CLEI).

[28]  Paul D. Yoo,et al.  From Intrusion Detection to Attacker Attribution: A Comprehensive Survey of Unsupervised Methods , 2018, IEEE Communications Surveys & Tutorials.

[29]  Andrew H. Sung,et al.  Intrusion detection using an ensemble of intelligent paradigms , 2005, J. Netw. Comput. Appl..

[30]  Falko Dressler,et al.  FIXIDS: A high-speed signature-based flow intrusion detection system , 2018, NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium.

[31]  Tim Watson,et al.  A LogitBoost-Based Algorithm for Detecting Known and Unknown Web Attacks , 2017, IEEE Access.

[32]  Fan Zhang,et al.  An Intrusion Detection System Using a Deep Neural Network With Gated Recurrent Units , 2018, IEEE Access.

[33]  Elena Sitnikova,et al.  Collaborative anomaly detection framework for handling big data of cloud computing , 2017, 2017 Military Communications and Information Systems Conference (MilCIS).

[34]  Chung-Horng Lung,et al.  Hybrid Relabeled Model for Network Intrusion Detection , 2018, 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData).

[35]  Bayu Adhi Tama,et al.  Anomaly detection using random forest: A performance revisited , 2017, 2017 International Conference on Data and Software Engineering (ICoDSE).

[36]  SEBASTIAN ROSCHKE,et al.  High-quality attack graph-based IDS correlation , 2013, Log. J. IGPL.

[37]  François Chollet,et al.  Keras: The Python Deep Learning library , 2018 .

[38]  Andreas Hotho,et al.  A Survey of Network-based Intrusion Detection Data Sets , 2019, Comput. Secur..

[39]  Dong Jin,et al.  A Comparative Study of Off-Line Deep Learning Based Network Intrusion Detection , 2018, 2018 Tenth International Conference on Ubiquitous and Future Networks (ICUFN).

[40]  Ali A. Ghorbani,et al.  Toward developing a systematic approach to generate benchmark datasets for intrusion detection , 2012, Comput. Secur..

[41]  Feng Jiang,et al.  An Intelligent Network Attack Detection Method Based on RNN , 2018, 2018 IEEE Third International Conference on Data Science in Cyberspace (DSC).

[42]  Jill Slay,et al.  The Significant Features of the UNSW-NB15 and the KDD99 Data Sets for Network Intrusion Detection Systems , 2015, 2015 4th International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security (BADGERS).

[43]  Jill Slay,et al.  The evaluation of Network Anomaly Detection Systems: Statistical analysis of the UNSW-NB15 data set and the comparison with the KDD99 data set , 2016, Inf. Secur. J. A Glob. Perspect..

[44]  Shahrzad Zargari,et al.  Feature selection in UNSW-NB15 and KDDCUP'99 datasets , 2017, 2017 IEEE 26th International Symposium on Industrial Electronics (ISIE).

[45]  Jeannette M. Wing,et al.  Scenario graphs and attack graphs , 2004 .

[46]  Jagath Samarabandu,et al.  Comparison of Recurrent Neural Network Algorithms for Intrusion Detection Based on Predicting Packet Sequences , 2018, 2018 IEEE Canadian Conference on Electrical & Computer Engineering (CCECE).

[47]  Chung-Horng Lung,et al.  Evaluation of machine learning techniques for network intrusion detection , 2018, NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium.

[48]  Giovanni Vigna,et al.  STATL: An Attack Language for State-Based Intrusion Detection , 2002, J. Comput. Secur..

[49]  Harish Kumar,et al.  A Reference Dataset for Network Traffic Activity Based Intrusion Detection System , 2015, Int. J. Comput. Commun. Control.

[50]  K. P. Soman,et al.  Applying convolutional neural network for network intrusion detection , 2017, 2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI).