Skip to main content

2024 | OriginalPaper | Buchkapitel

Automated and Improved Detection of Cyber Attacks via an Industrial IDS Probe

verfasst von : Almamy Touré, Youcef Imine, Thierry Delot, Antoine Gallais, Alexis Semnont, Robin Giraudo

Erschienen in: ICT Systems Security and Privacy Protection

Verlag: Springer Nature Switzerland

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Network flow classification allows to distinguish normal flows from deviant behaviors. However, given the diversity of the approaches proposed for intrusion detection via IDS probes, an adequate fundamental solution is required. Indeed, most of existing solutions address a specific context which does not allow to assess the efficiency of the proposed models on a different context. Therefore, we propose in this paper an approach for malicious flow detection based on One Dimensional Convolutional Neural Networks (1D-CNN). Our solution extracts features based on the definition of network flows. Thus, it can be common to any network flow classification model. This feature engineering phase is coupled to CNN’s feature detector in order to provide an efficient classification approach. To evaluate its performance, our solution has been evaluated on two different datasets (a recent dataset extracted from a real IBM industrial context and the NSL-KDD dataset that is widely used in the literature). Moreover, a comparison with existing solutions has been provided to NSL-KDD dataset. Attacks in both datasets have been defined using the globally-accessible knowledge base of adversary tactics and techniques MITRE framework. The evaluation results have shown that our proposed solution allows an efficient and accurate classification in both datasets (with an accuracy rate of 94% at least). Moreover, it outperforms existing solutions in terms of classification metrics and execution time as well.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Lin, P., et al.: A novel multimodal deep learning framework for encrypted traffic classification. IEEE/ACM Trans. Network. 31, 1369–1384 (2022)CrossRef Lin, P., et al.: A novel multimodal deep learning framework for encrypted traffic classification. IEEE/ACM Trans. Network. 31, 1369–1384 (2022)CrossRef
2.
Zurück zum Zitat Zhu, X., et al.: Machine-learning-assisted traffic classification of user activities at programmable data plane. In: 23rd Asia-Pacific Network Operations and Management Symposium (APNOMS) (2022) Zhu, X., et al.: Machine-learning-assisted traffic classification of user activities at programmable data plane. In: 23rd Asia-Pacific Network Operations and Management Symposium (APNOMS) (2022)
3.
Zurück zum Zitat Xin, S.: Research of intrusion detection system. In: International Conference on Computational and Information Sciences, pp. 1460–1462 (2013) Xin, S.: Research of intrusion detection system. In: International Conference on Computational and Information Sciences, pp. 1460–1462 (2013)
4.
Zurück zum Zitat Yin, C., et al.: A deep learning approach for intrusion detection using recurrent neural networks. IEEE Access 5, 21954–21961 (2017)CrossRef Yin, C., et al.: A deep learning approach for intrusion detection using recurrent neural networks. IEEE Access 5, 21954–21961 (2017)CrossRef
5.
Zurück zum Zitat Kılıc̨, H., et al.: Evasion techniques efficiency over the IPS/IDS technology. In: 4th International Conference on Computer Science and Engineering (UBMK), pp. 542–547 (2019) Kılıc̨, H., et al.: Evasion techniques efficiency over the IPS/IDS technology. In: 4th International Conference on Computer Science and Engineering (UBMK), pp. 542–547 (2019)
6.
Zurück zum Zitat Salman, O., et al.: A review on machine learning-based approaches for Internet traffic classification. Ann. Telecommun. 75(11), 673–710 (2020)CrossRef Salman, O., et al.: A review on machine learning-based approaches for Internet traffic classification. Ann. Telecommun. 75(11), 673–710 (2020)CrossRef
7.
Zurück zum Zitat Jabbar, M.A., et al.: Intelligent network intrusion detection using alternating decision trees. In: International Conference on Circuits, Controls, Communications and Computing (I4C) (2016) Jabbar, M.A., et al.: Intelligent network intrusion detection using alternating decision trees. In: International Conference on Circuits, Controls, Communications and Computing (I4C) (2016)
8.
Zurück zum Zitat Sharmila, B.S., et al.: Intrusion detection system using naive bayes algorithm. In: IEEE International WIE Conference on Electrical and Computer Engineering (WIECON-ECE) (2019) Sharmila, B.S., et al.: Intrusion detection system using naive bayes algorithm. In: IEEE International WIE Conference on Electrical and Computer Engineering (WIECON-ECE) (2019)
9.
Zurück zum Zitat Meena, G., et al.: A review paper on IDS classification using KDD 99 and NSL KDD dataset in WEKA. In: International Conference on Computer, Communications and Electronics (Comptelix), pp. 553–558 (2017) Meena, G., et al.: A review paper on IDS classification using KDD 99 and NSL KDD dataset in WEKA. In: International Conference on Computer, Communications and Electronics (Comptelix), pp. 553–558 (2017)
11.
Zurück zum Zitat Varanasi, V., et al.: Network intrusion detection using machine learning, deep learning - a review. In: 4th International Conference on Smart Systems and Inventive Technology (ICSSIT), pp. 1618–1624 (2022) Varanasi, V., et al.: Network intrusion detection using machine learning, deep learning - a review. In: 4th International Conference on Smart Systems and Inventive Technology (ICSSIT), pp. 1618–1624 (2022)
12.
Zurück zum Zitat Vinayakumar, R., et al.: Deep learning approach for intelligent intrusion detection system. IEEE Access 7, 41525–41550 (2019)CrossRef Vinayakumar, R., et al.: Deep learning approach for intelligent intrusion detection system. IEEE Access 7, 41525–41550 (2019)CrossRef
13.
Zurück zum Zitat Sivamohan, S., et al.: An effective recurrent neural network (RNN) based intrusion detection via bi-directional long short-term memory. In: International Conference on Intelligent Technologies (CONIT) (2021) Sivamohan, S., et al.: An effective recurrent neural network (RNN) based intrusion detection via bi-directional long short-term memory. In: International Conference on Intelligent Technologies (CONIT) (2021)
14.
Zurück zum Zitat Wang, W., et al.: HAST-IDS: learning hierarchical spatial-temporal features using deep neural networks to improve intrusion detection. IEEE Access 6, 1792–1806 (2018)CrossRef Wang, W., et al.: HAST-IDS: learning hierarchical spatial-temporal features using deep neural networks to improve intrusion detection. IEEE Access 6, 1792–1806 (2018)CrossRef
15.
Zurück zum Zitat Azizjon, M., et al.: 1D CNN based network intrusion detection with normalization on imbalanced data. In: International Conference on Artificial Intelligence in Information and Communication (ICAIIC), pp. 218–224 (2020) Azizjon, M., et al.: 1D CNN based network intrusion detection with normalization on imbalanced data. In: International Conference on Artificial Intelligence in Information and Communication (ICAIIC), pp. 218–224 (2020)
16.
Zurück zum Zitat Atefi, K., et al.: A hybrid anomaly classification with deep learning (DL) and binary algorithms (BA) as optimizer in the intrusion detection system (IDS). In: 16th IEEE International Colloquium on Signal Processing & Its Applications (CSPA), pp. 29–34 (2020) Atefi, K., et al.: A hybrid anomaly classification with deep learning (DL) and binary algorithms (BA) as optimizer in the intrusion detection system (IDS). In: 16th IEEE International Colloquium on Signal Processing & Its Applications (CSPA), pp. 29–34 (2020)
17.
Zurück zum Zitat Rajesh, P., et al.: Analysis of cyber threat detection and emulation using MITRE attack framework. In: International Conference on Intelligent Data Science Technologies and Applications (IDSTA), pp. 4–12 (2022) Rajesh, P., et al.: Analysis of cyber threat detection and emulation using MITRE attack framework. In: International Conference on Intelligent Data Science Technologies and Applications (IDSTA), pp. 4–12 (2022)
18.
Zurück zum Zitat Zheng, W.-F.: Intrusion detection based on convolutional neural network. In: International Conference on Computer Engineering and Application (ICCEA), pp. 273–277 (2020) Zheng, W.-F.: Intrusion detection based on convolutional neural network. In: International Conference on Computer Engineering and Application (ICCEA), pp. 273–277 (2020)
19.
Zurück zum Zitat Sekharan, S.S., et al.: Profiling SIEM tools and correlation engines for security analytics. In: International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET), pp. 717–721 (2017) Sekharan, S.S., et al.: Profiling SIEM tools and correlation engines for security analytics. In: International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET), pp. 717–721 (2017)
21.
Zurück zum Zitat Tavallaee, M., et al.: A detailed analysis of the KDD cup 99 data set. In: 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications, pp. 1–6 (2009) Tavallaee, M., et al.: A detailed analysis of the KDD cup 99 data set. In: 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications, pp. 1–6 (2009)
22.
Zurück zum Zitat Shah, B., et al.: Reducing features of KDD cup 1999 dataset for anomaly detection using back propagation neural network. In: 2015 Fifth International Conference on Advanced Computing & Communication Technologies, pp. 247–251 (2015) Shah, B., et al.: Reducing features of KDD cup 1999 dataset for anomaly detection using back propagation neural network. In: 2015 Fifth International Conference on Advanced Computing & Communication Technologies, pp. 247–251 (2015)
23.
Zurück zum Zitat Zhang, C., et al.: A deep learning approach for network intrusion detection based on NSL-KDD dataset. In: 2019 IEEE 13th International Conference on Anti-counterfeiting, Security, and Identification (ASID), pp. 41–45 (2019) Zhang, C., et al.: A deep learning approach for network intrusion detection based on NSL-KDD dataset. In: 2019 IEEE 13th International Conference on Anti-counterfeiting, Security, and Identification (ASID), pp. 41–45 (2019)
24.
Zurück zum Zitat Liu, L., et al.: Intrusion detection of imbalanced network traffic based on machine learning and deep learning. IEEE Access 9, 7550–7563 (2021)CrossRef Liu, L., et al.: Intrusion detection of imbalanced network traffic based on machine learning and deep learning. IEEE Access 9, 7550–7563 (2021)CrossRef
25.
Zurück zum Zitat Tauscher, Z., et al.: Learning to detect: a data-driven approach for network intrusion detection. In: 2021 IEEE International Performance, Computing, and Communications Conference (IPCCC), pp. 1–6 (2021) Tauscher, Z., et al.: Learning to detect: a data-driven approach for network intrusion detection. In: 2021 IEEE International Performance, Computing, and Communications Conference (IPCCC), pp. 1–6 (2021)
Metadaten
Titel
Automated and Improved Detection of Cyber Attacks via an Industrial IDS Probe
verfasst von
Almamy Touré
Youcef Imine
Thierry Delot
Antoine Gallais
Alexis Semnont
Robin Giraudo
Copyright-Jahr
2024
DOI
https://doi.org/10.1007/978-3-031-56326-3_14

Premium Partner