2021
DOI: 10.48550/arxiv.2108.09199
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

An Adaptable Deep Learning-Based Intrusion Detection System to Zero-Day Attacks

Abstract: The intrusion detection system (IDS) is an essential element of security monitoring in computer networks. An IDS distinguishes the malicious traffic from the benign one and determines the attack types targeting the assets of the organization. The main challenge of an IDS is facing new (i.e., zero-day) attacks and separating them from benign traffic and existing types of attacks. Along with the power of the deep learning-based IDSes in auto-extracting high-level features and its independence from the time-consu… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
3
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(4 citation statements)
references
References 30 publications
0
3
0
Order By: Relevance
“…In [4], the authors propose DOC++ as a deep novelty-based classifier to detect not seen traffic (both the zero-day attacks and new benign behaviors). Besides, using a joint deep clustering algorithm, enough pieces of each new novel class evidence are gathered and used in the supervised labeling process and corresponding updating phase.…”
Section: Deep Learning-based Intrusion Detectionmentioning
confidence: 99%
See 2 more Smart Citations
“…In [4], the authors propose DOC++ as a deep novelty-based classifier to detect not seen traffic (both the zero-day attacks and new benign behaviors). Besides, using a joint deep clustering algorithm, enough pieces of each new novel class evidence are gathered and used in the supervised labeling process and corresponding updating phase.…”
Section: Deep Learning-based Intrusion Detectionmentioning
confidence: 99%
“…In some cases, incrementally training solely on a new set of data samples from unknown traffic might make our model biased towards that new traffic, which will be an instance of catastrophic forgetting. As suggested in [38,4], with the advent of new data, we will constitute a training set that possesses the new data in conjuncture with samples corresponding to the previous attacks and benign flows that the model has been previously trained on. To implement this approach, the collective number of data samples belonging to the previous attacks should be equal to the number of the new attack samples.…”
Section: Data Samplingmentioning
confidence: 99%
See 1 more Smart Citation
“…More recently, [18] generated an unknown attack through a generative model, allowing data other than normal and known attacks to be detected as unknown attacks. [19] performed classification via OSR and clustering based on classified labels to detect unknown attacks. [20] used the extreme value machine (EVM) to obtain an extreme value distribution, leaving only critical data points, and proposed a fast-learning detection method using these data points.…”
Section: B Unknown Attack Detectionmentioning
confidence: 99%