2021
DOI: 10.1109/access.2021.3113124
|View full text |Cite
|
Sign up to set email alerts
|

Hunt for Unseen Intrusion: Multi-Head Self-Attention Neural Detector

Abstract: A network intrusion detection (NID) system plays a critical role in cybersecurity. However, the existing machine learning-based NID research has a vital issue that their experimental settings do not reflect real-world situations where unknown attacks are constantly emerging. In particular, their train and test sets are from a single data set, which inevitably overestimates the detection power since all test attack types are known in training, and test cases will have similar characteristics to the training dat… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
1
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 52 publications
0
1
0
Order By: Relevance
“…Their overestimation of detection capacity can be traced back to the fact that all test attack types are known in training and therefore test cases would share features with the training data. Seo et al [13] presented a novel approach to populating test data with fresh, up-to-date traffic that includes novel attack types not present in training data. The prediction accuracy of existing detectors is reduced by around 20% in the suggested environment, relative to what has been published.…”
Section: Literature Surveymentioning
confidence: 99%
See 1 more Smart Citation
“…Their overestimation of detection capacity can be traced back to the fact that all test attack types are known in training and therefore test cases would share features with the training data. Seo et al [13] presented a novel approach to populating test data with fresh, up-to-date traffic that includes novel attack types not present in training data. The prediction accuracy of existing detectors is reduced by around 20% in the suggested environment, relative to what has been published.…”
Section: Literature Surveymentioning
confidence: 99%
“…There are a wide variety of dangers and methods of attack against computers and networks [12], and this is only expected to increase as management information systems become more sophisticated and widespread. As the number of attacks and vulnerabilities increases, and as misuse detection functions are unable to identify attacks for which no signatures exist yet, researchers are urged to advocate for an intrusion detection mechanism that is capable of identifying novel attacks through anomaly detection models [13]. An ID creates a standard for typical behavior and flag anything that deviates significantly from that as suspicious [14].…”
Section: Introductionmentioning
confidence: 99%
“…Since they have used one data set for training and testing, the discovery influence is overestimated because all test attack types are identified in training, while the test cases will be alike to the training data. The paper presents a novel method to create test data with updated traffic with attacks types not found in training data [217].…”
Section: Ai-assisted Threat Huntingmentioning
confidence: 99%