Proceedings of the 16th International Conference on Availability, Reliability and Security 2021
DOI: 10.1145/3465481.3470065
|View full text |Cite
|
Sign up to set email alerts
|

On the Evaluation of Sequential Machine Learning for Network Intrusion Detection

Abstract: Recent advances in deep learning renewed the research interests in machine learning for Network Intrusion Detection Systems (NIDS). Specifically, attention has been given to sequential learning models, due to their ability to extract the temporal characteristics of Network traffic Flows (NetFlows), and use them for NIDS tasks. However, the applications of these sequential models often consist of transferring and adapting methodologies directly from other fields, without an in-depth investigation on how to leve… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0
2

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
2
1

Relationship

1
7

Authors

Journals

citations
Cited by 14 publications
(7 citation statements)
references
References 30 publications
0
5
0
2
Order By: Relevance
“…Compared to existing IDS methods [3][4][5][6][12][13][14][15][16][17][18][19][20][21][22][23], the QLT-IDS system proposed in the present study has three major advantages.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Compared to existing IDS methods [3][4][5][6][12][13][14][15][16][17][18][19][20][21][22][23], the QLT-IDS system proposed in the present study has three major advantages.…”
Section: Related Workmentioning
confidence: 99%
“…Intrusion detection systems (IDS) are powerful security information and event management (SIEM) tools that help network operators protect vulnerable devices by monitoring malicious activities and automatically recording intrusion events within the network. Current IDS systems utilize three main methods to detect network attacks, namely (1) predefined rules or virus signatures [3][4][5][6]12], (2) anomaly detection [12][13][14][15][16], and (3) artificial intelligence [17][18][19][20][21][22][23][24][25][26] (machine-learning or deep-learning models). However, predefined detection methods require the identification and implementation of effective rules in advance and/or the extensive collection and update of potential virus signatures.…”
Section: Introductionmentioning
confidence: 99%
“…Next, we surveyed related studies of ML-based NIDS that analyze session-level data. There are three cases of analyzing session-level data: when the public dataset is session-level data in the first place [31], [32], as in KDD99 and NSL-KDD; when NetFlow data is obtained from PCAP data [34], [35]; and when defining sessions originally [33], [36].…”
Section: ) Session-level Data Analysismentioning
confidence: 99%
“…In particular, we highlight those solutions that combine deep learning with temporal analyses: such twofold perspective allows to detect additional malicious patterns that can improve detection performance. For instance, in [56] the F1-score improves from 0.90 to 0.95 when also temporal dependencies are considered. We will present a real deployment of a similar solution in §7.2, describing how S2Grupo protects Industrial Control Systems (ICS), showcasing the pros (and cons) of ML with respect to older techniques based on heuristics.…”
Section: Machine Learning In Network Intrusion Detectionmentioning
confidence: 99%
“…Finally, an intriguing future development of such ML solution involves the consideration of 'stateful' analyses that take into account the time-axis (as done, e.g., in [56]) and allow to detect even anomalies occurring in the temporal domain. The next case-study by S2Grupo will consider a similar application.…”
Section: Detection Of Cache Poisoning Attacks In Named Data Networkmentioning
confidence: 99%