Analyzing flow-based anomaly intrusion detection using Replicator Neural Networks
Title | Analyzing flow-based anomaly intrusion detection using Replicator Neural Networks |
Publication Type | Conference Paper |
Year of Publication | 2016 |
Authors | Cordero, C. García, Hauke, S., Mühlhäuser, M., Fischer, M. |
Conference Name | 2016 14th Annual Conference on Privacy, Security and Trust (PST) |
ISBN Number | 978-1-5090-4379-8 |
Keywords | anomaly-based intrusion detection, artificial neural network, Artificial neural networks, Collaboration, Computational modeling, computer network security, deep learning technique, Entropy, feature extraction, flow-based anomaly intrusion detection analysis, governance, Government, Internet, Intrusion detection, learning (artificial intelligence), network profiling technique, neural nets, Neural networks, policy, policy-based governance, pubcrawl, replicator neural network infrastructure, Resiliency, resource exhaustion attack detection, RNN infrastructure, Training |
Abstract | Defending key network infrastructure, such as Internet backbone links or the communication channels of critical infrastructure, is paramount, yet challenging. The inherently complex nature and quantity of network data impedes detecting attacks in real world settings. In this paper, we utilize features of network flows, characterized by their entropy, together with an extended version of the original Replicator Neural Network (RNN) and deep learning techniques to learn models of normality. This combination allows us to apply anomaly-based intrusion detection on arbitrarily large amounts of data and, consequently, large networks. Our approach is unsupervised and requires no labeled data. It also accurately detects network-wide anomalies without presuming that the training data is completely free of attacks. The evaluation of our intrusion detection method, on top of real network data, indicates that it can accurately detect resource exhaustion attacks and network profiling techniques of varying intensities. The developed method is efficient because a normality model can be learned by training an RNN within a few seconds only. |
URL | http://ieeexplore.ieee.org/document/7906980/ |
DOI | 10.1109/PST.2016.7906980 |
Citation Key | cordero_analyzing_2016 |
- Intrusion Detection
- Training
- RNN infrastructure
- resource exhaustion attack detection
- Resiliency
- replicator neural network infrastructure
- pubcrawl
- policy-based governance
- Policy
- Neural networks
- neural nets
- network profiling technique
- learning (artificial intelligence)
- anomaly-based intrusion detection
- internet
- Government
- Governance
- flow-based anomaly intrusion detection analysis
- feature extraction
- Entropy
- deep learning technique
- computer network security
- Computational modeling
- collaboration
- Artificial Neural Networks
- artificial neural network