Visible to the public Analyzing flow-based anomaly intrusion detection using Replicator Neural Networks

TitleAnalyzing flow-based anomaly intrusion detection using Replicator Neural Networks
Publication TypeConference Paper
Year of Publication2016
AuthorsCordero, C. García, Hauke, S., Mühlhäuser, M., Fischer, M.
Conference Name2016 14th Annual Conference on Privacy, Security and Trust (PST)
ISBN Number978-1-5090-4379-8
Keywordsanomaly-based intrusion detection, artificial neural network, Artificial neural networks, Collaboration, Computational modeling, computer network security, deep learning technique, Entropy, feature extraction, flow-based anomaly intrusion detection analysis, governance, Government, Internet, Intrusion detection, learning (artificial intelligence), network profiling technique, neural nets, Neural networks, policy, policy-based governance, pubcrawl, replicator neural network infrastructure, Resiliency, resource exhaustion attack detection, RNN infrastructure, Training
Abstract

Defending key network infrastructure, such as Internet backbone links or the communication channels of critical infrastructure, is paramount, yet challenging. The inherently complex nature and quantity of network data impedes detecting attacks in real world settings. In this paper, we utilize features of network flows, characterized by their entropy, together with an extended version of the original Replicator Neural Network (RNN) and deep learning techniques to learn models of normality. This combination allows us to apply anomaly-based intrusion detection on arbitrarily large amounts of data and, consequently, large networks. Our approach is unsupervised and requires no labeled data. It also accurately detects network-wide anomalies without presuming that the training data is completely free of attacks. The evaluation of our intrusion detection method, on top of real network data, indicates that it can accurately detect resource exhaustion attacks and network profiling techniques of varying intensities. The developed method is efficient because a normality model can be learned by training an RNN within a few seconds only.

URLhttp://ieeexplore.ieee.org/document/7906980/
DOI10.1109/PST.2016.7906980
Citation Keycordero_analyzing_2016