DFAID: Density‐aware and feature‐deviated active intrusion detection over network traffic streams

We study the problem of active intrusion detection over network traffic streams. Existing works create clusters for known classes and manually label instances outside the clusters for detecting novel attack classes and concept drift, yet several challenges are present. First, these methods assume th...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Computers & security 2022-07, Vol.118, p.102719, Article 102719
Hauptverfasser: Li, Bin, Wang, Yijie, Xu, Kele, Cheng, Li, Qin, Zhiquan
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue
container_start_page 102719
container_title Computers & security
container_volume 118
creator Li, Bin
Wang, Yijie
Xu, Kele
Cheng, Li
Qin, Zhiquan
description We study the problem of active intrusion detection over network traffic streams. Existing works create clusters for known classes and manually label instances outside the clusters for detecting novel attack classes and concept drift, yet several challenges are present. First, these methods assume that different classes of network traffic distribute far from each other in feature space, while similar attack classes could violate this assumption. It makes the true novel classes and concept drift undetectable, therefore a degraded performance. Second, prior works depending on heavily calculating and retraining cannot achieve efficient incremental updates over the infinite and high-speed streams of network traffic. Last, related methods rarely leverage the domain knowledge in intrusion detection. To address these issues, we propose DFAID, a Density-aware and Feature-deviated Active Intrusion Detection framework over network traffic streams. We first design the mask density score and the feature deviation score to maximize the effectiveness of labeled instances, effectively detecting novel attack classes and the concept drift when similar classes exist. Then, DFAID leverages robust incremental clustering structures to group instances in local regions, relieving the burden on the speed and reducing effects of noisy instances. Last, we further present DFAID-DK by incorporating the Domain Knowledge of temporal correlations between network attacks to correct the wrong predictions. Extensive experiments on two well-known benchmarks, CIC-IDS2017 and ISCX-2012, demonstrate that DFAID and its variation DFAID-DK both achieve significant improvement compared with related methods in terms of f1-score (21.7%, 22.7%) on average, and its running speed is an order of magnitude faster.
doi_str_mv 10.1016/j.cose.2022.102719
format Article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2688592004</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><els_id>S0167404822001109</els_id><sourcerecordid>2688592004</sourcerecordid><originalsourceid>FETCH-LOGICAL-c328t-70443a76005d469a564d3c31b7d6d54af32345285ac54aea0c180a61c1c787713</originalsourceid><addsrcrecordid>eNp9kM1OAyEUhYnRxFp9AVckrqcCwwzUuGlaq02auNE1QbiTMNqhAjNNdz6Cz-iTSFPXrricnHN_PoSuKZlQQuvbdmJ8hAkjjGWBCTo9QSMqBStqRuQpGmWTKDjh8hxdxNgSQkUt5QjBYjlbLe7wArro0v7n61vvdACsO4sb0KkPkDULg9MJLNYmuQGw61Loo_MdtpAga7nyAwTcQdr58I5T0E3jDI4pgN7ES3TW6I8IV3_vGL0uH17mT8X6-XE1n60LUzKZCkE4L7WoCaksr6e6qrktTUnfhK1txXVTspJXTFba5B9oYqgkuqaGGiGFoOUY3Rz7boP_7CEm1fo-dHmkYvncasoI4dnFji4TfIwBGrUNbqPDXlGiDjhVqw441QGnOuLMoftjCPL-g4OgonHQGbAuZALKevdf_BdaN3_N</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2688592004</pqid></control><display><type>article</type><title>DFAID: Density‐aware and feature‐deviated active intrusion detection over network traffic streams</title><source>Elsevier ScienceDirect Journals</source><creator>Li, Bin ; Wang, Yijie ; Xu, Kele ; Cheng, Li ; Qin, Zhiquan</creator><creatorcontrib>Li, Bin ; Wang, Yijie ; Xu, Kele ; Cheng, Li ; Qin, Zhiquan</creatorcontrib><description>We study the problem of active intrusion detection over network traffic streams. Existing works create clusters for known classes and manually label instances outside the clusters for detecting novel attack classes and concept drift, yet several challenges are present. First, these methods assume that different classes of network traffic distribute far from each other in feature space, while similar attack classes could violate this assumption. It makes the true novel classes and concept drift undetectable, therefore a degraded performance. Second, prior works depending on heavily calculating and retraining cannot achieve efficient incremental updates over the infinite and high-speed streams of network traffic. Last, related methods rarely leverage the domain knowledge in intrusion detection. To address these issues, we propose DFAID, a Density-aware and Feature-deviated Active Intrusion Detection framework over network traffic streams. We first design the mask density score and the feature deviation score to maximize the effectiveness of labeled instances, effectively detecting novel attack classes and the concept drift when similar classes exist. Then, DFAID leverages robust incremental clustering structures to group instances in local regions, relieving the burden on the speed and reducing effects of noisy instances. Last, we further present DFAID-DK by incorporating the Domain Knowledge of temporal correlations between network attacks to correct the wrong predictions. Extensive experiments on two well-known benchmarks, CIC-IDS2017 and ISCX-2012, demonstrate that DFAID and its variation DFAID-DK both achieve significant improvement compared with related methods in terms of f1-score (21.7%, 22.7%) on average, and its running speed is an order of magnitude faster.</description><identifier>ISSN: 0167-4048</identifier><identifier>EISSN: 1872-6208</identifier><identifier>DOI: 10.1016/j.cose.2022.102719</identifier><language>eng</language><publisher>Amsterdam: Elsevier Ltd</publisher><subject>Active learning ; Clustering ; Communications traffic ; Density ; Domain knowledge ; Domains ; Drift ; Incremental update ; Intrusion ; Intrusion detection ; Network traffic streams ; Performance degradation ; Streams ; Traffic speed</subject><ispartof>Computers &amp; security, 2022-07, Vol.118, p.102719, Article 102719</ispartof><rights>2022 Elsevier Ltd</rights><rights>Copyright Elsevier Sequoia S.A. Jul 2022</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c328t-70443a76005d469a564d3c31b7d6d54af32345285ac54aea0c180a61c1c787713</citedby><cites>FETCH-LOGICAL-c328t-70443a76005d469a564d3c31b7d6d54af32345285ac54aea0c180a61c1c787713</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://www.sciencedirect.com/science/article/pii/S0167404822001109$$EHTML$$P50$$Gelsevier$$H</linktohtml><link.rule.ids>314,776,780,3537,27901,27902,65306</link.rule.ids></links><search><creatorcontrib>Li, Bin</creatorcontrib><creatorcontrib>Wang, Yijie</creatorcontrib><creatorcontrib>Xu, Kele</creatorcontrib><creatorcontrib>Cheng, Li</creatorcontrib><creatorcontrib>Qin, Zhiquan</creatorcontrib><title>DFAID: Density‐aware and feature‐deviated active intrusion detection over network traffic streams</title><title>Computers &amp; security</title><description>We study the problem of active intrusion detection over network traffic streams. Existing works create clusters for known classes and manually label instances outside the clusters for detecting novel attack classes and concept drift, yet several challenges are present. First, these methods assume that different classes of network traffic distribute far from each other in feature space, while similar attack classes could violate this assumption. It makes the true novel classes and concept drift undetectable, therefore a degraded performance. Second, prior works depending on heavily calculating and retraining cannot achieve efficient incremental updates over the infinite and high-speed streams of network traffic. Last, related methods rarely leverage the domain knowledge in intrusion detection. To address these issues, we propose DFAID, a Density-aware and Feature-deviated Active Intrusion Detection framework over network traffic streams. We first design the mask density score and the feature deviation score to maximize the effectiveness of labeled instances, effectively detecting novel attack classes and the concept drift when similar classes exist. Then, DFAID leverages robust incremental clustering structures to group instances in local regions, relieving the burden on the speed and reducing effects of noisy instances. Last, we further present DFAID-DK by incorporating the Domain Knowledge of temporal correlations between network attacks to correct the wrong predictions. Extensive experiments on two well-known benchmarks, CIC-IDS2017 and ISCX-2012, demonstrate that DFAID and its variation DFAID-DK both achieve significant improvement compared with related methods in terms of f1-score (21.7%, 22.7%) on average, and its running speed is an order of magnitude faster.</description><subject>Active learning</subject><subject>Clustering</subject><subject>Communications traffic</subject><subject>Density</subject><subject>Domain knowledge</subject><subject>Domains</subject><subject>Drift</subject><subject>Incremental update</subject><subject>Intrusion</subject><subject>Intrusion detection</subject><subject>Network traffic streams</subject><subject>Performance degradation</subject><subject>Streams</subject><subject>Traffic speed</subject><issn>0167-4048</issn><issn>1872-6208</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2022</creationdate><recordtype>article</recordtype><recordid>eNp9kM1OAyEUhYnRxFp9AVckrqcCwwzUuGlaq02auNE1QbiTMNqhAjNNdz6Cz-iTSFPXrricnHN_PoSuKZlQQuvbdmJ8hAkjjGWBCTo9QSMqBStqRuQpGmWTKDjh8hxdxNgSQkUt5QjBYjlbLe7wArro0v7n61vvdACsO4sb0KkPkDULg9MJLNYmuQGw61Loo_MdtpAga7nyAwTcQdr58I5T0E3jDI4pgN7ES3TW6I8IV3_vGL0uH17mT8X6-XE1n60LUzKZCkE4L7WoCaksr6e6qrktTUnfhK1txXVTspJXTFba5B9oYqgkuqaGGiGFoOUY3Rz7boP_7CEm1fo-dHmkYvncasoI4dnFji4TfIwBGrUNbqPDXlGiDjhVqw441QGnOuLMoftjCPL-g4OgonHQGbAuZALKevdf_BdaN3_N</recordid><startdate>202207</startdate><enddate>202207</enddate><creator>Li, Bin</creator><creator>Wang, Yijie</creator><creator>Xu, Kele</creator><creator>Cheng, Li</creator><creator>Qin, Zhiquan</creator><general>Elsevier Ltd</general><general>Elsevier Sequoia S.A</general><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>8FD</scope><scope>JQ2</scope><scope>K7.</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope></search><sort><creationdate>202207</creationdate><title>DFAID: Density‐aware and feature‐deviated active intrusion detection over network traffic streams</title><author>Li, Bin ; Wang, Yijie ; Xu, Kele ; Cheng, Li ; Qin, Zhiquan</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c328t-70443a76005d469a564d3c31b7d6d54af32345285ac54aea0c180a61c1c787713</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2022</creationdate><topic>Active learning</topic><topic>Clustering</topic><topic>Communications traffic</topic><topic>Density</topic><topic>Domain knowledge</topic><topic>Domains</topic><topic>Drift</topic><topic>Incremental update</topic><topic>Intrusion</topic><topic>Intrusion detection</topic><topic>Network traffic streams</topic><topic>Performance degradation</topic><topic>Streams</topic><topic>Traffic speed</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Li, Bin</creatorcontrib><creatorcontrib>Wang, Yijie</creatorcontrib><creatorcontrib>Xu, Kele</creatorcontrib><creatorcontrib>Cheng, Li</creatorcontrib><creatorcontrib>Qin, Zhiquan</creatorcontrib><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>ProQuest Criminal Justice (Alumni)</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>Computers &amp; security</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Li, Bin</au><au>Wang, Yijie</au><au>Xu, Kele</au><au>Cheng, Li</au><au>Qin, Zhiquan</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>DFAID: Density‐aware and feature‐deviated active intrusion detection over network traffic streams</atitle><jtitle>Computers &amp; security</jtitle><date>2022-07</date><risdate>2022</risdate><volume>118</volume><spage>102719</spage><pages>102719-</pages><artnum>102719</artnum><issn>0167-4048</issn><eissn>1872-6208</eissn><abstract>We study the problem of active intrusion detection over network traffic streams. Existing works create clusters for known classes and manually label instances outside the clusters for detecting novel attack classes and concept drift, yet several challenges are present. First, these methods assume that different classes of network traffic distribute far from each other in feature space, while similar attack classes could violate this assumption. It makes the true novel classes and concept drift undetectable, therefore a degraded performance. Second, prior works depending on heavily calculating and retraining cannot achieve efficient incremental updates over the infinite and high-speed streams of network traffic. Last, related methods rarely leverage the domain knowledge in intrusion detection. To address these issues, we propose DFAID, a Density-aware and Feature-deviated Active Intrusion Detection framework over network traffic streams. We first design the mask density score and the feature deviation score to maximize the effectiveness of labeled instances, effectively detecting novel attack classes and the concept drift when similar classes exist. Then, DFAID leverages robust incremental clustering structures to group instances in local regions, relieving the burden on the speed and reducing effects of noisy instances. Last, we further present DFAID-DK by incorporating the Domain Knowledge of temporal correlations between network attacks to correct the wrong predictions. Extensive experiments on two well-known benchmarks, CIC-IDS2017 and ISCX-2012, demonstrate that DFAID and its variation DFAID-DK both achieve significant improvement compared with related methods in terms of f1-score (21.7%, 22.7%) on average, and its running speed is an order of magnitude faster.</abstract><cop>Amsterdam</cop><pub>Elsevier Ltd</pub><doi>10.1016/j.cose.2022.102719</doi></addata></record>
fulltext fulltext
identifier ISSN: 0167-4048
ispartof Computers & security, 2022-07, Vol.118, p.102719, Article 102719
issn 0167-4048
1872-6208
language eng
recordid cdi_proquest_journals_2688592004
source Elsevier ScienceDirect Journals
subjects Active learning
Clustering
Communications traffic
Density
Domain knowledge
Domains
Drift
Incremental update
Intrusion
Intrusion detection
Network traffic streams
Performance degradation
Streams
Traffic speed
title DFAID: Density‐aware and feature‐deviated active intrusion detection over network traffic streams
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-02T06%3A29%3A47IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=DFAID:%20Density%E2%80%90aware%20and%20feature%E2%80%90deviated%20active%20intrusion%20detection%20over%20network%20traffic%20streams&rft.jtitle=Computers%20&%20security&rft.au=Li,%20Bin&rft.date=2022-07&rft.volume=118&rft.spage=102719&rft.pages=102719-&rft.artnum=102719&rft.issn=0167-4048&rft.eissn=1872-6208&rft_id=info:doi/10.1016/j.cose.2022.102719&rft_dat=%3Cproquest_cross%3E2688592004%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2688592004&rft_id=info:pmid/&rft_els_id=S0167404822001109&rfr_iscdi=true