SDN Intrusion Detection: An Ensemble Approach to Reducing False Negative Rate for Novel Attacks

John William O'Meara, Mahmoud Said Elsayed, Takfarinas Saber, A. Jurcut
{"title":"SDN Intrusion Detection: An Ensemble Approach to Reducing False Negative Rate for Novel Attacks","authors":"John William O'Meara, Mahmoud Said Elsayed, Takfarinas Saber, A. Jurcut","doi":"10.1109/ITNAC55475.2022.9998363","DOIUrl":null,"url":null,"abstract":"Machine Learning (ML) based Intrusion Detection Systems (IDSs) have rapidly overtaken other solutions for securing networks. Robust and varied datasets are required to train the ML models to perform this role. The separation of the control plane from the forwarding plane within Software Defined Networks (SDNs) results in differences in network traffic patterns and different potential intrusion vectors when compared to traditional networks. Consequently, SDN specific ML models need to be trained on datasets captured from SDNs, and have the potential to recognise SDN specific attacks in addition to the standard cadre of exploits. When assessing the performance of an ML based IDS, reduction of the incidences of attacks that have been misclassified as normal traffic is of key importance. Therefore, measuring the False Negative Rate (FNR) of a trained model is crucial once high percentiles have been reached across the standard metrics used in ML model assessment. This paper establishes high baseline scores in all key metrics and then focuses on the importance of FNR in the assessment of model performance. In addition, identification of unseen attacks is of paramount importance given the rapid evolution of malicious traffic. A hold out testing strategy is employed to assess each model across a range of unseen attacks. An ensemble of models that compensate for each other's relative weaknesses is proposed to mitigate variability, thus maximising detection of new attacks. The performance of the proposed ensemble is evaluated and demonstrates a clear improvement on the performance of the individual component models.","PeriodicalId":205731,"journal":{"name":"2022 32nd International Telecommunication Networks and Applications Conference (ITNAC)","volume":"83 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 32nd International Telecommunication Networks and Applications Conference (ITNAC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ITNAC55475.2022.9998363","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Machine Learning (ML) based Intrusion Detection Systems (IDSs) have rapidly overtaken other solutions for securing networks. Robust and varied datasets are required to train the ML models to perform this role. The separation of the control plane from the forwarding plane within Software Defined Networks (SDNs) results in differences in network traffic patterns and different potential intrusion vectors when compared to traditional networks. Consequently, SDN specific ML models need to be trained on datasets captured from SDNs, and have the potential to recognise SDN specific attacks in addition to the standard cadre of exploits. When assessing the performance of an ML based IDS, reduction of the incidences of attacks that have been misclassified as normal traffic is of key importance. Therefore, measuring the False Negative Rate (FNR) of a trained model is crucial once high percentiles have been reached across the standard metrics used in ML model assessment. This paper establishes high baseline scores in all key metrics and then focuses on the importance of FNR in the assessment of model performance. In addition, identification of unseen attacks is of paramount importance given the rapid evolution of malicious traffic. A hold out testing strategy is employed to assess each model across a range of unseen attacks. An ensemble of models that compensate for each other's relative weaknesses is proposed to mitigate variability, thus maximising detection of new attacks. The performance of the proposed ensemble is evaluated and demonstrates a clear improvement on the performance of the individual component models.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
SDN入侵检测:一种降低新攻击误报率的集成方法
基于机器学习(ML)的入侵检测系统(ids)已经迅速取代了其他网络安全解决方案。训练机器学习模型来执行这个角色需要健壮和多样的数据集。软件定义网络(sdn)中控制平面与转发平面的分离,导致网络流量模式与传统网络不同,潜在的入侵向量也不同。因此,SDN特定的ML模型需要在从SDN捕获的数据集上进行训练,并且除了标准的漏洞利用骨干之外,还具有识别SDN特定攻击的潜力。在评估基于ML的IDS的性能时,减少被错误分类为正常流量的攻击发生率至关重要。因此,一旦在ML模型评估中使用的标准指标中达到高百分位数,测量训练模型的假阴性率(FNR)至关重要。本文在所有关键指标中建立了高基线分数,然后重点讨论了FNR在评估模型性能中的重要性。此外,鉴于恶意流量的快速演变,识别看不见的攻击至关重要。采用hold out测试策略,在一系列看不见的攻击中评估每个模型。提出了一个相互弥补相对弱点的模型集合,以减轻可变性,从而最大限度地检测新的攻击。对所建议的集成的性能进行了评估,并展示了对单个组件模型性能的明显改进。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Channel Sounding Measurements for 5G Campus Networks in Industrial Environments Implementation and Experimental Evaluation of the Rebalancing Algorithm for Folded Clos Networks Architectural Implementation of AES based 5G Security Protocol on FPGA Attribute Verifier for Internet of Things Artificial Neural Network (ANN)-Aided Signal Demodulation in a SiPM-Based VLC System
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1