Network Intrusion Detection using Supervised and Unsupervised Machine Learning

Lala Shahbandayeva, Ulviyya Mammadzada, Ilaha Manafova, Sevinj Jafarli, A. Adamov
{"title":"Network Intrusion Detection using Supervised and Unsupervised Machine Learning","authors":"Lala Shahbandayeva, Ulviyya Mammadzada, Ilaha Manafova, Sevinj Jafarli, A. Adamov","doi":"10.1109/AICT55583.2022.10013594","DOIUrl":null,"url":null,"abstract":"Traditional intrusion detection systems may effectively detect known attacks and intrusions with predefined signatures. This requires training the systems to detect various versions of the same attack patterns and constantly keep updated databases of known attack signatures. However, as the skills of security researchers and practitioners expand, so do those of attackers. In order to detect attack types that are unknown, undefined, or designed to bypass the signature and pattern-based intrusion detection systems, the need for more intelligent systems arises. Machine learning is widely used in such systems for this purpose. While researchers and security professionals have designed approaches to this problem using various types of machine learning, our hybrid approach attempts to provide a novel way to effectively detect attacks. This is done by using a set of supervised learning algorithms to detect known attacks and unsupervised learning to detect unknown and zero-day attacks. By utilizing the CSE-CIC-IDS 2018 dataset, we have trained our classifiers to detect benign traffic and 14 known attacks with a selection of 23 features. The network traffic flows that are not classified with a specific level of certainty are sent to the clustering phase to be detected as benign or malicious traffic. Our results indicate that the three classification algorithms used, K-Nearest Neighbors, Random Forest, and Artificial Neural Networks, are able to successfully classify the known attacks with F1-scores between 0.93 and 0.969, and the clustering algorithm HDBSCAN is able to successfully cluster unclassified benign and malicious traffic with unknown labels with F1-scores between 0.85 and 0.957.","PeriodicalId":441475,"journal":{"name":"2022 IEEE 16th International Conference on Application of Information and Communication Technologies (AICT)","volume":"16 4 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-10-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 IEEE 16th International Conference on Application of Information and Communication Technologies (AICT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/AICT55583.2022.10013594","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Traditional intrusion detection systems may effectively detect known attacks and intrusions with predefined signatures. This requires training the systems to detect various versions of the same attack patterns and constantly keep updated databases of known attack signatures. However, as the skills of security researchers and practitioners expand, so do those of attackers. In order to detect attack types that are unknown, undefined, or designed to bypass the signature and pattern-based intrusion detection systems, the need for more intelligent systems arises. Machine learning is widely used in such systems for this purpose. While researchers and security professionals have designed approaches to this problem using various types of machine learning, our hybrid approach attempts to provide a novel way to effectively detect attacks. This is done by using a set of supervised learning algorithms to detect known attacks and unsupervised learning to detect unknown and zero-day attacks. By utilizing the CSE-CIC-IDS 2018 dataset, we have trained our classifiers to detect benign traffic and 14 known attacks with a selection of 23 features. The network traffic flows that are not classified with a specific level of certainty are sent to the clustering phase to be detected as benign or malicious traffic. Our results indicate that the three classification algorithms used, K-Nearest Neighbors, Random Forest, and Artificial Neural Networks, are able to successfully classify the known attacks with F1-scores between 0.93 and 0.969, and the clustering algorithm HDBSCAN is able to successfully cluster unclassified benign and malicious traffic with unknown labels with F1-scores between 0.85 and 0.957.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
使用监督和无监督机器学习的网络入侵检测
传统的入侵检测系统可以有效地检测已知的攻击和预定义签名的入侵。这需要训练系统来检测相同攻击模式的不同版本,并不断更新已知攻击签名的数据库。然而,随着安全研究人员和从业人员的技能不断提高,攻击者的技能也在不断提高。为了检测未知的、未定义的或旨在绕过基于签名和模式的入侵检测系统的攻击类型,需要更智能的系统。机器学习被广泛应用于这类系统中。虽然研究人员和安全专业人员已经使用各种类型的机器学习设计了解决这个问题的方法,但我们的混合方法试图提供一种有效检测攻击的新方法。这是通过使用一组监督学习算法来检测已知攻击和使用一组无监督学习来检测未知攻击和零日攻击来完成的。通过使用CSE-CIC-IDS 2018数据集,我们训练了分类器来检测良性流量和14种已知攻击,并选择了23个特征。未按特定确定级别进行分类的网络流量被发送到集群阶段,以检测为良性或恶意流量。结果表明,k近邻、随机森林和人工神经网络三种分类算法能够成功地对f1得分在0.93 ~ 0.969之间的已知攻击进行分类,聚类算法HDBSCAN能够成功地对f1得分在0.85 ~ 0.957之间的未知标签的未分类良性和恶意流量进行聚类。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Developing Voice Chatbot for Learning Maritime English Automated detection of myocardial infarction using ECG-based artificial intelligence models: a systematic review An Ontological Approach to the Development of Analytical Platform Language Toolkits Anomaly Detection in Cyber-Physical Systems based on BiGRU-VAE Interference Resistant Position Awareness for Collision Avoidance in Dense Drones Swarming
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1