Pub Date : 2024-06-24DOI: 10.1109/TMLCN.2024.3418756
Ulya Sabeel;Shahram Shah Heydari;Khalil El-Khatib;Khalid Elgazzar
AI-based Network Intrusion Detection Systems (NIDS) provide effective mechanisms for cybersecurity analysts to gain insights and thwart several network attacks. Although current IDS can identify known/typical attacks with high accuracy, current research shows that such systems perform poorly when facing atypical and dynamically changing (polymorphic) attacks. In this paper, we focus on improving detection capability of the IDS for atypical and polymorphic network attacks. Our system generates adversarial polymorphic attacks against the IDS to examine its performance and incrementally retrains it to strengthen its detection of new attacks, specifically for minority attack samples in the input data. The employed attack quality analysis ensures that the adversarial atypical/polymorphic attacks generated through our system resemble original network attacks. We showcase the high performance of the IDS that we have proposed by training it using the CICIDS2017 and CICIoT2023 benchmark datasets and evaluating its performance against several atypical/polymorphic attack flows. The results indicate that the proposed technique, through adaptive training, learns the pattern of dynamically changing atypical/polymorphic attacks, identifies such attacks with approximately 90% balanced accuracy for most of the cases, and surpasses various state-of-the-art detection and class balancing techniques.
{"title":"Incremental Adversarial Learning for Polymorphic Attack Detection","authors":"Ulya Sabeel;Shahram Shah Heydari;Khalil El-Khatib;Khalid Elgazzar","doi":"10.1109/TMLCN.2024.3418756","DOIUrl":"https://doi.org/10.1109/TMLCN.2024.3418756","url":null,"abstract":"AI-based Network Intrusion Detection Systems (NIDS) provide effective mechanisms for cybersecurity analysts to gain insights and thwart several network attacks. Although current IDS can identify known/typical attacks with high accuracy, current research shows that such systems perform poorly when facing atypical and dynamically changing (polymorphic) attacks. In this paper, we focus on improving detection capability of the IDS for atypical and polymorphic network attacks. Our system generates adversarial polymorphic attacks against the IDS to examine its performance and incrementally retrains it to strengthen its detection of new attacks, specifically for minority attack samples in the input data. The employed attack quality analysis ensures that the adversarial atypical/polymorphic attacks generated through our system resemble original network attacks. We showcase the high performance of the IDS that we have proposed by training it using the CICIDS2017 and CICIoT2023 benchmark datasets and evaluating its performance against several atypical/polymorphic attack flows. The results indicate that the proposed technique, through adaptive training, learns the pattern of dynamically changing atypical/polymorphic attacks, identifies such attacks with approximately 90% balanced accuracy for most of the cases, and surpasses various state-of-the-art detection and class balancing techniques.","PeriodicalId":100641,"journal":{"name":"IEEE Transactions on Machine Learning in Communications and Networking","volume":"2 ","pages":"869-887"},"PeriodicalIF":0.0,"publicationDate":"2024-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10570491","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141494827","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-06-24DOI: 10.1109/TMLCN.2024.3418748
Guo Hao Thng;Said Mikki
In recent years, the research involving the use of machine learning in the field of communication networks have shown promising results, in particular, improving receiver sensitivity against noise and link impairment. The proposal of analog radio-over-fiber fronthaul solutions simplifies the overall base station configuration by generating wireless signals at the desired transmission frequency, directly after photodiode heterodyne detection, without requiring additional frequency upconversion components. However, analog radio-over-fiber signals is more susceptible to nonlinear distortions originating from the optical transmission system. This paper explores the use of machine learning in an analog radio-over-fiber link, improving receiver sensitivity in the presence of phase noise. The machine learning algorithm is implemented at the receiver. To evaluate the feasibility of the proposed machine learning based phase noise correction approach, software simulations were conducted to collect data needed for machine leanring algorithm training. Initial findings suggests that the proposed machine-learning-based receiver’s can perform close to conventional heterodyned-based receivers in terms of detection accuracy, exhibiting great tolerance against phase-induced noise, with a symbol error rate improvement from $10^{-2}$