Attack vs Benign Network Intrusion Traffic Classification

05/15/2022
by   M. Andrecut, et al.
0

Intrusion detection systems (IDS) are used to monitor networks or systems for attack activity or policy violations. Such a system should be able to successfully identify anomalous deviations from normal traffic behavior. Here we discuss the machine learning approach to building an anomaly-based IDS using the CSE-CIC-IDS2018 dataset. Since the publication of this dataset a relatively large number of papers have been published, most of them presenting IDS architectures and results based on complex machine learning methods, like deep neural networks, gradient boosting classifiers, or hidden Markov models. Here we show that similar results can be obtained using a very simple nearest neighbor classification approach, avoiding the inherent complications of training such complex models. The advantages of the nearest neighbor algorithm are: (1) it is very simple to implement; (2) it is extremely robust; (3) it has no parameters, and therefore it cannot overfit the data. This result also shows that currently there is a trend of developing over-engineered solutions in the machine learning community. Such solutions are based on complex methods, like deep learning neural networks, without even considering baseline solutions corresponding to simple, but efficient methods.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
05/27/2021

Intrusion Detection using Machine Learning Techniques: An Experimental Comparison

Due to an exponential increase in the number of cyber-attacks, the need ...
research
05/22/2022

A review on Deep Neural Network for Computer Network Traffic Classification

Focus on Deep Neural Network based malicious and normal computer Network...
research
02/03/2021

Nearest Neighbor-based Importance Weighting

Importance weighting is widely applicable in machine learning in general...
research
10/16/2019

A new method for flow-based network intrusion detection using inverse statistical physics

Network Intrusion Detection Systems (NIDS) play an important role as too...
research
05/30/2021

Evaluating Resilience of Encrypted Traffic Classification Against Adversarial Evasion Attacks

Machine learning and deep learning algorithms can be used to classify en...
research
05/16/2018

Towards Explaining Anomalies: A Deep Taylor Decomposition of One-Class Models

A common machine learning task is to discriminate between normal and ano...
research
06/25/2020

Fast, Accurate, and Simple Models for Tabular Data via Augmented Distillation

Automated machine learning (AutoML) can produce complex model ensembles ...

Please sign up or login with your details

Forgot password? Click here to reset