Affiliation:
1. Faculty of Information Technology, Macau University of Science and Technology, Macau, China
2. Guangdong Polytechnic of Science and Technology, Zhuhai, China
Abstract
With successful machine learning applications in many fields, researchers tried to introduce machine learning into intrusion detection systems for building classification models. Although experimental results showed that these classification models could produce higher accuracy in predicting network attacks on the offline datasets, compared with the operational intrusion detection systems, machine learning is rarely deployed in the real intrusion detection environment. This is what we call the last mile problem with the machine learning approach to network intrusion detection, the discrepancy between the strength and requirements of machine learning and network operational semantics. In this paper, we aim to bridge the aforementioned gap. In particular, an LCC-RF-RFEX feature selection approach is proposed to select optimal features of the specific type of attacks from dataset, and then, an intrusion-specific approach is introduced to convert them into detection patterns that can be used by the nonmachine-learning detector for the corresponding specific attack detection in the real-world network environment. To substantiate our approach, we take Snort, KDDCup’99 dataset, and Dos attacks as the experimental subjects to demonstrate how to close the last-mile gap. For the specific type of Dos attacks in the KDDCup’99 dataset, we use the LCC-RF-RFEX method to select optimal feature subset and utilize our intrusion-specific approach to generate new rules in Snort by using them. Comparing performance differences between the existing Snort rule set and our augmented Snort rule set with regard to Dos attacks, the experimental results showed that our approach expanded Snort’s detection capability of Dos attacks, on average, reduced up to 25.28% false-positive alerts for Teardrop attacks and Synflood attacks, and decreased up to 98.87% excessive alerts for Mail bomb attacks.
Funder
Macau Science and Technology Foundation
Subject
Computer Networks and Communications,Information Systems
Reference70 articles.
1. Signature-based intrusion detection system using SNORT;V. Kumar;Int.J.Comput.ppl.Inf.Technol,2012
2. Outside the Closed World: On Using Machine Learning for Network Intrusion Detection
3. Intelligent feature selection and classification techniques for intrusion detection in networks: a survey
4. Survey of current network intrusion detection techniques;R. Srivastava;Journal of Information Engineering and Applications,2013
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Bridging Automated Reasoning and Machine Learning for Information Analysis;2023 2nd International Conference on Futuristic Technologies (INCOFT);2023-11-24
2. A Maximal Information Coefficient-based Feature Selection Method for Intrusion Detection;Proceedings of the 8th International Conference on Cyber Security and Information Engineering;2023-09-22