Affiliation:
1. Network Engineering & Security Group (NESG), University of Granada, 18012 Granada, Spain
Abstract
With the significant increase in cyber-attacks and attempts to gain unauthorised access to systems and information, Network Intrusion-Detection Systems (NIDSs) have become essential detection tools. Anomaly-based systems use machine learning techniques to distinguish between normal and anomalous traffic. They do this by using training datasets that have been previously gathered and labelled, allowing them to learn to detect anomalies in future data. However, such datasets can be accidentally or deliberately contaminated, compromising the performance of NIDS. This has been the case of the UGR’16 dataset, in which, during the labelling process, botnet-type attacks were not identified in the subset intended for training. This paper addresses the mislabelling problem of real network traffic datasets by introducing a novel methodology that (i) allows analysing the quality of a network traffic dataset by identifying possible hidden or unidentified anomalies and (ii) selects the ideal subset of data to optimise the performance of the anomaly detection model even in the presence of hidden attacks erroneously labelled as normal network traffic. To this end, a two-step process that makes incremental use of the training dataset is proposed. Experiments conducted on the contaminated UGR’16 dataset in conjunction with the state-of-the-art NIDS, Kitsune, conclude with the feasibility of the approach to reveal observations of hidden botnet-based attacks on this dataset.
Reference69 articles.
1. Network intrusion detection system: A systematic study of machine learning and deep learning approaches;Ahmad;Trans. Emerg. Telecommun. Technol.,2021
2. Intrusion detection system: A comprehensive review;Liao;J. Netw. Comput. Appl.,2013
3. Murali, A., and Rao, M. (2005, January 27–28). A Survey on Intrusion Detection Approaches. Proceedings of the 2005 International Conference on Information and Communication Technologies, Karachi, Pakistan.
4. An overview of anomaly detection techniques: Existing solutions and latest technological trends;Patcha;Comput. Netw.,2007
5. Anomaly-based network intrusion detection: Techniques, systems and challenges;Comput. Secur.,2009