Affiliation:
1. School of Computer Science and Engineering, Galgotias University, Dankaur 203201, India
2. Department of CSBS, Rajalakshmi Engineering College, Tamil Nadu 602105, India
3. Associate Dean-Students, Shiv Nadar University, Delhi-NCR Campus, Noida 201305, India
4. Signal Processing for TLC and Economics, University of Roma Tre, 00154 Rome, Italy
Abstract
The proliferation of IoT services has spurred a surge in network attacks, heightening cybersecurity concerns. Essential to network defense, intrusion detection and prevention systems (IDPSs) identify malicious activities, including denial of service (DoS), distributed denial of service (DDoS), botnet, brute force, infiltration, and Heartbleed. This study focuses on leveraging unsupervised learning for training detection models to counter these threats effectively. The proposed method utilizes basic autoencoders (bAEs) for dimensionality reduction and encompasses a three-stage detection model: one-class support vector machine (OCSVM) and deep autoencoder (dAE) attack detection, complemented by density-based spatial clustering of applications with noise (DBSCAN) for attack clustering. Accurately delineated clusters aid in mapping attack tactics. The MITRE ATT&CK framework establishes a “Cyber Threat Repository”, cataloging attacks and tactics, enabling immediate response based on priority. Leveraging preprocessed and unlabeled normal network traffic data, this approach enables the identification of novel attacks while mitigating the impact of imbalanced training data on model performance. The autoencoder method utilizes reconstruction error, OCSVM employs a kernel function to establish a hyperplane for anomaly detection, while DBSCAN employs a density-based approach to identify clusters, manage noise, accommodate diverse shapes, automatically determining cluster count, ensuring scalability, and minimizing false positives and false negatives. Evaluated on standard datasets such as CIC-IDS2017 and CSECIC-IDS2018, the proposed model outperforms existing state of art methods. Our approach achieves accuracies exceeding 98% for the two datasets, thus confirming its efficacy and effectiveness for application in efficient intrusion detection systems.
Reference40 articles.
1. Network Intrusion Detection Combined Hybrid Sampling with Deep Hierarchical Network;Jiang;IEEE Access,2020
2. Gandi, V.P., Jatla, N.S.L., Sadhineni, G., Geddamuri, S., Chaitanya, G.K., and Velmurugan, A.K. (2023, January 23–25). A Comparative Study of AI Algorithms for Anomaly-based Intrusion Detection. Proceedings of the 7th International Conference on Computing Methodologies and Communication, ICCMC 2023, Erode, India.
3. Detecting network attacks model based on a convolutional neural network;Ali;Int. J. Electr. Comput. Eng.,2023
4. Secure Deep Learning in Defense in Deep-Learning-as-a-Service Computing Systems in Digital Twins;Lv;IEEE Trans. Comput.,2024
5. Cyber Threat Intelligence Mining for Proactive Cybersecurity Defense: A Survey and New Perspectives;Sun;IEEE Commun. Surv. Tutor.,2023