[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
You seem to have javascript disabled. Please note that many of the page functionalities won't work as expected without javascript enabled.
 
 
Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

Search Results (25)

Search Parameters:
Keywords = ML-NIDS

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
21 pages, 533 KiB  
Article
A Systematic Study of Adversarial Attacks Against Network Intrusion Detection Systems
by Sanidhya Sharma and Zesheng Chen
Electronics 2024, 13(24), 5030; https://doi.org/10.3390/electronics13245030 - 21 Dec 2024
Viewed by 769
Abstract
Network Intrusion Detection Systems (NIDSs) are vital for safeguarding Internet of Things (IoT) networks from malicious attacks. Modern NIDSs utilize Machine Learning (ML) techniques to combat evolving threats. This study systematically examined adversarial attacks originating from the image domain against ML-based NIDSs, while [...] Read more.
Network Intrusion Detection Systems (NIDSs) are vital for safeguarding Internet of Things (IoT) networks from malicious attacks. Modern NIDSs utilize Machine Learning (ML) techniques to combat evolving threats. This study systematically examined adversarial attacks originating from the image domain against ML-based NIDSs, while incorporating a diverse selection of ML models. Specifically, we evaluated both white-box and black-box attacks on nine commonly used ML-based NIDS models. We analyzed the Projected Gradient Descent (PGD) attack, which uses gradient descent on input features, transfer attacks, the score-based Zeroth-Order Optimization (ZOO) attack, and two decision-based attacks: Boundary and HopSkipJump. Using the NSL-KDD dataset, we assessed the accuracy of the ML models under attack and the success rate of the adversarial attacks. Our findings revealed that the black-box decision-based attacks were highly effective against most of the ML models, achieving an attack success rate exceeding 86% across eight models. Additionally, while the Logistic Regression and Multilayer Perceptron models were highly susceptible to all the attacks studied, the instance-based ML models, such as KNN and Label Spreading, exhibited resistance to these attacks. These insights will contribute to the development of more robust NIDSs against adversarial attacks in IoT environments. Full article
(This article belongs to the Special Issue Advancing Security and Privacy in the Internet of Things)
Show Figures

Figure 1

Figure 1
<p>Proportion of benign and malicious packets in NSL-KDD training and test datasets.</p>
Full article ">Figure 2
<p>The detection accuracy of the LGR<sub><span class="html-italic">s</span></sub> model under adversarial attacks with different perturbation budgets <math display="inline"><semantics> <mi>ε</mi> </semantics></math>.</p>
Full article ">Figure 3
<p>The <math display="inline"><semantics> <msub> <mi>L</mi> <mn>2</mn> </msub> </semantics></math> and <math display="inline"><semantics> <msub> <mi>L</mi> <mo>∞</mo> </msub> </semantics></math> of adversarial examples with different perturbation budgets <math display="inline"><semantics> <mi>ε</mi> </semantics></math> against the LGR<sub><span class="html-italic">s</span></sub> model.</p>
Full article ">Figure 4
<p>The detection accuracy of the MLP<sub><span class="html-italic">s</span></sub> model under adversarial attacks with different perturbation budgets <math display="inline"><semantics> <mi>ε</mi> </semantics></math>.</p>
Full article ">Figure 5
<p>The <math display="inline"><semantics> <msub> <mi>L</mi> <mn>2</mn> </msub> </semantics></math> and <math display="inline"><semantics> <msub> <mi>L</mi> <mo>∞</mo> </msub> </semantics></math> of adversarial examples with different perturbation budgets <math display="inline"><semantics> <mi>ε</mi> </semantics></math> against the MLP<sub><span class="html-italic">s</span></sub> model.</p>
Full article ">
20 pages, 2810 KiB  
Article
A Comprehensive Security Framework for Asymmetrical IoT Network Environments to Monitor and Classify Cyberattack via Machine Learning
by Ali Alqahtani, Abdulaziz A. Alsulami, Nayef Alqahtani, Badraddin Alturki and Bandar M. Alghamdi
Symmetry 2024, 16(9), 1121; https://doi.org/10.3390/sym16091121 - 29 Aug 2024
Viewed by 1096
Abstract
The Internet of Things (IoT) is an important component of the smart environment, which produces a large volume of data that is considered challenging to handle. In addition, the IoT architecture is vulnerable to many cyberattacks that can target operational devices. Therefore, there [...] Read more.
The Internet of Things (IoT) is an important component of the smart environment, which produces a large volume of data that is considered challenging to handle. In addition, the IoT architecture is vulnerable to many cyberattacks that can target operational devices. Therefore, there is a need for monitoring IoT traffic to analyze, detect malicious activity, and classify cyberattack types. This research proposes a security framework to monitor asymmetrical network traffic in an IoT environment. The framework offers a network intrusion detection system (NIDS) to detect and classify cyberattacks, implemented using a machine learning (ML) model residing in the middleware layer of the IoT architecture. A dimensionality reduction technique known as principal component analysis (PCA) is utilized to facilitate data transmission, which is intended to be sent from the middleware layer to the cloud layer with reduced complexity and fewer unnecessary inputs without compromising the information content. Therefore, the reduced IoT traffic data are sent to the cloud and the PCA data are retransformed to approximate the original data for visualizing the IoT traffic. The NIDS is responsible for reporting the attack type to the cloud in the event of an attack. Our findings indicate that the proposed framework has promising results in classifying the attack type, which achieved a classification accuracy of 98%. In addition, the dimension of the IoT traffic data is reduced by around 50% and it has a similarity of around 90% compared to the original data. Full article
(This article belongs to the Section Computer)
Show Figures

Figure 1

Figure 1
<p>IoT general architecture.</p>
Full article ">Figure 2
<p>The proposed IoT security framework.</p>
Full article ">Figure 3
<p>Original dataset distribution.</p>
Full article ">Figure 4
<p>Randomly selected samples from original dataset.</p>
Full article ">Figure 5
<p>Procedure for computing PCs.</p>
Full article ">Figure 6
<p>Similarity calculation.</p>
Full article ">Figure 7
<p>Test accuracy.</p>
Full article ">Figure 8
<p>ThingSpeak dashboard.</p>
Full article ">
19 pages, 4613 KiB  
Article
Impacting Robustness in Deep Learning-Based NIDS through Poisoning Attacks
by Shahad Alahmed, Qutaiba Alasad, Jiann-Shiun Yuan and Mohammed Alawad
Algorithms 2024, 17(4), 155; https://doi.org/10.3390/a17040155 - 11 Apr 2024
Cited by 1 | Viewed by 1678
Abstract
The rapid expansion and pervasive reach of the internet in recent years have raised concerns about evolving and adaptable online threats, particularly with the extensive integration of Machine Learning (ML) systems into our daily routines. These systems are increasingly becoming targets of malicious [...] Read more.
The rapid expansion and pervasive reach of the internet in recent years have raised concerns about evolving and adaptable online threats, particularly with the extensive integration of Machine Learning (ML) systems into our daily routines. These systems are increasingly becoming targets of malicious attacks that seek to distort their functionality through the concept of poisoning. Such attacks aim to warp the intended operations of these services, deviating them from their true purpose. Poisoning renders systems susceptible to unauthorized access, enabling illicit users to masquerade as legitimate ones, compromising the integrity of smart technology-based systems like Network Intrusion Detection Systems (NIDSs). Therefore, it is necessary to continue working on studying the resilience of deep learning network systems while there are poisoning attacks, specifically interfering with the integrity of data conveyed over networks. This paper explores the resilience of deep learning (DL)—based NIDSs against untethered white-box attacks. More specifically, it introduces a designed poisoning attack technique geared especially for deep learning by adding various amounts of altered instances into training datasets at diverse rates and then investigating the attack’s influence on model performance. We observe that increasing injection rates (from 1% to 50%) and random amplified distribution have slightly affected the overall performance of the system, which is represented by accuracy (0.93) at the end of the experiments. However, the rest of the results related to the other measures, such as PPV (0.082), FPR (0.29), and MSE (0.67), indicate that the data manipulation poisoning attacks impact the deep learning model. These findings shed light on the vulnerability of DL-based NIDS under poisoning attacks, emphasizing the significance of securing such systems against these sophisticated threats, for which defense techniques should be considered. Our analysis, supported by experimental results, shows that the generated poisoned data have significantly impacted the model performance and are hard to be detected. Full article
Show Figures

Figure 1

Figure 1
<p>The architecture of our proposed technique.</p>
Full article ">Figure 2
<p>The correlations between features based Pearson method.</p>
Full article ">Figure 3
<p>DL accuracy curve on clean data.</p>
Full article ">Figure 4
<p>DL loss curve on clean data.</p>
Full article ">Figure 5
<p>DL accuracy curve—case 1 (1000 training samples).</p>
Full article ">Figure 6
<p>DL accuracy curve -case 2 (5000 training samples).</p>
Full article ">Figure 7
<p>DL accuracy curve-case 3 (10,000 training samples).</p>
Full article ">Figure 8
<p>DL loss curve-case 1.</p>
Full article ">Figure 9
<p>DL loss curve-case 2.</p>
Full article ">Figure 10
<p>DL loss curve-case 3.</p>
Full article ">Figure 11
<p>Accuracy curve for supported case.</p>
Full article ">Figure 12
<p>Loss curve for supported case.</p>
Full article ">
19 pages, 802 KiB  
Review
Securing Mobile Edge Computing Using Hybrid Deep Learning Method
by Olusola Adeniyi, Ali Safaa Sadiq, Prashant Pillai, Mohammad Aljaidi and Omprakash Kaiwartya
Computers 2024, 13(1), 25; https://doi.org/10.3390/computers13010025 - 16 Jan 2024
Cited by 8 | Viewed by 3034
Abstract
In recent years, Mobile Edge Computing (MEC) has revolutionized the landscape of the telecommunication industry by offering low-latency, high-bandwidth, and real-time processing. With this advancement comes a broad range of security challenges, the most prominent of which is Distributed Denial of Service (DDoS) [...] Read more.
In recent years, Mobile Edge Computing (MEC) has revolutionized the landscape of the telecommunication industry by offering low-latency, high-bandwidth, and real-time processing. With this advancement comes a broad range of security challenges, the most prominent of which is Distributed Denial of Service (DDoS) attacks, which threaten the availability and performance of MEC’s services. In most cases, Intrusion Detection Systems (IDSs), a security tool that monitors networks and systems for suspicious activity and notify administrators in real time of potential cyber threats, have relied on shallow Machine Learning (ML) models that are limited in their abilities to identify and mitigate DDoS attacks. This article highlights the drawbacks of current IDS solutions, primarily their reliance on shallow ML techniques, and proposes a novel hybrid Autoencoder–Multi-Layer Perceptron (AE–MLP) model for intrusion detection as a solution against DDoS attacks in the MEC environment. The proposed hybrid AE–MLP model leverages autoencoders’ feature extraction capabilities to capture intricate patterns and anomalies within network traffic data. This extracted knowledge is then fed into a Multi-Layer Perceptron (MLP) network, enabling deep learning techniques to further analyze and classify potential threats. By integrating both AE and MLP, the hybrid model achieves higher accuracy and robustness in identifying DDoS attacks while minimizing false positives. As a result of extensive experiments using the recently released NF-UQ-NIDS-V2 dataset, which contains a wide range of DDoS attacks, our results demonstrate that the proposed hybrid AE–MLP model achieves a high accuracy of 99.98%. Based on the results, the hybrid approach performs better than several similar techniques. Full article
Show Figures

Figure 1

Figure 1
<p>Confusion matrix result.</p>
Full article ">Figure 2
<p>Feature importance result.</p>
Full article ">Figure 3
<p>Feature importance results using SHAP.</p>
Full article ">Figure 4
<p>Mean absolute value to determine feature importance.</p>
Full article ">Figure 5
<p>Feature impact on model’s output.</p>
Full article ">Figure 6
<p>A representation of the hybrid AE–MLP architecture.</p>
Full article ">Figure 7
<p>Result of the hybrid Autoencoder–Multi-Layer Perceptron (AE–MLP) model train and test split.</p>
Full article ">Figure 8
<p>Time taken for hybrid Autoencoder–Multi-Layer Perceptron (AE–MLP) model.</p>
Full article ">Figure 9
<p>Comparison between Long Short-Term Memory (LSTM), Gated Recurrent Units (GRU), and the hybrid Autoencoder–Multi-Layer Perceptron (AE–MLP) model.</p>
Full article ">Figure 10
<p>Hybrid Autoencoder–Multi-Layer Perceptron (AE–MLP) model comparison with Multi-Layer Perceptron (MLP).</p>
Full article ">Figure 11
<p>Feature hybrid Autoencoder–Multi-Layer Perceptron (AE–MLP) model comparison with Multi-Layer Perceptron (MLP).</p>
Full article ">
26 pages, 843 KiB  
Article
Enhancing Network Intrusion Detection Using an Ensemble Voting Classifier for Internet of Things
by Ashfaq Hussain Farooqi, Shahzaib Akhtar, Hameedur Rahman, Touseef Sadiq and Waseem Abbass
Sensors 2024, 24(1), 127; https://doi.org/10.3390/s24010127 - 26 Dec 2023
Cited by 5 | Viewed by 3038
Abstract
In the context of 6G technology, the Internet of Everything aims to create a vast network that connects both humans and devices across multiple dimensions. The integration of smart healthcare, agriculture, transportation, and homes is incredibly appealing, as it allows people to effortlessly [...] Read more.
In the context of 6G technology, the Internet of Everything aims to create a vast network that connects both humans and devices across multiple dimensions. The integration of smart healthcare, agriculture, transportation, and homes is incredibly appealing, as it allows people to effortlessly control their environment through touch or voice commands. Consequently, with the increase in Internet connectivity, the security risk also rises. However, the future is centered on a six-fold increase in connectivity, necessitating the development of stronger security measures to handle the rapidly expanding concept of IoT-enabled metaverse connections. Various types of attacks, often orchestrated using botnets, pose a threat to the performance of IoT-enabled networks. Detecting anomalies within these networks is crucial for safeguarding applications from potentially disastrous consequences. The voting classifier is a machine learning (ML) model known for its effectiveness as it capitalizes on the strengths of individual ML models and has the potential to improve overall predictive performance. In this research, we proposed a novel classification technique based on the DRX approach that combines the advantages of the Decision tree, Random forest, and XGBoost algorithms. This ensemble voting classifier significantly enhances the accuracy and precision of network intrusion detection systems. Our experiments were conducted using the NSL-KDD, UNSW-NB15, and CIC-IDS2017 datasets. The findings of our study show that the DRX-based technique works better than the others. It achieved a higher accuracy of 99.88% on the NSL-KDD dataset, 99.93% on the UNSW-NB15 dataset, and 99.98% on the CIC-IDS2017 dataset, outperforming the other methods. Additionally, there is a notable reduction in the false positive rates to 0.003, 0.001, and 0.00012 for the NSL-KDD, UNSW-NB15, and CIC-IDS2017 datasets. Full article
(This article belongs to the Section Internet of Things)
Show Figures

Figure 1

Figure 1
<p>Security requirements for the IoT-enabled cloud platform.</p>
Full article ">Figure 2
<p>Architecture diagram of NIDS in IoT-enabled cloud platform.</p>
Full article ">Figure 3
<p>Proposed ML-based NIDS technique using ensemble voting classifier.</p>
Full article ">Figure 4
<p>Confusion matrix for the train data of the NSL-KDD dataset.</p>
Full article ">Figure 5
<p>Confusion matrix for the test data of the NSL-KDD dataset.</p>
Full article ">Figure 6
<p>Average analysis of the DRX technique on the train dataset.</p>
Full article ">Figure 7
<p>Average analysis of the DRX classifier using test dataset.</p>
Full article ">
22 pages, 5604 KiB  
Article
Evaluating Ensemble Learning Mechanisms for Predicting Advanced Cyber Attacks
by Faeiz Alserhani and Alaa Aljared
Appl. Sci. 2023, 13(24), 13310; https://doi.org/10.3390/app132413310 - 16 Dec 2023
Cited by 2 | Viewed by 3025
Abstract
With the increased sophistication of cyber-attacks, there is a greater demand for effective network intrusion detection systems (NIDS) to protect against various threats. Traditional NIDS are incapable of detecting modern and sophisticated attacks due to the fact that they rely on pattern-matching models [...] Read more.
With the increased sophistication of cyber-attacks, there is a greater demand for effective network intrusion detection systems (NIDS) to protect against various threats. Traditional NIDS are incapable of detecting modern and sophisticated attacks due to the fact that they rely on pattern-matching models or simple activity analysis. Moreover, Intelligent NIDS based on Machine Learning (ML) models are still in the early stages and often exhibit low accuracy and high false positives, making them ineffective in detecting emerging cyber-attacks. On the other hand, improved detection and prediction frameworks provided by ensemble algorithms have demonstrated impressive outcomes in specific applications. In this research, we investigate the potential of ensemble models in the enhancement of NIDS functionalities in order to provide a reliable and intelligent security defense. We present a NIDS hybrid model that uses ensemble ML techniques to identify and prevent various intrusions more successfully than stand-alone approaches. A combination of several distinct machine learning methods is integrated into a hybrid framework. The UNSW-NB15 dataset is pre-processed, and its features are engineered prior to being used to train and evaluate the proposed model structure. The performance evaluation of the ensemble of various ML classifiers demonstrates that the proposed system outperforms individual model approaches. Using all the employed experimental combination forms, the designed model significantly enhances the detection accuracy attaining more than 99%, while false positives are reduced to less than 1%. Full article
Show Figures

Figure 1

Figure 1
<p>Research Methodology.</p>
Full article ">Figure 2
<p>The proposed Model Process.</p>
Full article ">Figure 3
<p>Ensemble Learning Mechanisms (Bagging, Boosting, and Stacking).</p>
Full article ">Figure 4
<p>Class Distribution training and testing data.</p>
Full article ">Figure 5
<p>Features Heatmap.</p>
Full article ">Figure 6
<p>Correlated Features: (<b>a</b>) Line only, (<b>b</b>) Line with scattered points.</p>
Full article ">Figure 7
<p>Density function of ‘ct_dst_ltm’ feature.</p>
Full article ">Figure 8
<p>Density function of ‘ct_flw_http’ feature.</p>
Full article ">Figure 9
<p>Performance Metrics. (<b>a</b>) False Positive Rates-Individual Algorithms, (<b>b</b>) Precision vs. Recall-Individual Algorithms, (<b>c</b>) False Positive Rates-Ensemble Model, (<b>d</b>) Precision vs. Recall-Ensemble Model.</p>
Full article ">Figure 10
<p>Confusion Matrices of Ensemble Mechanisms.</p>
Full article ">
17 pages, 4772 KiB  
Article
Design of Network Intrusion Detection System Using Lion Optimization-Based Feature Selection with Deep Learning Model
by Rayed AlGhamdi
Mathematics 2023, 11(22), 4607; https://doi.org/10.3390/math11224607 - 10 Nov 2023
Cited by 5 | Viewed by 1415
Abstract
In the domain of network security, intrusion detection systems (IDSs) play a vital role in data security. While the utilization of the internet amongst consumers is increasing on a daily basis, the significance of security and privacy preservation of system alerts, due to [...] Read more.
In the domain of network security, intrusion detection systems (IDSs) play a vital role in data security. While the utilization of the internet amongst consumers is increasing on a daily basis, the significance of security and privacy preservation of system alerts, due to malicious actions, is also increasing. IDS is a widely executed system that protects computer networks from attacks. For the identification of unknown attacks and anomalies, several Machine Learning (ML) approaches such as Neural Networks (NNs) are explored. However, in real-world applications, the classification performances of these approaches are fluctuant with distinct databases. The major reason for this drawback is the presence of some ineffective or redundant features. So, the current study proposes the Network Intrusion Detection System using a Lion Optimization Feature Selection with a Deep Learning (NIDS-LOFSDL) approach to remedy the aforementioned issue. The NIDS-LOFSDL technique follows the concept of FS with a hyperparameter-tuned DL model for the recognition of intrusions. For the purpose of FS, the NIDS-LOFSDL method uses the LOFS technique, which helps in improving the classification results. Furthermore, the attention-based bi-directional long short-term memory (ABiLSTM) system is applied for intrusion detection. In order to enhance the intrusion detection performance of the ABiLSTM algorithm, the gorilla troops optimizer (GTO) is deployed so as to perform hyperparameter tuning. Since trial-and-error manual hyperparameter tuning is a tedious process, the GTO-based hyperparameter tuning process is performed, which demonstrates the novelty of the work. In order to validate the enhanced solution of the NIDS-LOFSDL system in terms of intrusion detection, a comprehensive range of experiments was performed. The simulation values confirm the promising results of the NIDS-LOFSDL system compared to existing DL methodologies, with a maximum accuracy of 96.88% and 96.92% on UNSW-NB15 and AWID datasets, respectively. Full article
(This article belongs to the Special Issue Analytical Frameworks and Methods for Cybersecurity)
Show Figures

Figure 1

Figure 1
<p>Overall process of the NIDS-LOFSDL algorithm.</p>
Full article ">Figure 2
<p>Flowchart of the LO algorithm.</p>
Full article ">Figure 3
<p>UNSW-NB15 dataset. (<b>a</b>,<b>b</b>) Confusion matrices, (<b>c</b>) PR_curve, and (<b>d</b>) ROC.</p>
Full article ">Figure 4
<p>Average values of the NIDS-LOFSDL technique applied to the UNSW-NB15 database.</p>
Full article ">Figure 5
<p><math display="inline"><semantics> <mrow> <mi>A</mi> <mi>c</mi> <mi>c</mi> <msub> <mrow> <mi>u</mi> </mrow> <mrow> <mi>y</mi> </mrow> </msub> </mrow> </semantics></math> curve of the NIDS-LOFSDL technique on the UNSW-NB15 database.</p>
Full article ">Figure 6
<p>Loss curve of the NIDS-LOFSDL technique on the UNSW-NB15 database.</p>
Full article ">Figure 7
<p>AWID dataset: (<b>a</b>,<b>b</b>) Confusion matrices, (<b>c</b>) PR_curve, and (<b>d</b>) ROC.</p>
Full article ">Figure 8
<p>Average values of the NIDS-LOFSDL technique on the AWID dataset.</p>
Full article ">Figure 9
<p><math display="inline"><semantics> <mrow> <mi>A</mi> <mi>c</mi> <mi>c</mi> <msub> <mrow> <mi>u</mi> </mrow> <mrow> <mi>y</mi> </mrow> </msub> </mrow> </semantics></math> curve of the NIDS-LOFSDL technique on the AWID dataset.</p>
Full article ">Figure 10
<p>Loss curve of the NIDS-LOFSDL technique on the AWID dataset.</p>
Full article ">Figure 11
<p>Comparative analysis outcomes of the NIDS-LOFSDL algorithm and other methodologies.</p>
Full article ">
25 pages, 433 KiB  
Review
On the Robustness of ML-Based Network Intrusion Detection Systems: An Adversarial and Distribution Shift Perspective
by Minxiao Wang, Ning Yang, Dulaj H. Gunasinghe and Ning Weng
Computers 2023, 12(10), 209; https://doi.org/10.3390/computers12100209 - 17 Oct 2023
Cited by 5 | Viewed by 3806
Abstract
Utilizing machine learning (ML)-based approaches for network intrusion detection systems (NIDSs) raises valid concerns due to the inherent susceptibility of current ML models to various threats. Of particular concern are two significant threats associated with ML: adversarial attacks and distribution shifts. Although there [...] Read more.
Utilizing machine learning (ML)-based approaches for network intrusion detection systems (NIDSs) raises valid concerns due to the inherent susceptibility of current ML models to various threats. Of particular concern are two significant threats associated with ML: adversarial attacks and distribution shifts. Although there has been a growing emphasis on researching the robustness of ML, current studies primarily concentrate on addressing specific challenges individually. These studies tend to target a particular aspect of robustness and propose innovative techniques to enhance that specific aspect. However, as a capability to respond to unexpected situations, the robustness of ML should be comprehensively built and maintained in every stage. In this paper, we aim to link the varying efforts throughout the whole ML workflow to guide the design of ML-based NIDSs with systematic robustness. Toward this goal, we conduct a methodical evaluation of the progress made thus far in enhancing the robustness of the targeted NIDS application task. Specifically, we delve into the robustness aspects of ML-based NIDSs against adversarial attacks and distribution shift scenarios. For each perspective, we organize the literature in robustness-related challenges and technical solutions based on the ML workflow. For instance, we introduce some advanced potential solutions that can improve robustness, such as data augmentation, contrastive learning, and robustness certification. According to our survey, we identify and discuss the ML robustness research gaps and future direction in the field of NIDS. Finally, we highlight that building and patching robustness throughout the life cycle of an ML-based NIDS is critical. Full article
(This article belongs to the Special Issue Big Data Analytic for Cyber Crime Investigation and Prevention 2023)
Show Figures

Figure 1

Figure 1
<p>The concepts related to ML robustness. The red arrows refer to the negative correlation between the two concepts and the green arrow refers to the positive correlation.</p>
Full article ">Figure 2
<p>Taxonomy of the robustness study topics for ML-based NIDSs with topics grouped by their machine learning workflow stage. Two main robustness challenges, adversarial attacks and distribution shifts, encompass both the challenge and solution aspects.</p>
Full article ">
23 pages, 637 KiB  
Article
Recursive Feature Elimination with Cross-Validation with Decision Tree: Feature Selection Method for Machine Learning-Based Intrusion Detection Systems
by Mohammed Awad and Salam Fraihat
J. Sens. Actuator Netw. 2023, 12(5), 67; https://doi.org/10.3390/jsan12050067 - 18 Sep 2023
Cited by 34 | Viewed by 6240
Abstract
The frequency of cyber-attacks on the Internet of Things (IoT) networks has significantly increased in recent years. Anomaly-based network intrusion detection systems (NIDSs) offer an additional layer of network protection by detecting and reporting the infamous zero-day attacks. However, the efficiency of real-time [...] Read more.
The frequency of cyber-attacks on the Internet of Things (IoT) networks has significantly increased in recent years. Anomaly-based network intrusion detection systems (NIDSs) offer an additional layer of network protection by detecting and reporting the infamous zero-day attacks. However, the efficiency of real-time detection systems relies on several factors, including the number of features utilized to make a prediction. Thus, minimizing them is crucial as it implies faster prediction and lower storage space. This paper utilizes recursive feature elimination with cross-validation using a decision tree model as an estimator (DT-RFECV) to select an optimal subset of 15 of UNSW-NB15’s 42 features and evaluates them using several ML classifiers, including tree-based ones, such as random forest. The proposed NIDS exhibits an accurate prediction model for network flow with a binary classification accuracy of 95.30% compared to 95.56% when using the entire feature set. The reported scores are comparable to those attained by the state-of-the-art systems despite decreasing the number of utilized features by about 65%. Full article
Show Figures

Figure 1

Figure 1
<p>The proposed system architecture.</p>
Full article ">Figure 2
<p>Relationship between the classification score and the number of selected features using recursive feature elimination using cross-validation with a DT classifier as the estimator. Each line plot represents a different cross-validation fold, with k-fold set to 10.</p>
Full article ">Figure 3
<p>The accuracies of all machine learning models using the original dataset (39 features) and the selected features dataset (15 features).</p>
Full article ">Figure 4
<p>Fit time of all machine learning models on the Original dataset and on the Selected Features dataset.</p>
Full article ">Figure 5
<p>Ranking of feature importance using random forest classifier for the original UNSW-NB15 dataset with 39 features (in orange and blue). The orange bars represent the 15 features selected by DT-RFECV algorithm, with the number beside each bar indicating the feature’s rank.</p>
Full article ">Figure 6
<p>Ranking of feature importance using random forest classifier for the UNSW-NB1 dataset with the 15 features selected using RFECV with decision tree estimator model.</p>
Full article ">
18 pages, 603 KiB  
Article
SGAN-IDS: Self-Attention-Based Generative Adversarial Network against Intrusion Detection Systems
by Sahar Aldhaheri and Abeer Alhuzali
Sensors 2023, 23(18), 7796; https://doi.org/10.3390/s23187796 - 11 Sep 2023
Cited by 9 | Viewed by 3116
Abstract
In cybersecurity, a network intrusion detection system (NIDS) is a critical component in networks. It monitors network traffic and flags suspicious activities. To effectively detect malicious traffic, several detection techniques, including machine learning-based NIDSs (ML-NIDSs), have been proposed and implemented. However, in much [...] Read more.
In cybersecurity, a network intrusion detection system (NIDS) is a critical component in networks. It monitors network traffic and flags suspicious activities. To effectively detect malicious traffic, several detection techniques, including machine learning-based NIDSs (ML-NIDSs), have been proposed and implemented. However, in much of the existing ML-NIDS research, the experimental settings do not accurately reflect real-world scenarios where new attacks are constantly emerging. Thus, the robustness of intrusion detection systems against zero-day and adversarial attacks is a crucial area that requires further investigation. In this paper, we introduce and develop a framework named SGAN-IDS. This framework constructs adversarial attack flows designed to evade detection by five BlackBox ML-based IDSs. SGAN-IDS employs generative adversarial networks and self-attention mechanisms to generate synthetic adversarial attack flows that are resilient to detection. Our evaluation results demonstrate that SGAN-IDS has successfully constructed adversarial flows for various attack types, reducing the detection rate of all five IDSs by an average of 15.93%. These findings underscore the robustness and broad applicability of the proposed model. Full article
(This article belongs to the Section Internet of Things)
Show Figures

Figure 1

Figure 1
<p>Architecture of the generative adversarial network (GAN).</p>
Full article ">Figure 2
<p>Self-Attention operation is presented graphically.</p>
Full article ">Figure 3
<p>The architecture of the SGAN-IDS.</p>
Full article ">Figure 4
<p>Design of the generator.</p>
Full article ">Figure 5
<p>Design of the discriminator.</p>
Full article ">Figure 6
<p>Design of the multi-head self-attention model.</p>
Full article ">
17 pages, 1160 KiB  
Article
Machine Learning for Network Intrusion Detection—A Comparative Study
by Mustafa Al Lail, Alejandro Garcia and Saul Olivo
Future Internet 2023, 15(7), 243; https://doi.org/10.3390/fi15070243 - 16 Jul 2023
Cited by 14 | Viewed by 5649
Abstract
Modern society has quickly evolved to utilize communication and data-sharing media with the advent of the internet and electronic technologies. However, these technologies have created new opportunities for attackers to gain access to confidential electronic resources. As a result, data breaches have significantly [...] Read more.
Modern society has quickly evolved to utilize communication and data-sharing media with the advent of the internet and electronic technologies. However, these technologies have created new opportunities for attackers to gain access to confidential electronic resources. As a result, data breaches have significantly impacted our society in multiple ways. To mitigate this situation, researchers have developed multiple security countermeasure techniques known as Network Intrusion Detection Systems (NIDS). Despite these techniques, attackers have developed new strategies to gain unauthorized access to resources. In this work, we propose using machine learning (ML) to develop a NIDS system capable of detecting modern attack types with a very high detection rate. To this end, we implement and evaluate several ML algorithms and compare their effectiveness using a state-of-the-art dataset containing modern attack types. The results show that the random forest model outperforms other models, with a detection rate of modern network attacks of 97 percent. This study shows that not only is accurate prediction possible but also a high detection rate of attacks can be achieved. These results indicate that ML has the potential to create very effective NIDS systems. Full article
(This article belongs to the Special Issue Anomaly Detection in Modern Networks)
Show Figures

Figure 1

Figure 1
<p>Graphical representations of used ML algorithms.</p>
Full article ">Figure 2
<p>Methodology.</p>
Full article ">Figure 3
<p>Models’ performance as confusion matrices. The classes are denoted as follows: Benign → 0, DoS → 1, Port Scan → 2, Bot → 3, Infiltration → 4, Web Attack → 5, Brute Force → 6.</p>
Full article ">Figure 4
<p>Results as classification reports. The classes are denoted as follows: Benign → 1, DoS → 2, Port Scan → 3, Bot → 4, Infiltration → 5, Web Attack → 6, Brute Force → 7.</p>
Full article ">Figure 5
<p>Models’ performance as precision–recall curves (PRC). The classes are denoted as follows: Benign → 1, DoS → 2, Port Scan → 3, Bot → 4, Infiltration → 5, Web Attack → 6, Brute Force → 7.</p>
Full article ">Figure 6
<p>Summary of the results.</p>
Full article ">
20 pages, 4173 KiB  
Article
Investigation of the Shear Behavior of Concrete Beams Reinforced with FRP Rebars and Stirrups Using ANN Hybridized with Genetic Algorithm
by Bo Di, Renyuan Qin, Yu Zheng and Jiamei Lv
Polymers 2023, 15(13), 2857; https://doi.org/10.3390/polym15132857 - 28 Jun 2023
Cited by 3 | Viewed by 1649
Abstract
The shear strength prediction of concrete beams reinforced with FRP rebars and stirrups is one of the most complicated issues in structural engineering applications. Numerous experimental and theoretical studies have been conducted to establish a relationship between the shear capacity and the design [...] Read more.
The shear strength prediction of concrete beams reinforced with FRP rebars and stirrups is one of the most complicated issues in structural engineering applications. Numerous experimental and theoretical studies have been conducted to establish a relationship between the shear capacity and the design variables. However, existing semi-empirical models fail to deliver precise predictions due to the intricate nature of shear mechanisms. To provide a more accurate and reliable model, machine learning (ML) techniques are adopted to study the shear behavior of concrete beams reinforced with FRP rebars and stirrups. A database consisting of 120 tested specimens is compiled from the reported literature. An artificial neural network (ANN) and a combination of ANN with a genetic optimization algorithm (GA-ANN) are implemented for the development of an ML model. Through neural interpretation diagrams (NID), the critical design factors, i.e., beam width and effective depth, shear span-to-depth ratio, compressive strength of concrete, FRP longitudinal reinforcement ratio, FRP shear reinforcement ratio, and elastic modulus of FRP longitudinal reinforcement rebars and FRP stirrups, are identified and determined as input parameters of the models. The accuracy of the proposed models has been verified by comparing the model predictions with the available test results. The application of the GA-ANN model provides better statistical results (mean value Vexp/Vpre equal to 0.99, R2 of 0.91, and RMSE of 22.6 kN) and outperforms CSA S806-12 predictions by improving the R2 value by 18.2% and the RMSE value by 52.5%. Furthermore, special attention is paid to the coupling effects of design parameters on shear capacity, which has not been reasonably considered in the models in the literature and available design guidelines. Finally, an ML-regression equation considering the coupling effects is developed based on the data-driven regression analysis method. The analytical results revealed that the prediction agrees with the test results with reasonable accuracy, and the model can be effectively applied in the prediction of shear capacity of concrete beams reinforced with FRP bars and stirrups. Full article
(This article belongs to the Special Issue Structural Application of Fiber Reinforced Polymer Composites)
Show Figures

Figure 1

Figure 1
<p>Schematic diagram of concrete beam reinforced with FRP rebars and stirrups.</p>
Full article ">Figure 2
<p>Frequency distribution of the variables in the experimental database.</p>
Full article ">Figure 3
<p>Schematic diagram of artificial neural and NN structure.</p>
Full article ">Figure 4
<p>Flowchart of the genetic algorithm-optimized neural network.</p>
Full article ">Figure 5
<p>NID and old–style histogram for ANN with all the independent parameters.</p>
Full article ">Figure 6
<p>Learning rate parameter determination.</p>
Full article ">Figure 7
<p>Schematic diagram of the proposed neural network model.</p>
Full article ">Figure 8
<p>Training results of each neural network model.</p>
Full article ">Figure 9
<p>Comparison of shear capacity from the test and predicted results.</p>
Full article ">Figure 10
<p>Coupling effects between the parameters on shear capacity of FRP-RC beams.</p>
Full article ">Figure 11
<p>Determination of design parameters for the shear performance of FRP-RC beam.</p>
Full article ">Figure 12
<p>Comparison of prediction accuracy of proposed model and existing design codes.</p>
Full article ">
19 pages, 691 KiB  
Article
Securing a Smart Home with a Transformer-Based IoT Intrusion Detection System
by Minxiao Wang, Ning Yang and Ning Weng
Electronics 2023, 12(9), 2100; https://doi.org/10.3390/electronics12092100 - 4 May 2023
Cited by 21 | Viewed by 4494
Abstract
Machine learning (ML)-based Network Intrusion Detection Systems (NIDSs) can classify each network’s flow behavior as benign or malicious by detecting heterogeneous features, including both categorical and numerical features. However, the present ML-based NIDSs are deemed insufficient in terms of their ability to generalize, [...] Read more.
Machine learning (ML)-based Network Intrusion Detection Systems (NIDSs) can classify each network’s flow behavior as benign or malicious by detecting heterogeneous features, including both categorical and numerical features. However, the present ML-based NIDSs are deemed insufficient in terms of their ability to generalize, particularly in changing network environments such as the Internet of Things (IoT)-based smart home. Although IoT devices add so much to home comforts, they also introduce potential risks and vulnerabilities. Recently, many NIDS studies on other IoT scenarios, such as the Internet of Vehicles (IoV) and smart cities, focus on utilizing the telemetry data of IoT devices for IoT intrusion detection. Because when IoT devices are under attack, their abnormal telemetry data values can reflect the anomaly state of those devices. Those telemetry data-based IoT NIDS methods detect intrusion events from a different view, focusing on the attack impact, from the traditional network traffic-based NIDS, which focuses on analyzing attack behavior. The telemetry data-based NIDS is more suitable for IoT devices without built-in security mechanisms. Considering the smart home IoT scenario, which has a smaller scope and a limited number of IoT devices compared to other IoT scenarios, both NIDS views can work independently. This motivated us to propose a novel ML-based NIDS to combine the network traffic-based and telemetry data-based NIDS together. In this paper, we propose a Transformer-based IoT NIDS method to learn the behaviors and effects of attacks from different types of data that are generated in the heterogeneous IoT environment. The proposed method utilizes a self-attention mechanism to learn contextual embeddings for input network features. Based on the contextual embeddings, our method can solve the feature set challenge, including both continuous and categorical features. Our method is the first to utilize both network traffic data and IoT sensors’ telemetry data at the same time for intrusion detection. Experiments reveal the effectiveness of our method on a realistic network traffic intrusion detection dataset named ToN_IoT, with an accuracy of 97.95% for binary classification and 95.78% for multiple classifications on pure network data. With the extra IoT information, the performance of our method has been improved to 98.39% and 97.06%, respectively. A comparative study with existing works shows that our method can achieve state-of-the-art performance on the ToN_IoT dataset. Full article
(This article belongs to the Special Issue Network Intrusion Detection Using Deep Learning)
Show Figures

Figure 1

Figure 1
<p>An example smart home scenario. The smart home gateway consists of the functions of both NIDS and the middleware server of IoTs. The smart home intranet block represents the communications of IoT services publish/subscribe through MQTT and HTTP protocols, respectively. The NIDS monitors all network traffic and all IoT devices’ telemetry values, which are obtained from the middleware.</p>
Full article ">Figure 2
<p>The overview of the proposed workflow for intrusion classification in an IoT network.</p>
Full article ">Figure 3
<p>The overview of the proposed FT-Transformer-based NIDS model. The model consists of a Feature Tokenizer, <span class="html-italic">N</span> Transformer encoders, and an MLP layer for classification. The core module of the Transformer is the multiple head attention layers, which are zoomed in.</p>
Full article ">Figure 4
<p>Confusion matrix for binary classification performance on pure network data.</p>
Full article ">Figure 5
<p>Confusion matrix for multiple classes on pure network data.</p>
Full article ">Figure 6
<p>Confusion matrix for binary classification performance on the combination of network and IoT data.</p>
Full article ">Figure 7
<p>Confusion matrix for multiple classes on network and IoT data.</p>
Full article ">Figure 8
<p>Attention-based feature importance of binary classification on pure network data.</p>
Full article ">Figure 9
<p>Attention-based feature importance of binary classification on the combined data.</p>
Full article ">
17 pages, 2842 KiB  
Article
Integrated Feature-Based Network Intrusion Detection System Using Incremental Feature Generation
by Taehoon Kim and Wooguil Pak
Electronics 2023, 12(7), 1657; https://doi.org/10.3390/electronics12071657 - 31 Mar 2023
Viewed by 1691
Abstract
Machine learning (ML)-based network intrusion detection systems (NIDSs) depend entirely on the performance of machine learning models. Therefore, many studies have been conducted to improve the performance of ML models. Nevertheless, relatively few studies have focused on the feature set, which significantly affects [...] Read more.
Machine learning (ML)-based network intrusion detection systems (NIDSs) depend entirely on the performance of machine learning models. Therefore, many studies have been conducted to improve the performance of ML models. Nevertheless, relatively few studies have focused on the feature set, which significantly affects the performance of ML models. In addition, features are generated by analyzing data collected after the session ends, which requires a significant amount of memory and a long processing time. To solve this problem, this study presents a new session feature set to improve the existing NIDSs. Current session-feature-based NIDSs are largely classified into NIDSs using a single-host feature set and NIDSs using a multi-host feature set. This research merges two different session feature sets into an integrated feature set, which is used to train an ML model for the NIDS. In addition, an incremental feature generation approach is proposed to eliminate the delay between the session end time and the integrated feature creation time. The improved performance of the NIDS using integrated features was confirmed through experiments. Compared to a NIDS based on ML models using existing single-host feature sets and multi-host feature sets, the NIDS with the proposed integrated feature set improves the detection rate by 4.15% and 5.9% on average, respectively. Full article
(This article belongs to the Special Issue AI in Cybersecurity)
Show Figures

Figure 1

Figure 1
<p>IFG block diagram for single-host feature creation.</p>
Full article ">Figure 2
<p>Process of generating packet features used in HAST-IDS.</p>
Full article ">Figure 3
<p>Block diagram for incremental generating integrated features from data traffic.</p>
Full article ">Figure 4
<p>Examples of two queues and corresponding session entry structures. The circular queue contains three sessions while the linear queue contains two sessions.</p>
Full article ">Figure 5
<p>Four hashes to maintain statistics needed to generate multi-host session features in real-time. The blue and red colors represent values associated with sessions stored in the linear queue and the circular queue, respectively.</p>
Full article ">Figure 6
<p>Detection rates in F1-score for machine learning models, according to each feature set.</p>
Full article ">Figure 7
<p>Performance metrics for machine learning models, according to each feature set.</p>
Full article ">Figure 8
<p>Each algorithm’s relative training and testing time according to each feature set. (<b>a</b>) Training time. (<b>b</b>) Testing time.</p>
Full article ">
20 pages, 9223 KiB  
Article
A Marine Hydrographic Station Networks Intrusion Detection Method Based on LCVAE and CNN-BiLSTM
by Tianhao Hou, Hongyan Xing, Xinyi Liang, Xin Su and Zenghui Wang
J. Mar. Sci. Eng. 2023, 11(1), 221; https://doi.org/10.3390/jmse11010221 - 14 Jan 2023
Cited by 8 | Viewed by 2065
Abstract
Marine sensors are highly vulnerable to illegal access network attacks. Moreover, the nation’s meteorological and hydrological information is at ever-increasing risk, which calls for a prompt and in depth analysis of the network behavior and traffic to detect network attacks. Network attacks are [...] Read more.
Marine sensors are highly vulnerable to illegal access network attacks. Moreover, the nation’s meteorological and hydrological information is at ever-increasing risk, which calls for a prompt and in depth analysis of the network behavior and traffic to detect network attacks. Network attacks are becoming more diverse, with a large number of rare and even unknown types of attacks appearing. This results in traditional-machine-learning (ML)-based network intrusion detection (NID) methods performing weakly due to the lack of training samples. This paper proposes an NID method combining the log-cosh conditional variational autoencoder (LCVAE) with convolutional the bi-directional long short-term memory neural network (LCVAE-CBiLSTM) based on deep learning (DL). It can generate virtual samples with specific labels and extract more significant attack features from the monitored traffic data. A reconstructed loss term based on the log-cosh model is introduced into the conditional autoencoder. From it, the virtual samples are able to inherit the discrete attack data and enhance the potential features of the imbalance attack type. Then, a hybrid feature extraction model is proposed by combining the CNN and BiLSTM to tackle the attack’s spatial and temporal features. The following experiments evaluated the proposed method’s performance on the NSL-KDD dataset. The results demonstrated that the LCVAE-CBiLSTM obtained better results than state-of-the-art works, where the accuracy, F1-score, recall, and FAR were 87.30%, 87.89%, 80.89%, and 4.36%. The LCVAE-CBiLSTM effectively improves the detection rate of a few classes of samples and enhances the NID performance. Full article
(This article belongs to the Section Ocean Engineering)
Show Figures

Figure 1

Figure 1
<p>Overall framework of the LCVAE-CBiLSTM.</p>
Full article ">Figure 2
<p>Flow chart of the LCVAE-CBiLSTM method.</p>
Full article ">Figure 3
<p>A typical VAE model.</p>
Full article ">Figure 4
<p>Images of log−cosh and <math display="inline"><semantics> <msub> <mi>L</mi> <mn>2</mn> </msub> </semantics></math> functions.</p>
Full article ">Figure 5
<p>BiLSTM network structure model.</p>
Full article ">Figure 6
<p>The CNN-BiLSTM feature extraction model.</p>
Full article ">Figure 7
<p>Effect of different LCVAE structures on detection.</p>
Full article ">Figure 8
<p>The percentage of different types of samples in the training set.</p>
Full article ">Figure 9
<p>T−SNE visualization of before and after LCVAE encoding results in KDDTrain+.</p>
Full article ">Figure 10
<p>Hydrological sensor experiment platform.</p>
Full article ">
Back to TopTop