FlowADGAN : Adversarial Learning for Deep Anomaly Network Intrusion Detection
Research output: Chapters, Conference Papers, Creative and Literary Works (RGC: 12, 32, 41, 45) › 32_Refereed conference paper (with host publication) › peer-review
Author(s)
Related Research Unit(s)
Detail(s)
Original language | English |
---|---|
Title of host publication | Security and Trust Management |
Subtitle of host publication | 18th International Workshop, STM 2022, Proceedings |
Editors | Gabriele Lenzini, Weizhi Meng |
Publisher | Springer, Cham |
Pages | 156-174 |
Edition | 1 |
ISBN (Electronic) | 978-3-031-29504-1 |
ISBN (Print) | 978-3-031-29503-4 |
Publication status | Published - 2023 |
Publication series
Name | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) |
---|---|
Volume | 13867 LNCS |
ISSN (Print) | 0302-9743 |
ISSN (Electronic) | 1611-3349 |
Conference
Title | 18th International Workshop on Security and Trust Management, STM 2022, co-located with the 27th European Symposium on Research in Computer Security, ESORICS 2022 |
---|---|
Place | Denmark |
City | Copenhagen |
Period | 29 September 2022 |
Link(s)
Abstract
Due to the increasingly evolved attacks on the Internet, especially IoT, 5G, and vehicle networking, a robust Network Intrusion Detection System (NIDS) has gained increasing attention from academic and industrial communities. Anomaly-based intrusion detection algorithms aim to detect unexpected deviations in the expected network behaviour, thus detecting unknown or novel attacks compared to signature-based methods. Deep Anomaly Detection (DAD) technologies have attracted much attention for their ability to detect unknown attacks without manually building the traffic behaviours profile. However, low recall rates and high dependencies on data labels still hinder the development of DAD technologies. Inspired by the successes of Generative Adversarial Networks (GANs) for detecting anomalies in the area of Computer Vision and Images, we have proposed a deep end-to-end architecture called FlowADGAN for detecting anomalies in NIDS. Unlike traditional GAN-based NIDS methods that usually construct Generator (G) and Discriminator (D) based on vanilla GAN, the proposed architecture is composed of a flow encoder-decoder-encoder for G, and a flow encoder for D. FlowADGAN can learn a latent flow feature space of G so that the latent space better captures the normality underlying the network traffic data. We conduct several experimental comparisons with existing machine learning algorithms like One-Class SVM, LOF, and PCA and existing deep learning methods, including AutoEncoder and VAE, on three public datasets, NSL-KDD CICIDS2017 and UNSW-NB15. The evaluation results show that FlowADGAN can significantly improve the performance of the anomaly-based NIDS. © 2023, The Author(s), under exclusive license to Springer Nature Switzerland AG.
Research Area(s)
- Anomaly detection, Generative adversarial network, Intrusion detection system, Unsupervised learning
Citation Format(s)
FlowADGAN: Adversarial Learning for Deep Anomaly Network Intrusion Detection. / Wang, Pan; Li, Zeyi; Zhou, Xiaokang et al.
Security and Trust Management: 18th International Workshop, STM 2022, Proceedings. ed. / Gabriele Lenzini; Weizhi Meng. 1. ed. Springer, Cham, 2023. p. 156-174 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 13867 LNCS).
Security and Trust Management: 18th International Workshop, STM 2022, Proceedings. ed. / Gabriele Lenzini; Weizhi Meng. 1. ed. Springer, Cham, 2023. p. 156-174 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 13867 LNCS).
Research output: Chapters, Conference Papers, Creative and Literary Works (RGC: 12, 32, 41, 45) › 32_Refereed conference paper (with host publication) › peer-review