FlowADGAN : Adversarial Learning for Deep Anomaly Network Intrusion Detection

Research output: Chapters, Conference Papers, Creative and Literary Works (RGC: 12, 32, 41, 45)32_Refereed conference paper (with host publication)peer-review

View graph of relations

Author(s)

Related Research Unit(s)

Detail(s)

Original languageEnglish
Title of host publicationSecurity and Trust Management
Subtitle of host publication18th International Workshop, STM 2022, Proceedings
EditorsGabriele Lenzini, Weizhi Meng
PublisherSpringer, Cham
Pages156-174
Edition1
ISBN (Electronic)978-3-031-29504-1
ISBN (Print)978-3-031-29503-4
Publication statusPublished - 2023

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume13867 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Title18th International Workshop on Security and Trust Management, STM 2022, co-located with the 27th European Symposium on Research in Computer Security, ESORICS 2022
PlaceDenmark
CityCopenhagen
Period29 September 2022

Abstract

Due to the increasingly evolved attacks on the Internet, especially IoT, 5G, and vehicle networking, a robust Network Intrusion Detection System (NIDS) has gained increasing attention from academic and industrial communities. Anomaly-based intrusion detection algorithms aim to detect unexpected deviations in the expected network behaviour, thus detecting unknown or novel attacks compared to signature-based methods. Deep Anomaly Detection (DAD) technologies have attracted much attention for their ability to detect unknown attacks without manually building the traffic behaviours profile. However, low recall rates and high dependencies on data labels still hinder the development of DAD technologies. Inspired by the successes of Generative Adversarial Networks (GANs) for detecting anomalies in the area of Computer Vision and Images, we have proposed a deep end-to-end architecture called FlowADGAN for detecting anomalies in NIDS. Unlike traditional GAN-based NIDS methods that usually construct Generator (G) and Discriminator (D) based on vanilla GAN, the proposed architecture is composed of a flow encoder-decoder-encoder for G, and a flow encoder for D. FlowADGAN can learn a latent flow feature space of G so that the latent space better captures the normality underlying the network traffic data. We conduct several experimental comparisons with existing machine learning algorithms like One-Class SVM, LOF, and PCA and existing deep learning methods, including AutoEncoder and VAE, on three public datasets, NSL-KDD CICIDS2017 and UNSW-NB15. The evaluation results show that FlowADGAN can significantly improve the performance of the anomaly-based NIDS. © 2023, The Author(s), under exclusive license to Springer Nature Switzerland AG.

Research Area(s)

  • Anomaly detection, Generative adversarial network, Intrusion detection system, Unsupervised learning

Citation Format(s)

FlowADGAN: Adversarial Learning for Deep Anomaly Network Intrusion Detection. / Wang, Pan; Li, Zeyi; Zhou, Xiaokang et al.
Security and Trust Management: 18th International Workshop, STM 2022, Proceedings. ed. / Gabriele Lenzini; Weizhi Meng. 1. ed. Springer, Cham, 2023. p. 156-174 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 13867 LNCS).

Research output: Chapters, Conference Papers, Creative and Literary Works (RGC: 12, 32, 41, 45)32_Refereed conference paper (with host publication)peer-review