skip to main content
10.1145/2676585.2676618acmotherconferencesArticle/Chapter ViewAbstractPublication PagessoictConference Proceedingsconference-collections
research-article

Generating artificial attack data for intrusion detection using machine learning

Published:04 December 2014Publication History

ABSTRACT

Intrusion detection based upon machine learning is currently attracting considerable interests from the research community. One of the appealing properties of machine learning based intrusion detection systems is their ability to detect new and unknown attacks. In order to apply machine learning to intrusion detection, a large number of both attack and normal data samples need to be collected. While, it is often easier to sample benign data based on the normal behaviors of networks, intrusive data is much more scarce, therefore more difficult to collect. In this paper, we propose a novel solution to this problem by generating artificial attack data for intrusion detection based on machine learning techniques. Various machine learning techniques are used to evaluate the effectiveness of the generated data and the results show that the data set of synthetic attack data combining with normal one can help machine learning methods to achieve good performance on intrusion detection problem.

References

  1. M. S. Abadeh, J. Habibi, Z. Barzegar, and M. Sergi. A parallel genetic local search algorithm for intrusion detection in computer networks. Eng. Appl. of AI, 20(8): 1058--1069, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. C. C. Aggarwal. Outlier Analysis. Springer, 2013. Google ScholarGoogle ScholarCross RefCross Ref
  3. H. B. Barlow. Unsupervised learning. Neural Computation, 1: 295--311, 1989. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. F. Bergadano. Machine learning and the foundations of inductive inference. Minds and Machines, 3(1): 31--51, 1993.Google ScholarGoogle ScholarCross RefCross Ref
  5. V. L. Cao, V. T. Hoang, and Q. U. Nguyen. A scheme for building a dataset for intrusion detection systems. In the 2013 Third World Congress on Information and Communication Technologies, pages 120--132, Hanoi-Vietnam, 2013. IEEE.Google ScholarGoogle ScholarCross RefCross Ref
  6. W.-H. Chen, S.-H. Hsu, and H.-P. Shen. Application of SVM and ANN for intrusion detection. Computers & OR, 32: 2617--2634, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Y. Chen, A. Abraham, and B. Y. 0001. Hybrid flexible neural-tree-based intrusion detection systems. Int. J. Intell. Syst, 22(4): 337--352, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. N. Cristianini and J. Shawe-Taylor. An introduction to Support Vector Machines. Cambridge University Press, Mar. 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. S. Das. Elements of artificial neural networks. IEEE Transactions on Neural Networks, 9(1): 234--235, Jan. 1998. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. D. E. Denning. An intrusion-detection model. IEEE Transactions on Software Engineering, 13(2): 222--232, Feb. 1987. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. W. Fan, M. Miller, S. Stolfo, W. Lee, and P. Chan. Using artificial anomalies to detect unknown and known network intrusions. In Proceedings of ICDM01, pages 123--248, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. S. Garcia and F. Herrera. Evolutionary undersampling for classification with imbalanced datasets: Proposals and taxonomy. Evolutionary Computation, 17(3): 275--306, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. G. Giacinto, R. Perdisci, M. D. Rio, and F. Roli. Intrusion detection in computer networks by a modular ensemble of one-class classifiers. Information Fusion, 9(1): 69--82, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. R. Givan, S. Leach, and T. Dean. Bounded-parameter Markov decision processes. Artificial Intelligence, 122(1-2): 71--109, 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. D. Heckerman. Tutorial on learning in bayesian networks. Technical Report MSR-TR-95-06, Microsoft, 1995.Google ScholarGoogle Scholar
  16. N. Intrator. On the combination of supervised and unsupervised learning. Physica A, pages 655--661, 1993.Google ScholarGoogle ScholarCross RefCross Ref
  17. W. Lee, S. Stolfo, and K. Mok. A data mining framework for building intrusion detection models. In Proceedings of the 1999 IEEE Symposium on Security and Privacy (SSP '99), pages 120--132, Washington - Brussels - Tokyo, 1999. IEEE.Google ScholarGoogle Scholar
  18. W. Lee and S. J. Stolfo. A framework for constructing features and models for intrusion detection systems. ACM Trans. Inf. Syst. Secur, 3(4): 227--261, 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Y. Li and L. Guo. An active learning based TCM-KNN algorithm for supervised network intrusion detection. Computers & Security, 26(7-8): 459--467, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Y. Liu, K. Chen, X. Liao, and W. Zhang. A genetic clustering method for intrusion detection. Pattern Recognition, 37(5): 927--942, 2004.Google ScholarGoogle ScholarCross RefCross Ref
  21. T. Mitchell. Machine Learning. McGraw-Hill, 1997. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. S. Mukkamala, A. H. Sung, and A. Abraham. Intrusion detection using an ensemble of intelligent paradigms. J. Network and Computer Applications, 28(2): 167--182, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Quinlan. Learning decision tree classifiers. CSURV: Computing Surveys, 28, 1996. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. J. R. Quinlan. C4.5: Programs for Machine Learning. Morgan Kaufmann, San Mateo, CA, 1993. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. K. Shafi and H. A. Abbass. Evaluation of an adaptive genetic-based signature extraction system for network intrusion detection. Pattern Anal. Appl, 16(4): 549--566, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. C.-F. Tsai, Y.-F. Hsu, C.-Y. Lin, and W.-Y. Lin. Intrusion detection by machine learning: A review. Expert Systems with Applications, 36(10): 11994--12000, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. V. Vapnik. Statistical Learning Theory. Wiley, 1998.Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. I. H. Witten and E. Frank. Data Mining: Practical Machine Learning Tools and Techniques. Morgan Kaufmann, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. S. X. Wu and W. Banzhaf. The use of computational intelligence in intrusion detection systems: A review. Appl. Soft Comput, 10(1): 1--35, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. H. Zhang. The optimality of naive bayes. 17th International FLAIRS conference, Miami Beach, May, pages 17--19, 2004.Google ScholarGoogle Scholar

Recommendations

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in
  • Published in

    cover image ACM Other conferences
    SoICT '14: Proceedings of the 5th Symposium on Information and Communication Technology
    December 2014
    304 pages
    ISBN:9781450329309
    DOI:10.1145/2676585

    Copyright © 2014 ACM

    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    • Published: 4 December 2014

    Permissions

    Request permissions about this article.

    Request Permissions

    Check for updates

    Qualifiers

    • research-article

    Acceptance Rates

    Overall Acceptance Rate147of318submissions,46%

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader