Anomaly detection optimization using big data and deep learning to reduce false-positive

09/28/2022
by   Khloud Al Jallad, et al.
0

Anomaly-based Intrusion Detection System (IDS) has been a hot research topic because of its ability to detect new threats rather than only memorized signatures threats of signature-based IDS. Especially after the availability of advanced technologies that increase the number of hacking tools and increase the risk impact of an attack. The problem of any anomaly-based model is its high false-positive rate. The high false-positive rate is the reason why anomaly IDS is not commonly applied in practice. Because anomaly-based models classify an unseen pattern as a threat where it may be normal but not included in the training dataset. This type of problem is called overfitting where the model is not able to generalize. Optimizing Anomaly-based models by having a big training dataset that includes all possible normal cases may be an optimal solution but could not be applied in practice. Although we can increase the number of training samples to include much more normal cases, still we need a model that has more ability to generalize. In this research paper, we propose applying deep model instead of traditional models because it has more ability to generalize. Thus, we will obtain less false-positive by using big data and deep model. We made a comparison between machine learning and deep learning algorithms in the optimization of anomaly-based IDS by decreasing the false-positive rate. We did an experiment on the NSL-KDD benchmark and compared our results with one of the best used classifiers in traditional learning in IDS optimization. The experiment shows 10 learning instead of traditional learning.

READ FULL TEXT

page 1

page 10

research
09/28/2022

Big data analysis and distributed deep learning for next-generation intrusion detection system optimization

With the growing use of information technology in all life domains, hack...
research
04/14/2021

Defending against Adversarial Denial-of-Service Attacks

Data poisoning is one of the most relevant security threats against mach...
research
11/02/2018

An Anomaly-based Botnet Detection Approach for Identifying Stealthy Botnets

Botnets (networks of compromised computers) are often used for malicious...
research
05/08/2023

Is AUC the best measure for practical comparison of anomaly detectors?

The area under receiver operating characteristics (AUC) is the standard ...
research
08/26/2022

Automated False Positive Filtering for esNetwork Alerts

An Intrusion Detection System (IDS) is one of the security tools that ca...
research
04/14/2019

Should I Raise The Red Flag? A comprehensive survey of anomaly scoring methods toward mitigating false alarms

A general Intrusion Detection System (IDS) fundamentally acts based on a...

Please sign up or login with your details

Forgot password? Click here to reset