Abstract
Nowadays, Intrusion Detection Systems (IDSs) are becoming more and more effective since they can benefit from the flexibility offered by Machine Learning (ML) techniques. In this work we investigate the potentiality of the Weightless Neural Networks (WNNs) as a classification method of network attacks. Traditionally, WNNs have been exploited in the image classification field and are implemented through the WiSARD algorithm. Interestingly, our analysis reveals that, applied to the IDS realm, WNNs offer surprising results in terms of performance/time complexity trade-off with respect to other ML-based techniques. The experimental assessment is carried on by considering one of the most updated datasets (CIC-IDS) in the field of the intrusion detection, where two exemplary attacks to be detected are considered: Distributed Denial of Service (DDoS) and PortScan.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Di Mauro, M., Di Sarno, C.: Improving SIEM capabilities through an enhanced probe for encrypted Skype traffic detection. J. Inf. Secur. Appl. 38, 85–95 (2018)
Di Mauro, M., Di Sarno, C.: A framework for internet data real-time processing: a machine-learning approach. In: 2014 International Carnahan Conference on Security Technology (ICCST), pp. 1–6 (2014)
Di Mauro, M., Longo, M.: Revealing encrypted WebRTC traffic via machine learning tools. In: 2015 12th International Joint Conference on e-Business and Telecommunications (ICETE), vol. 04, pp. 259–266 (2015)
Di Mauro, M., Longo, M.: Skype traffic detection: a decision theory based tool. In: 2014 International Carnahan Conference on Security Technology (ICCST), pp. 1–6 (2014)
Addesso, P., Cirillo, M., Di Mauro, M., Matta, V.: ADVoIP: adversarial detection of encrypted and concealed VoIP. IEEE Trans. Inf. Forensics Secur. 15, 943–958 (2020)
Matta, V., Di Mauro, M., Longo, M., Farina, A.: Cyber-threat mitigation exploiting the birthâĂŞdeathâĂŞimmigration model. IEEE Trans. Inf. Forensics Secur. 13(12), 3137–3152 (2018)
Addesso, P., Barni, M., Di Mauro, M., Matta, V.: Adversarial kendallâĂŹs model towards containment of distributed cyber-threats. IEEE Trans. Inf. Forensics Secur. 16, 3604–3619 (2021)
Aleksander, I., Morton, H.: Introduction to Neural Computing. Chapman and Hall, London (1990)
Cauteruccio, F., Fortino, G., Guerrieri, A., Liotta, A., Mocanu, D.C., Perra, C., Terracina, G., Vega, M.T.: Short-long term anomaly detection in wireless sensor networks based on machine learning and multi-parameterized edit distance. Inf. Fusion 52, 13–30 (2019)
Erhan, L., Ndubuaku, M., Di Mauro, M., Song, W., Chen, M., Fortino, G., Bagdasar, O., Liotta, A.: Smart anomaly detection in sensor systems: a multi-perspective review. Inf. Fusion 67, 64–79 (2021)
Cauteruccio, F., Cinelli, L., Corradini, E., Terracina, G., Ursino, D., Virgili, L., Savaglio, C., Liotta, A., Fortino, G.: A framework for anomaly detection and classification in multiple IoT scenarios. Futur. Gener. Comput. Syst. 114, 322–335 (2021)
Yin, C., Zhu, Y., Fei, J., He, X.: A deep learning approach for intrusion detection using recurrent neural networks. IEEE Access 5, 21954–21961 (2017)
Ravipati, R., Munther, A.: A survey on different machine learning algorithms and weak classifiers based on KDD and NSL-KDD datasets. Int. J. Artif. Intell. Appl. 10, 01–11 (2019)
Azwar, H., Murtaz, M., Siddique, M., Rehman, S.: Intrusion detection in secure network for cybersecurity systems using machine learning and data mining. In: 2018 IEEE 5th International Conference on Engineering Technologies and Applied Sciences (ICETAS), pp. 1–9 (2018)
Kdd cup 1999 data.: http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html. Last accessed: 10 Sept 2021
Tavallaee, M., Bagheri, E., Lu, W., Ghorbani, A.A.: A detailed analysis of the KDD CUP 99 data set. In: 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications, pp. 1–6 (2009)
Khan, R.U., Zhang, X., Alazab, M., Kumar, R.: An improved convolutional neural network model for intrusion detection in networks. In: 2019 Cybersecurity and Cyberforensics Conference, pp. 74–77 (2019)
S. T. F. Al-Janabi and H. A. Saeed. A neural network based anomaly intrusion detection system. In Developments in E-systems Engineering, pages 221–226, 2011
Taher, K.A., Jisan, B.M.Y., Rahman, M.M.: Network intrusion detection using supervised machine learning technique with feature selection. In: 2019 International Conference on Robotics,Electrical and Signal Processing Techniques (ICREST), pp. 643–646 (2019)
Papamartzivanos, D., Marmol, F.G., Kambourakis, G.: Introducing deep learning self-adaptive misuse network intrusion detection systems. IEEE Access 7, 13546–13560 (2019)
Fernando, Z.T., Thaseen, I.S., Kumar, C.A.: Network attacks identification using consistency based feature selection and self organizing maps. In: First International Conference on Networks Soft Computing, pp. 162–166 (2014)
McElwee, S., Cannady, J.: Improving the performance of self-organizing maps for intrusion detection. In: SoutheastCon 2016, pp. 1–6 (2016)
Li-ying, C., Xiao-xian, Z., He, L., Gui-fen, C.: A network intrusion detection method based on combined model. In: International Conference on Mechatronic Science, Electric Engineering and Computer, pp. 254–257 (2011)
Al-Sultani, Z.N., Naoum, R.S.: Learning vector quantization (LVQ) and k-nearest neighbor for intrusion classification. World Comput. Sci. Inf. Technol. J. 2(3), 105–109 (2012)
The CSE-CIC-IDS2018 Dataset.: http://netflowmeter.cal. Last accessed: 10 Sept 2021
Nguyen, T.T.T., Armitage, G.: A survey of techniques for internet traffic classification using machine learning. IEEE Commun. Surv. Tutor. 10(4), 56–76 (2008)
Boutaba, R., Salahuddin, M.A., Limam, N., Ayoubi, S., Shahriar, N., Estrada-Solano, F., Caicedo, O.M.: A comprehensive survey on machine learning for networking: evolution, applications and research opportunities. J. Internet Serv. Appl. 9(1), 16 (2018)
Hindy, H., Brosset, D., Bayne, E., Seeam, A., Tachtatzis, C., Atkinson, R., Bellekens, X.: A taxonomy and survey of intrusion detection system design techniques, network threats and datasets. CoRR (2018). arXiv:abs/1806.03517
Khraisat, A., Gondal, I., Vamplew, P., Kamruzzaman, J.: Survey of intrusion detection systems: techniques, datasets and challenges. Cybersecurity 2(1), 20 (2019)
Aldweesh, A., Derhab, A., Emam, A.: Deep learning approaches for anomaly-based intrusion detection systems: a survey, taxonomy, and open issues. Knowl.-Based Syst. 189, 105–124 (2020)
Bowden, P., Alexander, I., Thomas, W.: Learning deep architectures for AI. Sens. Rev. 4(3), 120–124 (1984)
De Gregorio, M., Giordano, M.: An experimental evaluation of weightless neural networks for multi-class classification. Appl. Soft Comput. 72, 338–354 (2018)
Di Mauro, M., Galatro, G., Fortino, G., Liotta, A.: Supervised feature selection techniques in network intrusion detection: a critical review. Eng. Appl. Artif. Intell. 101 (2021)
Matta, V., Di Mauro, M., Longo, M.: Botnet identification in randomized DDoS attacks. In: Proceedings of the 24th European Signal Processing Conference, pp. 2260–2264 (2016)
Cirillo, M., Di Mauro, M., Matta, V., Tambasco, M.: Botnet identification in DDoS attacks with multiple emulation dictionaries. IEEE Trans. Inf. Forensics Secur. 16, 3554–3569 (2021)
Cirillo, M., Di Mauro, M., Matta, V., Tambasco, M.: Application-layer DDoS attacks with multiple emulation dictionaries. In: IEEE ICASSP, pp. 2610–2614 (2021)
Di Mauro, M., Galatro, G., Liotta, A.: Experimental review of neural-based approaches for network intrusion management. IEEE Trans. Netw. Serv. Manage. 17(4), 2480–2495 (2020)
Kohonen, T.: Self-Organizing Maps, 3rd edn. Springer, Berlin, Heidelberg (2001)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Di Mauro, M., Galatro, G., Liotta, A. (2022). A WNN-Based Approach for Network Intrusion Detection. In: Camacho, D., Rosaci, D., Sarné, G.M.L., Versaci, M. (eds) Intelligent Distributed Computing XIV. IDC 2021. Studies in Computational Intelligence, vol 1026. Springer, Cham. https://doi.org/10.1007/978-3-030-96627-0_8
Download citation
DOI: https://doi.org/10.1007/978-3-030-96627-0_8
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-96626-3
Online ISBN: 978-3-030-96627-0
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)