Skip to main content

An Autonomous Self-learning and Self-adversarial Training Neural Architecture for Intelligent and Resilient Cyber Security Systems

  • Conference paper
  • First Online:
Engineering Applications of Neural Networks (EANN 2023)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 1826))

Abstract

Cybersecurity systems have become increasingly important as businesses and individuals rely more on technology. However, the increasing complexity of these systems and the evolving nature of cyber threats require innovative solutions to protect against cyber attacks. One promising approach is the idea of autonomous self-learning and auto-training neural architectures. Autonomous self-learning refers to the ability of the system to adapt to new threats and learn from past experiences without human intervention. Auto-training, on the other hand, refers to the ability of the system to improve its performance over time by automatically adjusting its parameters and algorithms. This research proposes an autonomous Self-Learning and Self-Adversarial Training (SLSAT) neural architecture for intelligent and resilient cyber security systems. It is an extension of the next-generation Continuous-Time Reservoir Computing (CTRC) that was proposed by the authors recently. The CTRC is a time-series anomaly detection system controlled by time-varying differential equations. It uses Reinforcement Learning (RL) to dynamically fine-tune the reservoir computing parameters in order to identify the aberrant changes in the data. The proposed method in this research improves the CTRC’s architecture by including a Conditional Tabular Generative Adversarial Network (CTGAN). Specifically, including CTGAN allows the SLSAT architecture to generate synthetic data based on the identified abnormalities to improve the model’s performance and adapt to new and evolving threats without manual intervention. This, as proved experimentally, helps the model identify aberrant changes in the data and fend off poison and zero-day attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Alhasan, S., Abdul-Salaam, G., Bayor, L., Oliver, K.: Intrusion detection system based on artificial immune system: a review. In: 2021 International Conference on Cyber Security and Internet of Things (ICSIoT), pp. 7–14, September 2021. https://doi.org/10.1109/ICSIoT55070.2021.00011

  2. Elmrabit, N., Zhou, F., Li, F., Zhou, H.: Evaluation of machine learning algorithms for anomaly detection. In: 2020 International Conference on Cyber Security and Protection of Digital Services (Cyber Security), pp. 1–8, June 2020. https://doi.org/10.1109/CyberSecurity49315.2020.9138871

  3. Demertzis, K., Iliadis, L.S., Anezakis, V.-D.: An innovative soft computing system for smart energy grids cybersecurity. Adv. Build. Energy Res. 12(1), 3–24 (2018). https://doi.org/10.1080/17512549.2017.1325401

    Article  Google Scholar 

  4. Alromaihi, S., Elmedany, W., Balakrishna, C.: Cyber security challenges of deploying IoT in smart cities for healthcare applications. In: 2018 6th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW), pp. 140–145, December 2018. https://doi.org/10.1109/W-FiCloud.2018.00028.

  5. Coulter, R., Han, Q.-L., Pan, L., Zhang, J., Xiang, Y.: Data-driven cyber security in perspective—intelligent traffic analysis. IEEE Trans. Cybern. 50(7), 3081–3093 (2020). https://doi.org/10.1109/TCYB.2019.2940940

    Article  Google Scholar 

  6. Hart, A.: Generalised synchronisation for continuous time reservoir computers. Rochester, NY, 17 December 2021. https://doi.org/10.2139/ssrn.3987856

  7. Bala, A., Ismail, I., Ibrahim, R., Sait, S.M.: Applications of metaheuristics in reservoir computing techniques: a review. IEEE Access 6, 58012–58029 (2018). https://doi.org/10.1109/ACCESS.2018.2873770

    Article  Google Scholar 

  8. Cuchiero, C., Gonon, L., Grigoryeva, L., Ortega, J.-P., Teichmann, J.: Discrete-time signatures and randomness in reservoir computing. IEEE Trans. Neural Netw. Learn. Syst. 33(11), 6321–6330 (2022). https://doi.org/10.1109/TNNLS.2021.3076777

    Article  MathSciNet  Google Scholar 

  9. Demertzis, K., Iliadis, L., Pimenidis, E.: Geo-AI to aid disaster response by memory-augmented deep reservoir computing. Integr. Comput.-Aided Eng. 28(4), 383–398 (2021). https://doi.org/10.3233/ICA-210657

  10. Al Jallad, K., Aljnidi, M., Desouki, M.S.: Anomaly detection optimization using big data and deep learning to reduce false-positive. J. Big Data 7(1), 68 (2020). https://doi.org/10.1186/s40537-020-00346-1

    Article  Google Scholar 

  11. Xu, L., Skoularidou, M., Cuesta-Infante, A., Veeramachaneni, K.: Modeling tabular data using conditional GAN. arXiv, 27 October 2019. https://doi.org/10.48550/arXiv.1907.00503

  12. Abu, U.A., Folly, K.A., Jayawardene, I., Venayagamoorthy, G.K.: Echo State Network (ESN) based generator speed prediction of wide area signals in a multimachine power system. In: 2020 International SAUPEC/RobMech/PRASA Conference, pp. 1–5, January 2020. https://doi.org/10.1109/SAUPEC/RobMech/PRASA48453.2020.9041236

  13. Manjunath, G.: An echo state network imparts a curve fitting. IEEE Trans. Neural Netw. Learn. Syst. 33(6), 2596–2604 (2022). https://doi.org/10.1109/TNNLS.2021.3099091

    Article  MathSciNet  Google Scholar 

  14. Wang, Z., Yao, X., Huang, Z., Liu, L.: Deep echo state network with multiple adaptive reservoirs for time series prediction. IEEE Trans. Cogn. Dev. Syst. 13(3), 693–704 (2021). https://doi.org/10.1109/TCDS.2021.3062177

    Article  Google Scholar 

  15. Whiteaker, B., Gerstoft, P.: Memory in echo state networks and the controllability matrix rank. In: ICASSP 2022 - 2022 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 3948–3952, February 2022. https://doi.org/10.1109/ICASSP43922.2022.9746766.

  16. Kidger, P.: On neural differential equations. arXiv, 4 February 2022. https://doi.org/10.48550/arXiv.2202.02435

  17. Raissi, M., Perdikaris, P., Karniadakis, G.E.: Physics-informed neural networks: a deep learning framework for solving forward and inverse problems involving nonlinear partial differential equations. J. Comput. Phys. 378, 686–707 (2019). https://doi.org/10.1016/j.jcp.2018.10.045

    Article  MathSciNet  MATH  Google Scholar 

  18. Shi, Y., Rong, Z.: Analysis of Q-Learning like algorithms through evolutionary game dynamics. IEEE Trans. Circuits Syst. II Express Briefs 69(5), 2463–2467 (2022). https://doi.org/10.1109/TCSII.2022.3161655

    Article  Google Scholar 

  19. Yin, Z., Cao, W., Song, T., Yang, X., Zhang, T.: Reinforcement learning path planning based on step batch Q-learning algorithm. In: 2022 IEEE International Conference on Artificial Intelligence and Computer Applications (ICAICA), June 2022, pp. 630–633. https://doi.org/10.1109/ICAICA54878.2022.9844553

  20. Huang, D., Zhu, H., Lin, X., Wang, L.: Application of massive parallel computation based Q-learning in system control. In: 2022 5th International Conference on Pattern Recognition and Artificial Intelligence (PRAI), pp. 1–5, December 2022. https://doi.org/10.1109/PRAI55851.2022.9904213

  21. Habibi, O., Chemmakha, M., Lazaar, M.: Imbalanced tabular data modelization using CTGAN and machine learning to improve IoT Botnet attacks detection. Eng. Appl. Artif. Intell. 118, 105669 (2023). https://doi.org/10.1016/j.engappai.2022.105669

  22. Chauhan, R., Heydari, S.S.: Polymorphic adversarial DDoS attack on IDS using GAN. In: 2020 International Symposium on Networks, Computers and Communications (ISNCC), pp. 1–6, July 2020. https://doi.org/10.1109/ISNCC49221.2020.9297264

  23. Demertzis, K., Tziritas, N., Kikiras, P., Sanchez, S.L., Iliadis, L.: The next generation cognitive security operations center: adaptive analytic lambda architecture for efficient defense against adversarial attacks. Big Data Cogn. Comput. 3(1), Article no. 1, March 2019. https://doi.org/10.3390/bdcc3010006

  24. Akhtar, N., Mian, A.: Threat of adversarial attacks on deep learning in computer vision: a survey. IEEE Access 6, 14410–14430 (2018). https://doi.org/10.1109/ACCESS.2018.2807385

    Article  Google Scholar 

  25. Demertzis, K., Iliadis, L., Kikiras, P.: A Lipschitz - shapley explainable defense methodology against adversarial attacks. In: Maglogiannis, I., Macintyre, J., Iliadis, L. (eds.) AIAI 2021. IAICT, vol. 628, pp. 211–227. Springer, Cham (2021). https://doi.org/10.1007/978-3-030-79157-5_18

    Chapter  Google Scholar 

  26. Dong, Y., et al.: Benchmarking adversarial robustness on image classification. In: 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR), pp. 318–328, June 2020. https://doi.org/10.1109/CVPR42600.2020.00040

  27. Bousmalis, K., Silberman, N., Dohan, D., Erhan, D., Krishnan, D.: Unsupervised pixel-level domain adaptation with generative adversarial networks. arXiv, 23 August 2017. https://doi.org/10.48550/arXiv.1612.05424

  28. Han, K., Li, Y., Xia, B.: A cascade model-aware generative adversarial example detection method. Tsinghua Sci. Technol. 26(6), 800–812 (2021). https://doi.org/10.26599/TST.2020.9010038

    Article  Google Scholar 

  29. Mahmood, K., Nguyen, P.H., Nguyen, L.M., Nguyen, T., Van Dijk, M.: Besting the Black-Box: barrier zones for adversarial example defense. IEEE Access 10, 1451–1474 (2022). https://doi.org/10.1109/ACCESS.2021.3138966

    Article  Google Scholar 

  30. InfluxDB Times Series Data Platform, InfluxData, 15 January 2022. https://www.influxdata.com/home/. Accessed 28 Feb 2023

  31. Industrial IoT (IIoT) solutions for smart industries – Factry, Factry - Open Manufacturing Intelligence. https://www.factry.io/. Accessed 28 Feb 2023

  32. Nguyen, Q.-D., Dhouib, S., Chanet, J.-P., Bellot, P.: Towards a web-of-things approach for OPC UA field device discovery in the industrial IoT. In: 2022 IEEE 18th International Conference on Factory Communication Systems (WFCS), pp. 1–4, April 2022. https://doi.org/10.1109/WFCS53837.2022.9779181

  33. Wang, H., Wang, Y., Wan, S.: A density-based clustering algorithm for uncertain data. In: 2012 International Conference on Computer Science and Electronics Engineering, vol. 3, pp. 102–105, March 2012. https://doi.org/10.1109/ICCSEE.2012.91

  34. Khan, M.M.R., Siddique, Md.A.B., Arif, R.B., Oishe, M.R.: ADBSCAN: adaptive density-based spatial clustering of applications with noise for identifying clusters with varying densities. In: 2018 4th International Conference on Electrical Engineering and Information & Communication Technology (iCEEiCT), pp. 107–111, September 2018. https://doi.org/10.1109/CEEICT.2018.8628138

  35. Botchkarev, A.: Performance metrics (Error Measures) in machine learning regression, forecasting and prognostics: properties and typology. Interdiscip. J. Inf. Knowl. Manag. 14, 045–076 (2019). https://doi.org/10.28945/4184

    Article  Google Scholar 

  36. Koyejo, O.O., Natarajan, N., Ravikumar, P.K., Dhillon, I.S.: Consistent binary classification with generalized performance metrics. In: Advances in Neural Information Processing Systems, vol. 27 (2014). https://papers.nips.cc/paper/2014/hash/30c8e1ca872524fbf7ea5c519ca397ee-Abstract.html. Accessed 24 Oct 2021

  37. Liu, Y., Zhou, Y., Wen, S., Tang, C.: A strategy on selecting performance metrics for classifier evaluation. Int. J. Mob. Comput. Multimed. Commun. IJMCMC 6(4), 20–35 (2014). https://doi.org/10.4018/IJMCMC.2014100102

    Article  Google Scholar 

  38. Li, X.: Fault data detection of traffic detector based on wavelet packet in the residual subspace associated with PCA. Appl. Sci. 9(17), 3491 (2019). https://doi.org/10.3390/app9173491

    Article  Google Scholar 

  39. Shamili, A.S., Bauckhage, C., Alpcan, T.: Malware detection on mobile devices using distributed machine learning. In: 2010 20th International Conference on Pattern Recognition, pp. 4348–4351, December 2010. https://doi.org/10.1109/ICPR.2010.1057

  40. Demertzis, K., Kikiras, P., Tziritas, N., Sanchez, S.L., Iliadis, L.: The next generation cognitive security operations center: network flow forensics using cybersecurity intelligence. Big Data Cogn. Comput. 2(4), Article no. 4, December 2018. https://doi.org/10.3390/bdcc2040035

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Konstantinos Demertzis .

Editor information

Editors and Affiliations

Appendix 1

Appendix 1

Fig. 3.
figure 9

The autonomous self-learning and self-adversarial training neural architecture

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Demertzis, K., Iliadis, L. (2023). An Autonomous Self-learning and Self-adversarial Training Neural Architecture for Intelligent and Resilient Cyber Security Systems. In: Iliadis, L., Maglogiannis, I., Alonso, S., Jayne, C., Pimenidis, E. (eds) Engineering Applications of Neural Networks. EANN 2023. Communications in Computer and Information Science, vol 1826. Springer, Cham. https://doi.org/10.1007/978-3-031-34204-2_38

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-34204-2_38

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-34203-5

  • Online ISBN: 978-3-031-34204-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics