Skip to main content

Multi-agent Cooperative Intrusion Detection Based on Generative Data Augmentation

  • Conference paper
  • First Online:
Algorithms and Architectures for Parallel Processing (ICA3PP 2023)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 14492))

  • 122 Accesses

Abstract

Existing supervised learning methods are difficult to adapt the rapidly evolving network attacks. They are effective for malicious flows with clear features, but struggle with flows that reveal unclear or sparse characteristics. This is a concern as malicious flows are rare and discrete in real-world situations. To overcome these challenges, this research paper introduces a novel few-shot sample malicious flow detection model that leverages data augmentation techniques. The model’s core objective is to train agents to distinguish between normal and malicious flows. On this basis, the model enhances the agents’ ability to recognize malicious flows through discrete information interactions. Experimental results confirm that the data augmentation method effectively improves the agents’ understanding of network traffic. Additionally, it successfully enhances intrusion detection capabilities in multiple agents, diverse datasets, and varied scenarios. Notably, in few-shot sample scenarios, the method greatly boosts the overall accuracy rate.

This work is financially supported by the National Natural Science Foundation of China under Grant 62106060.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 59.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 79.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Ahmad, Z., Shahid Khan, A., Wai Shiang, C., Abdullah, J., Ahmad, F.: Network intrusion detection system: a systematic study of machine learning and deep learning approaches. Trans. Emerg. Telecommun. Technol. 32(1), e4150 (2021)

    Article  Google Scholar 

  2. Albini, E., Long, J., Dervovic, D., Magazzeni, D.: Counterfactual shapley additive explanations. In: 2022 ACM Conference on Fairness, Accountability, and Transparency, pp. 1054–1070 (2022)

    Google Scholar 

  3. Arora, S., Ge, R., Liang, Y., Ma, T., Zhang, Y.: Generalization and equilibrium in generative adversarial nets (GANs). In: International Conference on Machine Learning, pp. 224–232. PMLR (2017)

    Google Scholar 

  4. Arulkumaran, K., Deisenroth, M.P., Brundage, M., Bharath, A.A.: Deep reinforcement learning: a brief survey. IEEE Signal Process. Mag. 34(6), 26–38 (2017)

    Article  Google Scholar 

  5. Ghosh, A., Kulharia, V., Namboodiri, V.P., Torr, P.H., Dokania, P.K.: Multi-agent diverse generative adversarial networks. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 8513–8521 (2018)

    Google Scholar 

  6. Goodfellow, I., et al.: Generative adversarial networks. Commun. ACM 63(11), 139–144 (2020)

    Article  MathSciNet  Google Scholar 

  7. Gronauer, S., Diepold, K.: Multi-agent deep reinforcement learning: a survey. Artif. Intell. Rev., 1–49 (2022)

    Google Scholar 

  8. Gulrajani, I., Ahmed, F., Arjovsky, M., Dumoulin, V., Courville, A.C.: Improved training of Wasserstein GANs. In: Advances in Neural Information Processing Systems, vol. 30 (2017)

    Google Scholar 

  9. Jais, I.K.M., Ismail, A.R., Nisa, S.Q.: Adam optimization algorithm for wide and deep neural network. Knowl. Eng. Data Sci. 2(1), 41–46 (2019)

    Article  Google Scholar 

  10. Liu, M., Chang, W., Li, C., Ji, Y., Li, R., Feng, M.: Discrete interactions in decentralized multiagent coordination: a probabilistic perspective. IEEE Trans. Cogn. Dev. Syst. 13(4), 1010–1022 (2021)

    Article  Google Scholar 

  11. Liu, M., et al.: Modeling and analysis of the decentralized interactive cyber defense approach. China Commun. 19(10), 116–128 (2022)

    Article  Google Scholar 

  12. Niu, W., Zhou, J., Zhao, Y., Zhang, X., Peng, Y., Huang, C.: Uncovering apt malware traffic using deep learning combined with time sequence and association analysis. Comput. Secur. 120, 102809 (2022)

    Article  Google Scholar 

  13. Palli, A.S., Jaafar, J., Hashmani, M.A., Gomes, H.M., Gilal, A.R.: A hybrid sampling approach for imbalanced binary and multi-class data using clustering analysis. IEEE Access 10, 118639–118653 (2022)

    Article  Google Scholar 

  14. Zhang, J., Wang, T., Ng, W.W., Zhang, S., Nugent, C.D.: Undersampling near decision boundary for imbalance problems. In: 2019 International Conference on Machine Learning And Cybernetics (ICMLC), pp. 1–8. IEEE (2019)

    Google Scholar 

  15. Zhang, Z., Zeng, Y., Bai, L., Hu, Y., Wu, M., Wang, S., Hancock, E.R.: Spectral bounding: strictly satisfying the 1-Lipschitz property for generative adversarial networks. Pattern Recogn. 105, 107179 (2020)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Zhen Zhang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2024 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Liu, M., Jia, Y., Li, C., Fu, P., Zhang, Z. (2024). Multi-agent Cooperative Intrusion Detection Based on Generative Data Augmentation. In: Tari, Z., Li, K., Wu, H. (eds) Algorithms and Architectures for Parallel Processing. ICA3PP 2023. Lecture Notes in Computer Science, vol 14492. Springer, Singapore. https://doi.org/10.1007/978-981-97-0811-6_19

Download citation

  • DOI: https://doi.org/10.1007/978-981-97-0811-6_19

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-97-0810-9

  • Online ISBN: 978-981-97-0811-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics