Intrusion detection in cyber-physical systems using a generic and domain specific deep autoencoder model

https://doi.org/10.1016/j.compeleceng.2021.107044Get rights and content

Abstract

The rapid growth of network-related services in the last decade has produced a huge amount of sensitive data on the internet. But networks are very much prone to intrusions where unauthorized users attempt to access sensitive information and even disrupt the system. Building a competent network intrusion detection system (IDS) is necessary to prevent such attacks. IDSs generally use machine learning algorithms for classifying the attacks. But the features used for classification are not always suitable or sufficient. Besides, the number of intrusions is much less than the number of non-intrusions. Hence naive approaches may fail to provide acceptable performance due to this class imbalance. To counter this problem, in this paper, we propose a model that extracts useful features from the given features and then uses a deep learning algorithm to classify the intrusions. It is to be noted that underlying data points cannot be thought of as sampled from the same distribution, rather from two different distributions - one generic to all network intrusions, and the other specific to the domain. Keeping this fact in mind, we propose a unique Generic-Specific autoencoder architecture where the generic one learns the features that are common across all forms of network intrusions, and the specific ones learn features that are pertaining only to that domain. The model has been evaluated on the CICIDS2017 dataset, which is the largest dataset of this type available online, and we have set new benchmark results on this dataset. Source code of this work is available at: https://github.com/SoumyadeepThakur/Intrusion-AE

Introduction

The use of network-related services has increased over the years and thus the amount of sensitive data on the internet has grown. Networks are prone to intrusions where unauthorized users, with malicious intent, gain entry to a system on a network and attempt to obtain sensitive information or sabotage the system. Despite numerous network security methods, cyber-attacks still appear. Network intrusion is, therefore, a prime concern and thus network intrusion detection systems (NIDSs) are necessary to prevent such attacks. The information obtained by analyzing the packet data during attacks may be helpful to detect such attacks in the future. Moreover, if after detecting an intrusion, we can further classify the type of intrusion namely, Denial of Service (DoS), Cross-Site Scripting (XSS), etc., and more effective countermeasures can be taken to prevent such attacks. One important factor to be kept in mind while building a NIDS is that if an intrusion wrongly classified as a non-intrusion is more dangerous than a false alarm (non-intrusion classified as an intrusion).

Using these network services, cyber-physical systems integrate computation with physical processes by using feedback loops. These systems consist of sensors, actuators, and other components that communicate with each other through a network. The communication network has the same protocols (of that of a computer network) at lower levels such as TCP/IP, and wireless protocols. Hence, cyber-physical systems are prone to the same intrusions as that of a simple computer network. However, cyber-physical systems are safety-critical and sudden failure due to cyber-attacks or otherwise can cause severe damage to the physical systems that are being controlled and also to the people dependent on these systems. Thus, it is of prime importance that such attacks are prevented. A Cyber-physical system (CPS) assimilates computing resources and physical processes, so that useful control is performed through computation and communication with the connected devices [1]. It enables the remote access and control of systems, devices, and machines, and thus are essential in many industrial environments. Nevertheless, the extensive implementation of CPS comes with various security threats which can lead to severe damages to the controlled physical objects and harm the users who completely rely on them. Hence, NIDS must be implemented on such systems so that preventive actions can be taken before there is irreparable damage due to these attacks.

Although network monitoring has been extensively used for security, forensics, etc., recent advancements in technology have thrown forward many new challenges [2]. Some of the most pressing issues are –

  • Volume - The volume of data continues to drastically grow owing to the increasing popularity of the Internet of Things, cloud-based services, etc. New techniques have to be developed to efficiently and effectively analyze such huge quantities of data.

  • Accuracy – To provide performance with the required levels of accuracy, greater levels of granularity and contextual understanding are needed to get a more holistic and comprehensive view.

  • Diversity – This is caused by the number of new and different protocols and the vast variety of data traveling through modern networks. This makes it difficult to learn appropriate features that can distinguish between normal and abnormal traffic.

  • Low-frequency attacks – These attacks lead to an imbalance in the training set for artificial intelligence approaches, leading to poor precision of detection when they occur.

Moreover, most IDSs make use of machine learning algorithms to classify the attacks. This necessitates the extraction of good features for different intrusions that can then be used for supervised learning to identify the attacks. However, sufficient and appropriate traffic data is often not available that facilitates proper feature learning. Further, the number of intrusions is much less compared to the number of non-intrusions, leading to more difficulties in training.

To handle these issues, network traffic data can be collected from different sources and unsupervised feature learning can be applied to learn appropriate feature representations for these data. These features can then be used to train a classifier using a labeled (and smaller if convenient) dataset comprising both benign and anomalous traffic. The traffic data for the labeled dataset can be collected in a confined, isolated, and private network environment. In this paper we propose a model to identify only the useful feature attributes from the given feature vector and then use machine learning algorithms to classify the intrusions using these features. Our proposed model has been evaluated on the CICIDS2017 [3] dataset.

The rest of the paper is organized as follows. Section 2 deals with the literature survey, Section 3 describes the proposed method, Section 4 presents the experimental results and the dataset description, and a comparative study of the results, and finally Section 5 concludes the paper.

Section snippets

Related work

Network intrusion detection is an active field of research and various machine learning based approaches have been proposed in the literature over the years. In this regard, it is to be noted that the CICIDS2017 is a relatively new dataset and therefore not many approaches have been tried on this dataset. In this section, first, a general overview of the methods that have been used for IDS is provided which includes popular approaches such as feature selection, ensemble paradigms, deep learning

Proposed method

Network intrusion can be varied, vastly ranging from simple brute force attacks to very complex attacks such as Distributed DoS. These intrusions can be grouped into domains (i.e., generalized groups) such as DoS, Web attacks, etc. For example, if one is considering attacks such as SQL injection, Cross-Site Scripting, and Brute Force it can be grouped into a more generalized domain of Web Attacks as all of these attacks are carried out by exploiting vulnerabilities in a web application.

Experimental results

In this section, we provide a detailed description of the dataset used, along with the data pre-processing procedure adopted here. The detailed structure of the model is also presented. Finally, a performance analysis of the model is provided followed by a comparative study with other classifiers and models found in the literature. The experiments are done on a Windows 10 – 64-bit PC with 12 GB RAM and CPU Intel(R) [email protected] GHz.

Conclusion

The problem of network intrusion detection can be defined as identifying unlawful access, misuse, and abuse of computer systems either by insiders and/or outsiders. Network intrusion can be varied ranging from simple brute force attacks to very complex attacks. More specifically, data points of network intrusion dataset can be thought of following two distinct distributions - one generic to all network intrusions, and the other specific to the domains. Based on this fact, we propose a

Declaration of Competing Interest

The authors declare that there is no conflict of interest

Authors statement

Authors declare that there is no conflict of interest during the submission of the paper at this venue. All the authors agreed on the submission of the paper at this venue. The paper is submitted solely at this venue.

Soumyadeep Thakur is a post-graduate student within the Computer Science and Engineering Department of Indian Institute of Technology, Bombay. He completed his undergraduate studies from the Department of Computer Science and Engineering of Jadavpur University in 2019. His research interests lie in Deep Learning, Natural Language Processing and Reinforcement Learning

References (25)

  • S. Han et al.

    Intrusion detection in cyber-physical systems: techniques and challenges

    IEEE Syst J

    (2014)
  • N. Shone et al.

    A deep learning approach to network intrusion detection

    IEEE Trans Emerg Top Comput Intell

    (2018)
  • I. Sharafaldin et al.

    Towards a reliable intrusion detection benchmark dataset

    Softw Netw

    (2017)
  • B.M. Aslahi-Shahri

    A hybrid method consisting of GA and SVM for intrusion detection system

    Neural Comput Appl

    (2016)
  • S. Sun et al.

    Wrapper feature selection based on lightning attachment procedure optimization and support vector machine for intrusion detection

  • S. Mukkamala et al.

    Intrusion detection using an ensemble of intelligent paradigms

    J Netw Comput Appl

    (2005)
  • B. Dong and X. Wang, “Comparison deep learning method to traditional methods using for network intrusion detection,”...
  • A. McDole et al.

    Analyzing CNN based behavioural malware detection techniques on cloud IaaS

    Cloud Comput CLOUD

    (2020)
  • M. Gupta et al.

    Secure V2V and V2I communication in intelligent transportation using cloudlets

    IEEE Trans Serv Comput

    (2020)
  • D. Gupta et al.

    Access Control Model for Google Cloud IoT

  • F. Farahnakian and J. Heikkonen, “A deep auto-encoder based approach for intrusion detection system,” 2018, doi:...
  • Y. Mirsky, T. Doitshman, Y. Elovici, and A. Shabtai, “Kitsune: an ensemble of autoencoders for online network intrusion...
  • Cited by (46)

    • Remora whale optimization-based hybrid deep learning for network intrusion detection using CNN features

      2022, Expert Systems with Applications
      Citation Excerpt :

      However, this model failed to use an imbalanced attack dataset for achieving better performance. To achieve better performance outcomes (Thakur et al., 2021) presented a Deep autoencoder model for detecting intrusions in cyber-physical systems. This technique identified the necessary feature attributes for categorizing the intrusions based on these identified features.

    • Privacy preserving monitoring protocol for Cyber–Physical System

      2022, Computers and Electrical Engineering
      Citation Excerpt :

      Because of the tight integration of real-valued and dense real-time systems with software-based discrete automated control, the design and implementation concepts of CPS are significantly distinct from those of other embedded systems. CPS is developed by integrating the computational and physical components, and hence they allow communication with human beings in multiple ways [1,2]. Embedding the monitoring protocol in the CPS needs proper attention; disclosing any monitored information with an intruder may create a major issue [3].

    View all citing articles on Scopus

    Soumyadeep Thakur is a post-graduate student within the Computer Science and Engineering Department of Indian Institute of Technology, Bombay. He completed his undergraduate studies from the Department of Computer Science and Engineering of Jadavpur University in 2019. His research interests lie in Deep Learning, Natural Language Processing and Reinforcement Learning

    Anuran Chakraborty received his B.E. degree in Computer Science and Engineering from Jadavpur University, Kolkata, India in 2020. His research interests are Image Processing, Machine Learning and Deep Learning.

    Rajonya De received his B.E. degree in Computer Science and Engineering from Jadavpur University, Kolkata, India in 2020. His research interests are Image Processing, Machine Learning and Deep Learning.

    Neeraj Kumar is highly-cited researcher from WoS in 2019 and 2020, and published more than 400 research papers in top-cited journals and conferences. His research is supported by funding from various agencies across the globe. His research areas are Green computing and Network management, IoT, Big Data Analytics, Deep learning and Cyber-security. He is serving as editors of various journals.

    Ram Sarkar did his Bachelors from University of Calcutta in 2003. He did his Masters and PhD degrees from Jadavpur University (JU) in 2005 and 2012 respectively. He is an Associate Professor at JU. He was a Fulbright-Nehru Fellow and worked at University of Maryland, USA during 2014–15. His research interests are Machine and Deep Learning and Image Processing.

    This paper is for CAEE special section VSI-aicps. Reviews processed and recommended for publication to the Editor-in-Chief by Guest Editor Dr. Dr. Ali Dehghantanha.

    View full text