skip to main content
10.1145/3600160.3605052acmotherconferencesArticle/Chapter ViewAbstractPublication PagesaresConference Proceedingsconference-collections
research-article

A deep learning anomaly detection framework with explainability and robustness

Published:29 August 2023Publication History

ABSTRACT

The prevalence of encrypted Internet traffic has resulted in a pressing need for advanced analysis techniques for traffic analysis and classification. Traditional rule-based and signature-based approaches have been hindered by the introduction of network encryption methods. With the emergence of machine learning (ML) and deep learning (DL), several preliminary works have been developed for anomaly detection in encrypted network traffic. However, complex Artificial Intelligence (AI) models like neural networks lack explainability, limiting the understanding of their predictions. To address this limitation, eXplainable Artificial Intelligence (XAI) has emerged, aiming to provide users with a rationale for understanding AI system outputs and fostering trust. However, existing explainable frameworks still lack comprehensive support for adversarial attacks and defenses.

In this paper, we present Montimage AI Platform (MAIP), a new GUI-based deep learning framework for malicious traffic detection and classification combined with its ability of explaining the decision of the model. We employ popular XAI methods to interpret the prediction of the developed deep learning model. Furthermore, we perform adversarial attacks to assess the accountability and robustness of our model via different quantifiable metrics. We perform extensive experiments with both public and private network traffic. The experimental results demonstrate that our model achieves high performance and robustness, and its outcomes align closely with the domain knowledge.

References

  1. Alejandro Barredo Arrieta 2020. Explainable Artificial Intelligence (XAI): Concepts, taxonomies, opportunities and challenges toward responsible AI. Information fusion (2020).Google ScholarGoogle Scholar
  2. David Brumley, Cody Hartwig, Zhenkai Liang, James Newsome, Dawn Song, and Heng Yin. 2008. Automatically identifying trigger-based behavior in malware. Botnet Detection: Countering the Largest Security Threat (2008).Google ScholarGoogle Scholar
  3. Livadas Carl, R Walsh, D Lapsley, and WT Strayer. 2006. Using machine learning technliques to identify botnet traffic. In Local Computer Networks, Proceedings 2006 31st IEEE Conference on. IEEE.Google ScholarGoogle Scholar
  4. Weidong Cui, Randy H Katz, and Wai-tian Tan. 2005. BINDER: An extrusion-based break-in detector for personal computers. In USENIX Annual Technical Conference, General Track.Google ScholarGoogle Scholar
  5. Dilara Gümüşbaş, Tulay Yıldırım, Angelo Genovese, and Fabio Scotti. 2020. A comprehensive survey of databases and deep learning methods for cybersecurity and intrusion detection systems. IEEE Systems Journal (2020).Google ScholarGoogle ScholarCross RefCross Ref
  6. Donghwoon Kwon, Hyunjoo Kim, Jinoh Kim, Sang C Suh, Ikkyun Kim, and Kuinam J Kim. 2019. A survey of deep learning-based network anomaly detection. Cluster Computing (2019).Google ScholarGoogle Scholar
  7. Hemank Lamba, Thomas J Glazier, Javier Cámara, Bradley Schmerl, David Garlan, and Jürgen Pfeffer. 2017. Model-based cluster analysis for identifying suspicious activity sequences in software. In Proceedings of the 3rd ACM on International Workshop on Security and Privacy Analytics.Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Scott M Lundberg and Su-In Lee. 2017. A unified approach to interpreting model predictions. Advances in neural information processing systems 30 (2017).Google ScholarGoogle Scholar
  9. Azqa Nadeem, Daniël Vos, Clinton Cao, Luca Pajola, Simon Dieck, Robert Baumgartner, and Sicco Verwer. 2022. Sok: Explainable machine learning for computer security applications. arXiv preprint arXiv:2208.10605 (2022).Google ScholarGoogle Scholar
  10. Manh-Dung Nguyen, Vinh Hoa La, R. Cavalli, and Edgardo Montes de Oca. 2022. Towards improving explainability, resilience and performance of cybersecurity analysis of 5G/IoT networks (work-in-progress paper). In 2022 IEEE International Conference on Software Testing, Verification and Validation Workshops (ICSTW).Google ScholarGoogle ScholarCross RefCross Ref
  11. Marco Tulio Ribeiro, Sameer Singh, and Carlos Guestrin. 2016. " Why should i trust you?" Explaining the predictions of any classifier. In Proceedings of the 22nd ACM SIGKDD international conference on knowledge discovery and data mining. 1135–1144.Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Karen Simonyan and Andrew Zisserman. 2014. Very deep convolutional networks for large-scale image recognition. arXiv preprint arXiv:1409.1556 (2014).Google ScholarGoogle Scholar
  13. W Timothy Strayer, David E Lapsley, Robert Walsh, and Carl Livadas. 2008. Botnet detection based on network behavior.Botnet detection 36, August (2008), 1–24.Google ScholarGoogle Scholar
  14. Petr Velan, Milan Čermák, Pavel Čeleda, and Martin Drašar. 2015. A survey of methods for encrypted traffic classification and analysis. International Journal of Network Management (2015).Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Xianmin Wang, Jing Li, Xiaohui Kuang, Yu-an Tan, and Jin Li. 2019. The security of machine learning in an adversarial setting: A survey. J. Parallel Distributed Comput. (2019).Google ScholarGoogle Scholar
  16. Lei Xu, Maria Skoularidou, Alfredo Cuesta-Infante, and Kalyan Veeramachaneni. 2019. Modeling tabular data using conditional gan. Advances in Neural Information Processing Systems 32 (2019).Google ScholarGoogle Scholar
  17. Zscaler. 2022. State of Encrypted Attacks.Google ScholarGoogle Scholar

Index Terms

  1. A deep learning anomaly detection framework with explainability and robustness
              Index terms have been assigned to the content through auto-classification.

              Recommendations

              Comments

              Login options

              Check if you have access through your login credentials or your institution to get full access on this article.

              Sign in
              • Published in

                cover image ACM Other conferences
                ARES '23: Proceedings of the 18th International Conference on Availability, Reliability and Security
                August 2023
                1440 pages
                ISBN:9798400707728
                DOI:10.1145/3600160

                Copyright © 2023 Owner/Author

                This work is licensed under a Creative Commons Attribution International 4.0 License.

                Publisher

                Association for Computing Machinery

                New York, NY, United States

                Publication History

                • Published: 29 August 2023

                Check for updates

                Qualifiers

                • research-article
                • Research
                • Refereed limited

                Acceptance Rates

                Overall Acceptance Rate228of451submissions,51%
              • Article Metrics

                • Downloads (Last 12 months)106
                • Downloads (Last 6 weeks)8

                Other Metrics

              PDF Format

              View or Download as a PDF file.

              PDF

              eReader

              View online with eReader.

              eReader

              HTML Format

              View this article in HTML Format .

              View HTML Format