A Hypergraph-Based Machine Learning Ensemble Network Intrusion Detection System (2211.03933v3)
Abstract: Network intrusion detection systems (NIDS) to detect malicious attacks continue to meet challenges. NIDS are often developed offline while they face auto-generated port scan infiltration attempts, resulting in a significant time lag from adversarial adaption to NIDS response. To address these challenges, we use hypergraphs focused on internet protocol addresses and destination ports to capture evolving patterns of port scan attacks. The derived set of hypergraph-based metrics are then used to train an ensemble ML based NIDS that allows for real-time adaption in monitoring and detecting port scanning activities, other types of attacks, and adversarial intrusions at high accuracy, precision and recall performances. This ML adapting NIDS was developed through the combination of (1) intrusion examples, (2) NIDS update rules, (3) attack threshold choices to trigger NIDS retraining requests, and (4) a production environment with no prior knowledge of the nature of network traffic. 40 scenarios were auto-generated to evaluate the ML ensemble NIDS comprising three tree-based models. The resulting ML Ensemble NIDS was extended and evaluated with the CIC-IDS2017 dataset. Results show that under the model settings of an Update-ALL-NIDS rule (specifically retrain and update all the three models upon the same NIDS retraining request) the proposed ML ensemble NIDS evolved intelligently and produced the best results with nearly 100% detection performance throughout the simulation.
- M. J. D. Lucia, P. Maxwell, N. D. Bastian, A. Swami, B. Jalaian, and N. Leslie, “Machine learning for raw network traffic detection,” SPIE, vol. 11746, 2021. [Online]. Available: https://arxiv.org/abs/2009.13250
- R. R. Devi and M. Abualkibash, “Intrusion detection system classification using different machine learning algorithms on kdd-99 and nsl-kdd datasets - a review paper,” International Journal of Computer Science and Information Technology, vol. 11, no. 3, 2019.
- P. Maxwell, E. Alhajjar, and N. D. Bastian, “Intelligent feature engineering for cybersecurity,” 2019 IEEE International Conference on Big Data, 2019.
- M. Chale and N. D. Bastian, “Challenges and opportunities for generative methods in the cyber domain,” Proceedings of the 2021 Winter Simulation Conference, 2021.
- D. A. Bierbrauer, M. J. DeLucia, K. Reddy, P. Maxwell, and N. D. Bastian, “Transfer learning for raw network traffic detection,” Preprint submitted to Expert Systems with Applications, pp. 1–11, 2022.
- D. A. Bierbrauer, W. Kritzer, A. Chang, and N. D. Bastian, “Cybersecurity anomaly detection in adversarial environments,” AAAI FSS-21: Artificial Intelligence in Government and Public Sector, 2021.
- S. M. Devine and N. D. Bastian, “An adversarial training based machine learning approach to malware classification under adversarial conditions,” Proceedings of the 54th Hawaii International Conference on System Sciences, pp. 827–836, 2021.
- E. Alhajjar, P. Maxwell, and N. Bastian, “Adversarial machine learning in network intrusion detection systems,” Expert Systems with Applications, vol. 186, pp. 1–13, 2021.
- M. Schneider, D. Aspinall, and N. D. Bastian, “Evaluating model robustness to adversarial samples in network intrusion detection,” in Proceedings of the 2021 IEEE International Conference on Big Data. IEEE, 2021, pp. 3343–3352.
- R. Bielawski, R. Gaynier, D. Ma, S. Lauzon, and A. Weimerskirch, “Cybersecurity of firmware updates,” 2020. [Online]. Available: https://www.nhtsa.gov/sites/nhtsa.gov/files/documents/cybersecurity_of_firmware_updates_oct2020.pdf
- M. Aljanabi, M. A. Ismail, and A. H. Ali, “Intrusion detection systems, issues, challenges, and needs,” International Journal of Computational Intelligence Systems, vol. 14, no. 1, 2021.
- Q. Xiao, J. Liu, Q. Wang, Z. Jiang, X. Wang, and Y. Yao, “Towards network anomaly detection using graph embedding,” in Computational Science – International Conference on Computational Science 2020. Lecture Notes in Computer Science, V. V. Krzhizhanovskaya and et al, Eds. Springer, 2020, vol. 12140, pp. 156––169.
- A. Khraisat, I. Gondal, P. Vamplew, and J. Kamruzzaman, “Survey of intrusion detection systems: techniques, datasets and challenges,” 2019. [Online]. Available: https://doi.org/10.1186/s42400-019-0038-7
- L. Wang, A. Liu, and S. Jajodia, “Using attack graphs for correlating, hypothesizing, and predicting intrusion alerts,” 2006.
- A. Guzzo, A. Pugliese, A. Rullo, and D. Saccà, “Intrusion detection with hypergraph-based attack models,” in Graph Structures for Knowledge Representation and Reasoning, M. Croitoru, S. Rudolph, S. Woltran, and C. Gonzales, Eds., vol. 8323. Cham: Springer International Publishing, 2014, pp. 58–73.
- M. R. G. Raman, K. Kannan, S. Pal, , and V. S. S. Sriram, “Rough set-hypergraph-based feature selection approach for intrusion detection systems,” Defence Science Journal, vol. 66, no. 6, pp. 612–617, 2016.
- M. R. G. Raman, N. Somu, K. Kannan, R. Liscano, and V. S. Sriram, “An efficient intrusion detection system based on hypergraph - genetic algorithm for parameter optimization and feature selection in support vector machine,” Knowl. Based Sys., vol. 134, pp. 1–12, 2017.
- X. An, J. Su, X. Lü, and F. Lin, “Hypergraph clustering model-based association analysis of ddos attacks in fog computing intrusion detection system,” 2018. [Online]. Available: https://doi.org/10.1186/s13638-018-1267-2
- C. Joslyn, S. G. Aksoy, D. Arendt, J. Firoz, L. Jenkins, B. Praggastis, E. Purvine, and M. Zalewski, “Hypergraph analytics of domain name system relationships,” International Workshop on Algorithms and Models for the Web-Graph WAW 2020: Algorithms and Models for the Web Graph, vol. 12091, pp. 1 – 15, 2020.
- A. Kalekar, N. Kshatriya, S. Chakranarayan, and S. Wadekar, “Real time intrusion detection system using machine learning,” INTERNATIONAL JOURNAL OF ENGINEERING RESEARCH and TECHNOLOGY (IJERT), vol. 3, no. 2, 2014.
- P. Sangkatsanee, N. Wattanapongsakorn, and C. Charnsripinyo, “Practical real-time intrusion detection using machine learning approaches,” Computer Communications, vol. 34, pp. 2227–2235, 12 2011.
- S. Thirimanne, L. Jayawardana, L. Yasakethu, P. Liyanaarachchi, and C. Hewage, “Deep neural network based real-time intrusion detection system,” SN Computer Science, vol. 3, 03 2022.
- T. J. Shipp, D. J. Clouse, M. J. D. Lucia, M. B. Ahiskali, K. Steverson, J. M. Mullin, and N. D. Bastian, “Advancing the research and development of assured artificial intelligence and machine learning capabilities,” CoRR, vol. abs/2009.13250, 2020. [Online]. Available: https://arxiv.org/abs/2009.13250
- D. A. Bierbrauer, A. Chang, W. Kritzer, and N. D. Bastian, “Anomaly detection in cybersecurity: Unsupervised, graph-based and supervised learning methods in adversarial environments,” CoRR, vol. abs/2105.06742, 2021. [Online]. Available: https://arxiv.org/abs/2105.06742
- Z. Kolter and A. Madry, “Adversarial robustness – theory and practice,” 2019. [Online]. Available: https://adversarial-ml-tutorial.org/
- F. Stonedahl and U. Wilensky, “Netlogo virus on a network,” Evanston, IL, 2008. [Online]. Available: http://ccl.northwestern.edu/netlogo/models/VirusonaNetwork
- CIC, “Canadian institute for cybersecurity (cic) - intrusion detection evaluation dataset (cic-ids2017),” 2017. [Online]. Available: https://www.unb.ca/cic/datasets/ids-2017.html
- I. Sharafaldin, A. H. Lashkari, and A. A. Ghorbani, “Toward generating a new intrusion detection dataset and intrusion traffic characterization,” Portugal, 2018. [Online]. Available: https://paperswithcode.com/dataset/cicids2017
- K. E. Monson, D. L. Arendt, S. G. Aksoy, B. L. Praggastis, E. Purvine, and C. A. Joslyn, “Hypernetx,” 2019. [Online]. Available: https://www.pnnl.gov/copyright/hypernetx
- B. Praggastis, D. Arendt, J. Y. Yun, T. Liu, A. Lumsdaine, C. Joslyn, M. Raugas, B. Kritzstein, S. Aksoy, D. Arendt, C. Joslyn, N. Landry, A. Lumsdaine, T. Liu, B. Praggastis, E. Purvine, M. Shi, and F. Theberge, “Hypernetx,” 2022. [Online]. Available: https://github.com/pnnl/HyperNetX
- S. G. Aksoy, C. Joslyn, C. O. Marrero, B. Praggastis, and E. Purvine, “Hypernetwork science via high-order hypergraph walks,” EPJ Data Science, vol. 9, p. 16, 2020. [Online]. Available: https://doi.org/10.1140/epjds/s13688-020-00231-0
- M. Ali, “Pycaret - classification,” 2020. [Online]. Available: https://pycaret.readthedocs.io/en/latest/api/classification.html
- M.-I. Nicolae, M. Sinn, M. N. Tran, B. Buesser, A. Rawat, M. Wistuba1, V. Zantedeschi, N. Baracaldo, B. Chen, H. Ludwig, I. M. Molloy, and B. Edwards, “Adversarial robustness toolbox v1.0.0,” 2019. [Online]. Available: https://arxiv.org/pdf/1807.01069
- S. Baluja and I. Fischer, “Adversarial transformation networks: Learning to generate adversarial examples,” 2017. [Online]. Available: https://arxiv.org/abs/1703.09387