Feature Selection for Malicious Traffic Detection with Machine Learning

The network technology plays an important role in the emerging industry 4.0. Industrial control systems (ICS) are related to all aspects of human life and have become the target of cyber-attackers. Attacks on ICS may not only cause economic loss, but also damage equipment and hurt staff. The biggest...

Full description

Saved in:
Bibliographic Details
Published in2020 International Computer Symposium (ICS) pp. 414 - 419
Main Authors Wang, Sying-Jyan, Cai, Cheng Xuan, Tseng, Yen-Wen, Li, Katherine Shu-Min
Format Conference Proceeding
LanguageEnglish
Published IEEE 01.12.2020
Subjects
Online AccessGet full text

Cover

Loading…
Abstract The network technology plays an important role in the emerging industry 4.0. Industrial control systems (ICS) are related to all aspects of human life and have become the target of cyber-attackers. Attacks on ICS may not only cause economic loss, but also damage equipment and hurt staff. The biggest challenges in establishing a secure network communication system is how to effectively detect and prevent malicious network behavior. A Network Intrusion Detection System (NIDS) can be deployed as a defense mechanism for cyberattacks. However, for industrial internet-of-things (IIoT) applications with limited computing resources, designing an effective NIDS is challenging. In this paper, we propose to use machine learning as the core technology to build a compact and effective NIDS for IIoT. The proposed method is validated by using the more recent UNSW-NB 15 dataset to improve the detection capability against new types of attacks in the real world. Furthermore, we demonstrate that the method is also valid for traditional KDD-CUP-99 dataset. Experimental results show that the proposed method achieves better performance than previous methods.
AbstractList The network technology plays an important role in the emerging industry 4.0. Industrial control systems (ICS) are related to all aspects of human life and have become the target of cyber-attackers. Attacks on ICS may not only cause economic loss, but also damage equipment and hurt staff. The biggest challenges in establishing a secure network communication system is how to effectively detect and prevent malicious network behavior. A Network Intrusion Detection System (NIDS) can be deployed as a defense mechanism for cyberattacks. However, for industrial internet-of-things (IIoT) applications with limited computing resources, designing an effective NIDS is challenging. In this paper, we propose to use machine learning as the core technology to build a compact and effective NIDS for IIoT. The proposed method is validated by using the more recent UNSW-NB 15 dataset to improve the detection capability against new types of attacks in the real world. Furthermore, we demonstrate that the method is also valid for traditional KDD-CUP-99 dataset. Experimental results show that the proposed method achieves better performance than previous methods.
Author Tseng, Yen-Wen
Cai, Cheng Xuan
Li, Katherine Shu-Min
Wang, Sying-Jyan
Author_xml – sequence: 1
  givenname: Sying-Jyan
  surname: Wang
  fullname: Wang, Sying-Jyan
  email: sjwang@cs.nchu.edu.tw
  organization: National Chung Hsing University,Department of Computer Science and Engineering,Taichung,Taiwan
– sequence: 2
  givenname: Cheng Xuan
  surname: Cai
  fullname: Cai, Cheng Xuan
  organization: National Chung Hsing University,Department of Computer Science and Engineering,Taichung,Taiwan
– sequence: 3
  givenname: Yen-Wen
  surname: Tseng
  fullname: Tseng, Yen-Wen
  organization: National Chung Hsing University,Department of Computer Science and Engineering,Taichung,Taiwan
– sequence: 4
  givenname: Katherine Shu-Min
  surname: Li
  fullname: Li, Katherine Shu-Min
  email: smli@cse.nsysu.edu.tw
  organization: National Sun Yat-sen University,Department of Computer Science and Engineering,Kaohsiung,Taiwan
BookMark eNotjMFOwzAQRI1ED1D6Bb34BxLWTmyvjyjQUikVh7bnynHX1FJwkJsK8fdEoqcZvXmaR3afhkSMLQWUQoB93jQ7JSTaUoKEEgAQ79jCGhRGorBSKXhg6xW58ZqJ76gnP8Yh8TBkvnV99HG4Xvg-uxCi56803vafOJ4nwZ9jIt6Syymmzyc2C66_0OKWc3ZYve2b96L9WG-al7aIQuBYaCVlCDrITjiwUzWo63BC67wKeBKqBlX7yhkPhL6bmOwsBJBkKlQaqjlb_v9GIjp-5_jl8u_RVsqCttUfcUtJLA
CODEN IEEPAD
ContentType Conference Proceeding
DBID 6IE
6IL
CBEJK
RIE
RIL
DOI 10.1109/ICS51289.2020.00088
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume
IEEE Xplore All Conference Proceedings
IEEE Electronic Library (IEL)
IEEE Proceedings Order Plans (POP All) 1998-Present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
EISBN 9781728192550
1728192552
EndPage 419
ExternalDocumentID 9359069
Genre orig-research
GrantInformation_xml – fundername: Ministry of Science and Technology
  funderid: 10.13039/100007225
GroupedDBID 6IE
6IL
CBEJK
RIE
RIL
ID FETCH-LOGICAL-i118t-6522ff6f2b1a092ff7864fd89ac5f8d154054c3a7c0e8cb5f82b90f02e7385603
IEDL.DBID RIE
IngestDate Thu Jun 29 18:38:26 EDT 2023
IsPeerReviewed false
IsScholarly false
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-i118t-6522ff6f2b1a092ff7864fd89ac5f8d154054c3a7c0e8cb5f82b90f02e7385603
PageCount 6
ParticipantIDs ieee_primary_9359069
PublicationCentury 2000
PublicationDate 2020-Dec.
PublicationDateYYYYMMDD 2020-12-01
PublicationDate_xml – month: 12
  year: 2020
  text: 2020-Dec.
PublicationDecade 2020
PublicationTitle 2020 International Computer Symposium (ICS)
PublicationTitleAbbrev ICS
PublicationYear 2020
Publisher IEEE
Publisher_xml – name: IEEE
Score 1.7443749
Snippet The network technology plays an important role in the emerging industry 4.0. Industrial control systems (ICS) are related to all aspects of human life and have...
SourceID ieee
SourceType Publisher
StartPage 414
SubjectTerms anomaly detection system
cyber security
Industrial Internet of Things
Integrated circuits
internet of things
Machine learning
Prediction algorithms
Predictive models
Radio frequency
Systematics
Title Feature Selection for Malicious Traffic Detection with Machine Learning
URI https://ieeexplore.ieee.org/document/9359069
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3PT8MgGCXbTp7UbMbf4eBRNqBA4Tyd02TGZC7ZbQEKxphsZmkv_vXytXUa48EboU1b4PAe9L33IXQVGcsL6QQJBZVEsDwjWntKOCtspqTlvlH5PqrpQjws5bKDrndemBBCLT4LQ2jW__KLja_gqGwELlKqTBd108at8Wq1QUKMmtH9eJ7QS4P7hINei0I1lR8lU2rEmOyj2de7GqHI27Aq3dB__Iph_O_HHKDBtzcPP-1Q5xB1wrqP7oDJVduA53VZmzTXOJFRPEsk24PIFSdIgqwIfBPK9jocwKYbQEoZcJuy-jJAi8nt83hK2hIJ5DXtDEqiEn2KUUXumKUmNXOtRCy0sV5GXTDgY8JnNvc0aO9SH3eGRsoDpNgomh2h3nqzDscIU-PTIxS3mdFCSqe9dFYZ50XmNLXqBPVhElbvTQrGqh3_6d_dZ2gPlqERfpyjXrmtwkWC79Jd1uv2Ce4Rm5k
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV09T8MwFHwqZYAJUIv4xgMjbh0ncey5UFpoK6S2UrfKdhyEkFpUJQu_Hr8kFIQY2CwnysfzcBfn7h7ATRYESRqbiLqUxTQKkpBKaRnlQapDEWtuK5XvRAzm0eMiXjTgduuFcc6V4jPXwWH5Lz9d2wK3yrroImVC7cCux_2YV26tOkooYKo77E09fkn0n3BUbDHsp_KjaUqJGf0DGH_drZKKvHWK3HTsx68gxv8-ziG0v9155HmLO0fQcKsWPCCXKzaOTMvGNr7axNNRMvY026LMlXhQwrQIcufy-jhuwfoTUEzpSJ2z-tKGef9-1hvQukkCffXfBjkVnkBlmci4CTRTfphIEWWpVNrGmUwDZGSRDXVimZPW-DluFMsYd5hjI1h4DM3VeuVOgDBl_SUE16GSvr5G2thooYyNQiOZFqfQwiIs36scjGX9_md_T1_D3mA2Hi1Hw8nTOezjklQykAto5pvCXXowz81VuYafP6ee4w
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2020+International+Computer+Symposium+%28ICS%29&rft.atitle=Feature+Selection+for+Malicious+Traffic+Detection+with+Machine+Learning&rft.au=Wang%2C+Sying-Jyan&rft.au=Cai%2C+Cheng+Xuan&rft.au=Tseng%2C+Yen-Wen&rft.au=Li%2C+Katherine+Shu-Min&rft.date=2020-12-01&rft.pub=IEEE&rft.spage=414&rft.epage=419&rft_id=info:doi/10.1109%2FICS51289.2020.00088&rft.externalDocID=9359069