Feature Selection for Malicious Traffic Detection with Machine Learning
The network technology plays an important role in the emerging industry 4.0. Industrial control systems (ICS) are related to all aspects of human life and have become the target of cyber-attackers. Attacks on ICS may not only cause economic loss, but also damage equipment and hurt staff. The biggest...
Saved in:
Published in | 2020 International Computer Symposium (ICS) pp. 414 - 419 |
---|---|
Main Authors | , , , |
Format | Conference Proceeding |
Language | English |
Published |
IEEE
01.12.2020
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | The network technology plays an important role in the emerging industry 4.0. Industrial control systems (ICS) are related to all aspects of human life and have become the target of cyber-attackers. Attacks on ICS may not only cause economic loss, but also damage equipment and hurt staff. The biggest challenges in establishing a secure network communication system is how to effectively detect and prevent malicious network behavior. A Network Intrusion Detection System (NIDS) can be deployed as a defense mechanism for cyberattacks. However, for industrial internet-of-things (IIoT) applications with limited computing resources, designing an effective NIDS is challenging. In this paper, we propose to use machine learning as the core technology to build a compact and effective NIDS for IIoT. The proposed method is validated by using the more recent UNSW-NB 15 dataset to improve the detection capability against new types of attacks in the real world. Furthermore, we demonstrate that the method is also valid for traditional KDD-CUP-99 dataset. Experimental results show that the proposed method achieves better performance than previous methods. |
---|---|
AbstractList | The network technology plays an important role in the emerging industry 4.0. Industrial control systems (ICS) are related to all aspects of human life and have become the target of cyber-attackers. Attacks on ICS may not only cause economic loss, but also damage equipment and hurt staff. The biggest challenges in establishing a secure network communication system is how to effectively detect and prevent malicious network behavior. A Network Intrusion Detection System (NIDS) can be deployed as a defense mechanism for cyberattacks. However, for industrial internet-of-things (IIoT) applications with limited computing resources, designing an effective NIDS is challenging. In this paper, we propose to use machine learning as the core technology to build a compact and effective NIDS for IIoT. The proposed method is validated by using the more recent UNSW-NB 15 dataset to improve the detection capability against new types of attacks in the real world. Furthermore, we demonstrate that the method is also valid for traditional KDD-CUP-99 dataset. Experimental results show that the proposed method achieves better performance than previous methods. |
Author | Tseng, Yen-Wen Cai, Cheng Xuan Li, Katherine Shu-Min Wang, Sying-Jyan |
Author_xml | – sequence: 1 givenname: Sying-Jyan surname: Wang fullname: Wang, Sying-Jyan email: sjwang@cs.nchu.edu.tw organization: National Chung Hsing University,Department of Computer Science and Engineering,Taichung,Taiwan – sequence: 2 givenname: Cheng Xuan surname: Cai fullname: Cai, Cheng Xuan organization: National Chung Hsing University,Department of Computer Science and Engineering,Taichung,Taiwan – sequence: 3 givenname: Yen-Wen surname: Tseng fullname: Tseng, Yen-Wen organization: National Chung Hsing University,Department of Computer Science and Engineering,Taichung,Taiwan – sequence: 4 givenname: Katherine Shu-Min surname: Li fullname: Li, Katherine Shu-Min email: smli@cse.nsysu.edu.tw organization: National Sun Yat-sen University,Department of Computer Science and Engineering,Kaohsiung,Taiwan |
BookMark | eNotjMFOwzAQRI1ED1D6Bb34BxLWTmyvjyjQUikVh7bnynHX1FJwkJsK8fdEoqcZvXmaR3afhkSMLQWUQoB93jQ7JSTaUoKEEgAQ79jCGhRGorBSKXhg6xW58ZqJ76gnP8Yh8TBkvnV99HG4Xvg-uxCi56803vafOJ4nwZ9jIt6Syymmzyc2C66_0OKWc3ZYve2b96L9WG-al7aIQuBYaCVlCDrITjiwUzWo63BC67wKeBKqBlX7yhkPhL6bmOwsBJBkKlQaqjlb_v9GIjp-5_jl8u_RVsqCttUfcUtJLA |
CODEN | IEEPAD |
ContentType | Conference Proceeding |
DBID | 6IE 6IL CBEJK RIE RIL |
DOI | 10.1109/ICS51289.2020.00088 |
DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume IEEE Xplore All Conference Proceedings IEEE Electronic Library (IEL) IEEE Proceedings Order Plans (POP All) 1998-Present |
DatabaseTitleList | |
Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
EISBN | 9781728192550 1728192552 |
EndPage | 419 |
ExternalDocumentID | 9359069 |
Genre | orig-research |
GrantInformation_xml | – fundername: Ministry of Science and Technology funderid: 10.13039/100007225 |
GroupedDBID | 6IE 6IL CBEJK RIE RIL |
ID | FETCH-LOGICAL-i118t-6522ff6f2b1a092ff7864fd89ac5f8d154054c3a7c0e8cb5f82b90f02e7385603 |
IEDL.DBID | RIE |
IngestDate | Thu Jun 29 18:38:26 EDT 2023 |
IsPeerReviewed | false |
IsScholarly | false |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-i118t-6522ff6f2b1a092ff7864fd89ac5f8d154054c3a7c0e8cb5f82b90f02e7385603 |
PageCount | 6 |
ParticipantIDs | ieee_primary_9359069 |
PublicationCentury | 2000 |
PublicationDate | 2020-Dec. |
PublicationDateYYYYMMDD | 2020-12-01 |
PublicationDate_xml | – month: 12 year: 2020 text: 2020-Dec. |
PublicationDecade | 2020 |
PublicationTitle | 2020 International Computer Symposium (ICS) |
PublicationTitleAbbrev | ICS |
PublicationYear | 2020 |
Publisher | IEEE |
Publisher_xml | – name: IEEE |
Score | 1.7443749 |
Snippet | The network technology plays an important role in the emerging industry 4.0. Industrial control systems (ICS) are related to all aspects of human life and have... |
SourceID | ieee |
SourceType | Publisher |
StartPage | 414 |
SubjectTerms | anomaly detection system cyber security Industrial Internet of Things Integrated circuits internet of things Machine learning Prediction algorithms Predictive models Radio frequency Systematics |
Title | Feature Selection for Malicious Traffic Detection with Machine Learning |
URI | https://ieeexplore.ieee.org/document/9359069 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3PT8MgGCXbTp7UbMbf4eBRNqBA4Tyd02TGZC7ZbQEKxphsZmkv_vXytXUa48EboU1b4PAe9L33IXQVGcsL6QQJBZVEsDwjWntKOCtspqTlvlH5PqrpQjws5bKDrndemBBCLT4LQ2jW__KLja_gqGwELlKqTBd108at8Wq1QUKMmtH9eJ7QS4P7hINei0I1lR8lU2rEmOyj2de7GqHI27Aq3dB__Iph_O_HHKDBtzcPP-1Q5xB1wrqP7oDJVduA53VZmzTXOJFRPEsk24PIFSdIgqwIfBPK9jocwKYbQEoZcJuy-jJAi8nt83hK2hIJ5DXtDEqiEn2KUUXumKUmNXOtRCy0sV5GXTDgY8JnNvc0aO9SH3eGRsoDpNgomh2h3nqzDscIU-PTIxS3mdFCSqe9dFYZ50XmNLXqBPVhElbvTQrGqh3_6d_dZ2gPlqERfpyjXrmtwkWC79Jd1uv2Ce4Rm5k |
linkProvider | IEEE |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV09T8MwFHwqZYAJUIv4xgMjbh0ncey5UFpoK6S2UrfKdhyEkFpUJQu_Hr8kFIQY2CwnysfzcBfn7h7ATRYESRqbiLqUxTQKkpBKaRnlQapDEWtuK5XvRAzm0eMiXjTgduuFcc6V4jPXwWH5Lz9d2wK3yrroImVC7cCux_2YV26tOkooYKo77E09fkn0n3BUbDHsp_KjaUqJGf0DGH_drZKKvHWK3HTsx68gxv8-ziG0v9155HmLO0fQcKsWPCCXKzaOTMvGNr7axNNRMvY026LMlXhQwrQIcufy-jhuwfoTUEzpSJ2z-tKGef9-1hvQukkCffXfBjkVnkBlmci4CTRTfphIEWWpVNrGmUwDZGSRDXVimZPW-DluFMsYd5hjI1h4DM3VeuVOgDBl_SUE16GSvr5G2thooYyNQiOZFqfQwiIs36scjGX9_md_T1_D3mA2Hi1Hw8nTOezjklQykAto5pvCXXowz81VuYafP6ee4w |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2020+International+Computer+Symposium+%28ICS%29&rft.atitle=Feature+Selection+for+Malicious+Traffic+Detection+with+Machine+Learning&rft.au=Wang%2C+Sying-Jyan&rft.au=Cai%2C+Cheng+Xuan&rft.au=Tseng%2C+Yen-Wen&rft.au=Li%2C+Katherine+Shu-Min&rft.date=2020-12-01&rft.pub=IEEE&rft.spage=414&rft.epage=419&rft_id=info:doi/10.1109%2FICS51289.2020.00088&rft.externalDocID=9359069 |