EagerNet: Early Predictions of Neural Networks for Computationally Efficient Intrusion Detection

作者: Tanja Zseby , Maximilian Bachl , Fares Meghdouri

DOI: 10.1109/CSNET50428.2020.9265467

关键词:

摘要: Fully Connected Neural Networks (FCNNs) have been the core of most state-of-the-art Machine Learning (ML) applications in recent years and also widely used for Intrusion Detection Systems (IDSs). Experimental results from last show that generally deeper neural networks with more layers perform better than shallow models. Nonetheless, growing number layers, obtaining fast predictions less resources has become a difficult task despite use special hardware such as GPUs. We propose new architecture to detect network attacks minimal resources. The is able deal either binary or multiclass classification problems trades prediction speed accuracy network. evaluate our proposal two different intrusion detection datasets. Results suggest it possible obtain comparable accuracies simple FCNNs without evaluating all majority samples, thus early saving energy computational efforts.

参考文章(20)
Diederik P. Kingma, Jimmy Ba, Adam: A Method for Stochastic Optimization arXiv: Learning. ,(2014)
Sam Leroux, Steven Bohez, Tim Verbelen, Bert Vankeirsbilck, Pieter Simoens, Bart Dhoedt, Resource-constrained classification using a cascade of neural network layers international joint conference on neural network. pp. 1- 7 ,(2015) , 10.1109/IJCNN.2015.7280601
Kirill Trapeznikov, Venkatesh Saligrama, Joseph Wang, Efficient learning by directed acyclic graph for resource constrained prediction neural information processing systems. ,vol. 28, pp. 2152- 2160 ,(2015)
Nigel Williams, Sebastian Zander, Grenville Armitage, A preliminary performance comparison of five machine learning algorithms for practical IP traffic flow classification ACM SIGCOMM Computer Communication Review. ,vol. 36, pp. 5- 16 ,(2006) , 10.1145/1163593.1163596
Kilian Q. Weinberger, Olivier Chapelle, Matt J. Kusner, Zhixiang Xu, Minmin Chen, Classifier cascades and trees for minimizing feature evaluation cost Journal of Machine Learning Research. ,vol. 15, pp. 2113- 2144 ,(2014) , 10.5555/2627435.2670319
Nour Moustafa, Jill Slay, UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set) military communications and information systems conference. pp. 1- 6 ,(2015) , 10.1109/MILCIS.2015.7348942
Alex Graves, Adaptive Computation Time for Recurrent Neural Networks arXiv: Neural and Evolutionary Computing. ,(2016)
Anna L. Buczak, Erhan Guven, A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection IEEE Communications Surveys & Tutorials. ,vol. 18, pp. 1153- 1176 ,(2016) , 10.1109/COMST.2015.2494502
Sam Leroux, Steven Bohez, Elias De Coninck, Tim Verbelen, Bert Vankeirsbilck, Pieter Simoens, Bart Dhoedt, The cascading neural network: building the Internet of Smart Things Knowledge and Information Systems. ,vol. 52, pp. 791- 814 ,(2017) , 10.1007/S10115-017-1029-1
Iman Sharafaldin, Arash Habibi Lashkari, Ali A. Ghorbani, Toward Generating a New Intrusion Detection Dataset and Intrusion Traffic Characterization international conference on information systems security. pp. 108- 116 ,(2018) , 10.5220/0006639801080116