dc.contributor.author | Zhang, Chaoyu | |
dc.contributor.author | Shi, Shanghao | |
dc.contributor.author | Wang, Ning | |
dc.contributor.author | Xu, Xiangxiang | |
dc.contributor.author | Li, Shaoyu | |
dc.contributor.author | Zheng, Lizhong | |
dc.contributor.author | Marchany, Randy | |
dc.contributor.author | Gardner, Mark | |
dc.contributor.author | Hou, Y. Thomas | |
dc.contributor.author | Lou, Wenjing | |
dc.date.accessioned | 2024-11-15T17:07:36Z | |
dc.date.available | 2024-11-15T17:07:36Z | |
dc.date.issued | 2024-10-14 | |
dc.identifier.isbn | 979-8-4007-0521-2 | |
dc.identifier.uri | https://hdl.handle.net/1721.1/157548 | |
dc.description | MobiHoc '24: Twenty-fifth International Symposium on Theory, Algorithmic Foundations, and Protocol Design for Mobile Networks and Mobile Computing Athens Greece October 14 - 17, 2024 | en_US |
dc.description.abstract | Anomaly-Based Intrusion Detection Systems (IDSs) have been extensively researched for their ability to detect zero-day attacks. These systems establish a baseline of normal behavior using benign traffic data and flag deviations from this norm as potential threats. They generally experience higher false alarm rates than signature-based IDSs. Unlike image data, where the observed features provide immediate utility, raw network traffic necessitates additional processing for effective detection. It is challenging to learn useful patterns directly from raw traffic data or simple traffic statistics (e.g., connection duration, package inter-arrival time) as the complex relationships are difficult to distinguish. Therefore, some feature engineering becomes imperative to extract and transform raw data into new feature representations that can directly improve the detection capability and reduce the false positive rate. We propose a geometric feature learning method to optimize the feature extraction process. We employ contrastive feature learning to learn a feature space where normal traffic instances reside in a compact cluster. We further utilize H-Score feature learning to maximize the compactness of the cluster representing the normal behavior, enhancing the subsequent anomaly detection performance. Our evaluations using the NSL-KDD and N-BaloT datasets demonstrate that the proposed IDS powered by feature learning can consistently outperform state-of-the-art anomaly-based IDS methods by significantly lowering the false positive rate. Furthermore, we deploy the proposed IDS on a Raspberry Pi 4 and demonstrate its applicability on resource-constrained Internet of Things (IoT) devices, highlighting its versatility for diverse application scenarios. | en_US |
dc.publisher | ACM|The Twenty-fifth International Symposium on Theory, Algorithmic Foundations, and Protocol Design for Mobile Networks and Mobile Computing | en_US |
dc.relation.isversionof | https://doi.org/10.1145/3641512.3686380 | en_US |
dc.rights | Creative Commons Attribution | en_US |
dc.rights.uri | https://creativecommons.org/licenses/by/4.0/ | en_US |
dc.source | Association for Computing Machinery | en_US |
dc.title | Hermes: Boosting the Performance of Machine-Learning-Based Intrusion Detection System through Geometric Feature Learning | en_US |
dc.type | Article | en_US |
dc.identifier.citation | Zhang, Chaoyu, Shi, Shanghao, Wang, Ning, Xu, Xiangxiang, Li, Shaoyu et al. 2024. "Hermes: Boosting the Performance of Machine-Learning-Based Intrusion Detection System through Geometric Feature Learning." | |
dc.contributor.department | Massachusetts Institute of Technology. Research Laboratory of Electronics | en_US |
dc.contributor.department | Massachusetts Institute of Technology. Department of Electrical Engineering and Computer Science | en_US |
dc.identifier.mitlicense | PUBLISHER_CC | |
dc.eprint.version | Final published version | en_US |
dc.type.uri | http://purl.org/eprint/type/ConferencePaper | en_US |
eprint.status | http://purl.org/eprint/status/NonPeerReviewed | en_US |
dc.date.updated | 2024-11-01T07:46:53Z | |
dc.language.rfc3066 | en | |
dc.rights.holder | The author(s) | |
dspace.date.submission | 2024-11-01T07:46:54Z | |
mit.license | PUBLISHER_CC | |
mit.metadata.status | Authority Work and Publication Information Needed | en_US |