Searching for just a few words should be enough to get started. If you need to make more complex queries, use the tips below to guide you.
Article type: Research Article
Authors: Qu, Haichenga; * | Qin, Jitaoa | Chen, Haob
Affiliations: [a] Institute of Software, Liaoning Technical University, Huludao, Liaoning 125105, China | [b] Department of Information Engineering, Harbin Institute of Technology, Harbin, Heilongjiang 150001, China
Correspondence: [*] Corresponding author: Jitao Qin, Institute of Software, Liaoning Technical University, Huludao, Liaoning 125105, China. E-mail: lgc_qinjitao@sina.com.
Abstract: In cyber anomaly detection, if the detected target is significantly different from the predefined normal network data pattern, it is considered an outlier. However, the degree of deviation from the normal model is often difficult to determine, making it difficult to effectively identify attack categories that are similar to normal network data and have small sample sizes. To address this problem, we propose a novel anomaly detection method called a comparison network (C-Net), which has a double-branch structure for a neural network. Instead of learning the correspondence between sample values and labels by neural networks, the C-Net model fits the difference values between different classes of samples and learns the correspondence between the difference values and the labels. This approach avoids the process of determining the degree of difference and addresses the problem of low attack recognition rates for attack classes that are similar to normal network data and have small sample sizes. Our model is split into the auto-encoder network and the comparison component. The former is applied to compress the normal data and detected object to collect essential features and reconstruct the input part of the network. The comparison component then uses the reconstructed input to find the difference between the normal data and the detected object. According the degree of difference, the detected object is categorized as normal or an outlier. We performed experiments using a water storage dataset. Our modelâs detection rate of the Complex Malicious Response Injection (CMRI) attack category reached 95.5%, while the cyber anomaly detection algorithms based on machine learning (OCSVM, K-means, simple-One-Class, etc.) could not detect the attack. For the KDDCUP99 data, our model achieved a 99.52% detection rate in the R2L category compared to a rate of 54.62% achieved by the cyber anomaly detection algorithms based on machine learning.
Keywords: Anomaly detection, neural network, comparison network, mixups
DOI: 10.3233/IDA-184391
Journal: Intelligent Data Analysis, vol. 23, no. 6, pp. 1313-1334, 2019
IOS Press, Inc.
6751 Tepper Drive
Clifton, VA 20124
USA
Tel: +1 703 830 6300
Fax: +1 703 830 2300
sales@iospress.com
For editorial issues, like the status of your submitted paper or proposals, write to editorial@iospress.nl
IOS Press
Nieuwe Hemweg 6B
1013 BG Amsterdam
The Netherlands
Tel: +31 20 688 3355
Fax: +31 20 687 0091
info@iospress.nl
For editorial issues, permissions, book requests, submissions and proceedings, contact the Amsterdam office info@iospress.nl
Inspirees International (China Office)
Ciyunsi Beili 207(CapitaLand), Bld 1, 7-901
100025, Beijing
China
Free service line: 400 661 8717
Fax: +86 10 8446 7947
china@iospress.cn
For editorial issues, like the status of your submitted paper or proposals, write to editorial@iospress.nl
如果您在出版方面需要帮助或有任何建, 件至: editorial@iospress.nl