当前位置: X-MOL 学术ACM Trans. Internet Technol. › 论文详情
Our official English website, www.x-mol.net, welcomes your feedback! (Note: you will need to create a separate account there.)
A Comparative Study of AI-Based Intrusion Detection Techniques in Critical Infrastructures
ACM Transactions on Internet Technology ( IF 5.3 ) Pub Date : 2021-07-22 , DOI: 10.1145/3406093
Safa Otoum 1 , Burak Kantarci 2 , Hussein Mouftah 2
Affiliation  

Volunteer computing uses Internet-connected devices (laptops, PCs, smart devices, etc.), in which their owners volunteer them as storage and computing power resources, has become an essential mechanism for resource management in numerous applications. The growth of the volume and variety of data traffic on the Internet leads to concerns on the robustness of cyberphysical systems especially for critical infrastructures. Therefore, the implementation of an efficient Intrusion Detection System for gathering such sensory data has gained vital importance. In this article, we present a comparative study of Artificial Intelligence (AI)-driven intrusion detection systems for wirelessly connected sensors that track crucial applications. Specifically, we present an in-depth analysis of the use of machine learning, deep learning and reinforcement learning solutions to recognise intrusive behavior in the collected traffic. We evaluate the proposed mechanisms by using KDD’99 as real attack dataset in our simulations. Results present the performance metrics for three different IDSs, namely the Adaptively Supervised and Clustered Hybrid IDS (ASCH-IDS), Restricted Boltzmann Machine-based Clustered IDS (RBC-IDS), and Q-learning based IDS (Q-IDS), to detect malicious behaviors. We also present the performance of different reinforcement learning techniques such as State-Action-Reward-State-Action Learning (SARSA) and the Temporal Difference learning (TD). Through simulations, we show that Q-IDS performs with detection rate while SARSA-IDS and TD-IDS perform at the order of .

中文翻译:

关键基础设施中基于人工智能的入侵检测技术比较研究

自愿计算使用联网设备(笔记本电脑、PC、智能设备等),其所有者自愿将它们作为存储和计算能力资源,已成为众多应用中资源管理的重要机制。互联网上数据流量的数量和种类的增长导致人们担心网络物理系统的稳健性,尤其是关键基础设施的稳健性。因此,实施用于收集此类感官数据的高效入侵检测系统变得至关重要。在本文中,我们对用于跟踪关键应用的无线连接传感器的人工智能 (AI) 驱动的入侵检测系统进行了比较研究。具体来说,我们对机器学习的使用进行了深入分析,深度学习和强化学习解决方案,以识别收集的流量中的侵入行为。我们通过在我们的模拟中使用 KDD'99 作为真实攻击数据集来评估所提出的机制。结果展示了三种不同 IDS 的性能指标,即自适应监督和集群混合 IDS (ASCH-IDS)、基于受限玻尔兹曼机的集群 IDS (RBC-IDS) 和基于 Q 学习的 IDS (Q-IDS),以检测恶意行为。我们还展示了不同强化学习技术的性能,例如状态-动作-奖励-状态-动作学习 (SARSA) 和时间差异学习 (TD)。通过模拟,我们表明 Q-IDS 与 结果展示了三种不同 IDS 的性能指标,即自适应监督和集群混合 IDS (ASCH-IDS)、基于受限玻尔兹曼机的集群 IDS (RBC-IDS) 和基于 Q 学习的 IDS (Q-IDS),以检测恶意行为。我们还展示了不同强化学习技术的性能,例如状态-动作-奖励-状态-动作学习 (SARSA) 和时间差异学习 (TD)。通过模拟,我们表明 Q-IDS 与 结果展示了三种不同 IDS 的性能指标,即自适应监督和集群混合 IDS (ASCH-IDS)、基于受限玻尔兹曼机的集群 IDS (RBC-IDS) 和基于 Q 学习的 IDS (Q-IDS),以检测恶意行为。我们还展示了不同强化学习技术的性能,例如状态-动作-奖励-状态-动作学习 (SARSA) 和时间差异学习 (TD)。通过模拟,我们表明 Q-IDS 与 我们还展示了不同强化学习技术的性能,例如状态-动作-奖励-状态-动作学习 (SARSA) 和时间差异学习 (TD)。通过模拟,我们表明 Q-IDS 与 我们还展示了不同强化学习技术的性能,例如状态-动作-奖励-状态-动作学习 (SARSA) 和时间差异学习 (TD)。通过模拟,我们表明 Q-IDS 与 SARSA-IDS 和 TD-IDS 的检测率约为 .
更新日期:2021-07-22
down
wechat
bug