DEVELOPMENT OF MACHINE LEARNING MODULE IN INTRUSION DETECTION SYSTEM FOR UNKNOWN THREAT DETECTION
Unknown threats are threats with a low occurrence, are modifications of previous threats, or are new threats that have not been recognized by the system before. The technology used to detect attacks on a system is intrusion detection system (IDS). However, IDSs that are commonly used today such a...
Saved in:
Main Author: | |
---|---|
Format: | Final Project |
Language: | Indonesia |
Online Access: | https://digilib.itb.ac.id/gdl/view/82438 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Institut Teknologi Bandung |
Language: | Indonesia |
Summary: | Unknown threats are threats with a low occurrence, are modifications of previous
threats, or are new threats that have not been recognized by the system before. The
technology used to detect attacks on a system is intrusion detection system (IDS).
However, IDSs that are commonly used today such as Suricata still use attack
signature for detection and are not yet able to detect unknown threats.
In this Final Project, experiments were done for several machine learning models
to find out the appropiate model for unknown threat detection based on the CIC-
IDS 2017 dataset. The features in the dataset were reduced using the Pearson
method so that 31 features were obtained from the initial 79 features. Experiments
were conducted by creating training data variants in which one type of attack was
removed as an unknown threat. The models trained with the training variants were
then evaluated using the data with all types of attack. Model with the best
performance were imported and used as detection component in the IDS for further
evaluation.
The experimental results show that XGBoost has an accuracy of 0.99, recall of 0.96,
and recall-unknown of 0.4. One class SVM has an accuracy of 0.55, recall 0.61, and
recall-unknown 0.73. Attack simulation results show that Suricata does not have
the ability to detect some attacks such as port scan and DoS Slowloris. Meanwhile,
the machine-learning-based IDS is able to detect previously unknown attacks but
with false positives and an overhead of 5-7 minutes. |
---|