Skip to main content

2L-ZED-IDS: A Two-Level Anomaly Detector for Multiple Attack Classes

  • Conference paper
  • First Online:
Web, Artificial Intelligence and Network Applications (WAINA 2020)

Abstract

Cloud computing is currently a thriving technology. Due to their critical nature, it is necessary to consider all kinds of intrusions and abuses that typically plague cloud environments. In order to maintain its resilient-state, a cloud system should have tools capable of detecting known and updated threats, but also unknown attacks (0-day). This paper presents a two-level deep learning architecture for detecting multiple attack classes. In particular, it is an extension of a previous study with a dual objective: reducing the false alarm rate and improving the detection rate, and testing the system with different types of attacks. The problem is treated as a semi-supervised task, and the anomaly detector exploits deep autoencoder building blocks. The model is described and tested on the recent CICIDS2017 and CSE-CIC-IDS2018 datasets. The performance comparison with our previous study shows a lower false alarm rate and the validity of the model for multiple attack classes.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 229.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 299.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Abadi, M., et al.: TensorFlow: large-scale machine learning on heterogeneous systems (2015). http://tensorflow.org/

  2. Argyris, C.: Double loop learning in organizations. Harv. Bus. Rev. 55(5), 115–125 (1977)

    Google Scholar 

  3. Bengio, Y.: Learning deep architectures for AI. Found. Trends Mach. Learn. 2(1), 1–127 (2009)

    Article  MathSciNet  MATH  Google Scholar 

  4. Catillo, M., Rak, M., Villano, U.: Discovery of DoS attacks by the ZED-IDS anomaly detector. J. High Speed Netw. 25(4), 349–365 (2019)

    Google Scholar 

  5. Chandola, V., Banerjee, A., Kumar, V.: Anomaly detection: a survey. ACM Comput. Surv. 41(3), 1–58 (2009)

    Article  Google Scholar 

  6. Chollet, F., et al.: Keras (2015). https://github.com/fchollet/keras

  7. El-Yaniv, R., Souroujon, O.: Iterative double clustering for unsupervised and semi-supervised learning. In: Dietterich, T.G., Becker, S., Ghahramani, Z. (eds.) Advances in Neural Information Processing Systems 14, pp. 1025–1032. MIT Press (2002)

    Google Scholar 

  8. Goodfellow, I., Bengio, Y., Courville, A.: Deep Learning (2016)

    Google Scholar 

  9. Hajimirzaei, B., Navimipour, N.: Intrusion detection for cloud computing using neural networks and artificial bee colony optimization algorithm. ICT Express 5(1), 56–59 (2018)

    Google Scholar 

  10. Idhammad, M., Karim, A., Belouch, M.: Distributed intrusion detection system for cloud environments based on data mining techniques. Procedia Comput. Sci. 127, 35–41 (2018)

    Article  Google Scholar 

  11. Keegan, N., Ji, S.Y., Chaudhary, A., Concolato, C., Yu, B., Jeong, D.H.: A survey of cloud-based network intrusion detection analysis. Hum.-Centric Comput. Inf. Sci. 6, 1–16 (2016)

    Article  Google Scholar 

  12. Lashkari, A.H., Zang, Y., Owhuo, G., Mamun, M.S.I., Gil, G.D.: Cicflowmeter (formerly iscxflowmeter)—a network traffic flow analyzer. http://www.netflowmeter.ca/netflowmeter.html

  13. Mehmood, Y., Shibli, M.A., Habiba, U., Masood, R.: Intrusion detection system in cloud computing: challenges and opportunities. In: 2013 2nd National Conference on Information Assurance (NCIA), pp. 114–125 (2013)

    Google Scholar 

  14. Mell, P., Grance, T.: The NIST definition of cloud computing. NIST Special Publication 800, 145 (2011)

    Google Scholar 

  15. Moctar, C.B.O.M.E., Konaté, K.: A survey of security challenges in cloud computing. In: 2017 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET), pp. 843–849 (2017)

    Google Scholar 

  16. Moustafa, N., Hu, J., Slay, J.: A holistic review of network anomaly detection systems: a comprehensive survey. J. Netw. Comput. Appl. 128, 33–55 (2018)

    Google Scholar 

  17. Riaz, A., Qadir, J., Younis, U., ur Rasool, R., Ahmad, H.F., Kiani, A.K.: Intrusion detection systems in cloud computing: a contemporary review of techniques and solutions. J. Inf. Sci. Eng. 33, 611–634 (2017)

    Google Scholar 

  18. Sharafaldin, I., Lashkari, A.H., Ghorbani, A.A.: Toward generating a new intrusion detection dataset and intrusion traffic characterization. In: Proceedings of the 4th International Conference on Information Systems Security and Privacy - Volume 1: ICISSP, pp. 108–116. INSTICC, SciTePress (2018)

    Google Scholar 

  19. Slonim, N., Tishby, N.: Document clustering using word clusters via the information bottleneck method. In: Proceedings of the 23rd Annual International ACM SIGIR Conference on Research and Development in Information Retrieval, pp. 208–215. Association for Computing Machinery, New York (2000)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Marta Catillo .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Catillo, M., Rak, M., Villano, U. (2020). 2L-ZED-IDS: A Two-Level Anomaly Detector for Multiple Attack Classes. In: Barolli, L., Amato, F., Moscato, F., Enokido, T., Takizawa, M. (eds) Web, Artificial Intelligence and Network Applications. WAINA 2020. Advances in Intelligent Systems and Computing, vol 1150. Springer, Cham. https://doi.org/10.1007/978-3-030-44038-1_63

Download citation

Publish with us

Policies and ethics