Abstract
In the recent years, cybersecurity has gained high relevance, converting the detection of attacks or intrusions into a key task. In fact, a small breach in a system, application, or network, can cause huge damage for the companies. However, when this attack detection encounters the Artificial Intelligence paradigm, it can be addressed using high-quality classifiers which often need high resource demands in terms of computation or memory usage. This situation has a high impact when the attack classifiers need to be used with limited resourced devices or without overloading the performance of the devices, as it happens for example in IoT devices, or in industrial systems. For overcoming this issue, NBcoded, a novel light attack classification tool is proposed in this work. NBcoded works in a pipeline combining the removal of noisy data properties of the encoders with the low resources and timing consuming obtained by the Naive Bayes classifier. This work compares three different NBcoded implementations based on three different Naive Bayes likelihood distribution assumptions (Gaussian, Complement and Bernoulli). Then, the best NBcoded is compared with state of the art classifiers like Multilayer Perceptron and Random Forest. Our implementation shows to be the best model reducing the impact of training time and disk usage, even if it is outperformed by the other two in terms of Accuracy and F1-score (\({\sim }2\)%).
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Agrafiotis, I., Nurse, J.R.C., Goldsmith, M., Creese, S., Upton, D.: A taxonomy of cyber-harms: defining the impacts of cyber-attacks and understanding how they propagate. J. Cybersecur. 4, tyy006 (2018)
Ahmed, S., Lee, Y., Hyun, S.H., Koo, I.: Mitigating the impacts of covert cyber attacks in smart grids via reconstruction of measurement data utilizing deep denoising autoencoders. Energies 12(16), 3091 (2019)
Al-Qatf, M., Lasheng, Y., Al-Habib, M., Al-Sabahi, K.: Deep learning approach combining sparse autoencoder with SVM for network intrusion detection. IEEE Access 6, 52843–52856 (2018)
Al-Zewairi, M., Almajali, S., Awajan, A.: Experimental evaluation of a multi-layer feed-forward artificial neural network classifier for network intrusion detection system. In: 2017 International Conference on New Trends in Computing Sciences (ICTCS), pp. 167–172. IEEE (2017)
Bayes, T.: LII. An essay towards solving a problem in the doctrine of chances. By the late rev. Mr. Bayes, FRS communicated by MR. price, in a letter to John Canton, AMFR S. Philos. Trans. R. Soc. Lond. 53(53), 370–418 (1763)
Belouch, M., El Hadaj, S., Idhammad, M.: Performance evaluation of intrusion detection based on machine learning using apache spark. Procedia Comput. Sci. 127, 1–6 (2018)
Bourlard, H., Kamp, Y.: Auto-association by multilayer perceptrons and singular value decomposition. Biol. Cybern. 59(4), 291–294 (1988)
Boyes, H., Hallaq, B., Cunningham, J., Watson, T.: The industrial internet of things (IIoT): an analysis framework. Comput. Ind. 101, 1–12 (2018)
Burnaev, E., Smolyakov, D.: One-class SVM with privileged information and its application to malware detection. In: 2016 IEEE 16th International Conference on Data Mining Workshops (ICDMW), pp. 273–280. IEEE (2016)
Catak, F.O., Mustacoglu, A.F.: Distributed denial of service attack detection using autoencoder and deep neural networks. J. Intell. Fuzzy Syst. 37(3), 3969–3979 (2019)
Chen, J., Wu, D., Zhao, Y., Sharma, N., Blumenstein, M., Yu, S.: Fooling intrusion detection systems using adversarially autoencoder. Digit. Commun. Netw. 7(3), 453–460 (2020)
David, A.O., Joseph, U.J.: A novel immune inspaired concept with neural network for intrusion detection in cybersecurity (2020)
Dixit, P., Silakari, S.: Deep learning algorithms for cybersecurity applications: a technological and status review. Comput. Sci. Rev. 39, 100317 (2021)
Fernández, A., García, S., Galar, M., Prati, R.C., Krawczyk, B., Herrera, F.: Learning from Imbalanced Data Sets, vol. 11. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-98074-4
Jackins, V., Vimal, S., Kaliappan, M., Lee, M.Y.: Ai-based smart prediction of clinical disease using random forest classifier and naive bayes. J. Supercomput. 77(5), 5198–5219 (2021)
Khoo, Y., Lu, J., Ying, L.: Solving parametric PDE problems with artificial neural networks. Eur. J. Appl. Math. 32(3), 421–435 (2021)
Krishnan, S., et al.: Artificial intelligence in resource-constrained and shared environments. ACM SIGOPS Oper. Syst. Rev. 53(1), 1–6 (2019)
Li, G., Liu, Q., Zhao, S., Qiao, W., Ren, X.: Automatic crack recognition for concrete bridges using a fully convolutional neural network and Naive Bayes data fusion based on a visual detection system. Meas. Sci. Technol. 31(7), 075403 (2020)
Liu, M., Lang, R., Cao, Y.: Number of trees in random forest. Comput. Eng. Appl. 51(5), 126–131 (2015)
Lombardi, M., Pascale, F., Santaniello, D.: Internet of things: a general overview between architectures, protocols and applications. Information 12(2), 87 (2021)
Lyons, J., et al.: Predicting backbone c\(\alpha \) angles and dihedrals from protein sequences by stacked sparse auto-encoder deep neural network. J. Comput. Chem. 35(28), 2040–2046 (2014)
McCallum, A., Nigam, K., et al.: A comparison of event models for Naive Bayes text classification. In: AAAI 1998 Workshop on Learning for Text Categorization, vol. 752, pp. 41–48. Citeseer (1998)
Menon, A.P., Varghese, A., Joseph, J.P., Sajan, J., Francis, N.: Performance analysis of different classifiers for earthquake prediction: PACE (2020)
Mienye, I.D., Sun, Y., Wang, Z.: Improved sparse autoencoder based artificial neural network approach for prediction of heart disease. Inform. Med. Unlocked 18, 100307 (2020)
Monshizadeh, M., Khatri, V., Atli, B.G., Kantola, R., Yan, Z.: Performance evaluation of a combined anomaly detection platform. IEEE Access 7, 100964–100978 (2019)
Moustafa, N., Slay, J.: UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set). In: 2015 Military Communications and Information Systems Conference (MILCIS), pp. 1–6. IEEE (2015)
Murphy, K.P., et al.: Naive Bayes classifiers. Univ. Br. Columbia 18(60), 1–8 (2006)
Rennie, J.D., Shih, L., Teevan, J., Karger, D.R.: Tackling the poor assumptions of Naive Bayes text classifiers. In: Proceedings of the 20th International Conference on Machine Learning (ICML 2003), pp. 616–623 (2003)
Rukmawan, S., Aszhari, F., Rustam, Z., Pandelaki, J.: Cerebral infarction classification using the k-nearest neighbor and Naive Bayes classifier. In: Journal of Physics: Conference Series, vol. 1752, p. 012045. IOP Publishing (2021)
Saad, O.M., Inoue, K., Shalaby, A., Sarny, L., Sayed, M.S.: Autoencoder based features extraction for automatic classification of earthquakes and explosions. In: ICIS, pp. 445–450 (2018)
Sallinen, M.: Weaponized malware, physical damage, zero casualties-what informal norms are emerging in targeted state sponsored cyber-attacks?: the dynamics beyond causation: an interpretivist-constructivist analysis of the us media discourse regarding offensive cyber operations and cyber weapons between 2010 and 2020 (2021)
Shaukat, K., et al.: Performance comparison and current challenges of using machine learning techniques in cybersecurity. Energies 13(10), 2509 (2020)
Sundararajan, K., et al.: Sleep classification from wrist-worn accelerometer data using random forests. Sci. Rep. 11(1), 1–10 (2021)
Verbraeken, J., Wolting, M., Katzy, J., Kloppenburg, J., Verbelen, T., Rellermeyer, J.S.: A survey on distributed machine learning. ACM Comput. Surv. (CSUR) 53(2), 1–33 (2020)
Verma, J., Bhandari, A., Singh, G.: Review of existing data sets for network intrusion detection system. Adv. Math. 9(6), 3849–3854 (2020)
Wang, H., Wang, H., Wu, Z., Zhou, Y.: Using multi-factor analysis to predict urban flood depth based on Naive Bayes. Water 13(4), 432 (2021)
Wankhede, S., Kshirsagar, D.: DoS attack detection using machine learning and neural network. In: 2018 Fourth International Conference on Computing Communication Control and Automation (ICCUBEA), pp. 1–5. IEEE (2018)
Wirkuttis, N., Klein, H.: Artificial intelligence in cybersecurity. Cyber Intell. Secur. J. 1(1), 21–23 (2017)
Zhang, H., Wu, C.Q., Gao, S., Wang, Z., Xu, Y., Liu, Y.: An effective deep learning based scheme for network intrusion detection. In: 2018 24th International Conference on Pattern Recognition (ICPR), pp. 682–687. IEEE (2018)
Zhou, J., Chan, K., Chong, V., Krishnan, S.M.: Extraction of brain tumor from MR images using one-class support vector machine. In: 2005 IEEE Engineering in Medicine and Biology 27th Annual Conference, pp. 6411–6414. IEEE (2006)
Zhou, Y., Han, M., Liu, L., He, J.S., Wang, Y.: Deep learning approach for cyberattack detection. In: IEEE INFOCOM 2018-IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), pp. 262–267. IEEE (2018)
Zoghi, Z., Serpen, G.: UNSW-NB15 computer security dataset: analysis through visualization. arXiv preprint arXiv:2101.05067 (2021)
Zola, F., Segurola, L., Bruse, J.L., Idoate, M.G.: Temporal graph-based approach for behavioural entity classification. arXiv preprint arXiv:2105.04798 (2021)
Acknowledgements
This work has been partially supported by the Spanish Centre for the Development of Industrial Technology (CDTI) under the project ÉGIDA (EXP 00122721/CER-20191012) - RED DE EXCELENCIA EN TECNOLOGIAS DE SEGURIDAD Y PRIVACIDAD and by the Basque Country Government under the ELKARTEK program, project TRUSTIND (KK-2020/00054).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 Springer Nature Switzerland AG
About this paper
Cite this paper
Segurola-Gil, L., Zola, F., Echeberria-Barrio, X., Orduna-Urrutia, R. (2021). NBcoded: Network Attack Classifiers Based on Encoder and Naive Bayes Model for Resource Limited Devices. In: Kamp, M., et al. Machine Learning and Principles and Practice of Knowledge Discovery in Databases. ECML PKDD 2021. Communications in Computer and Information Science, vol 1525. Springer, Cham. https://doi.org/10.1007/978-3-030-93733-1_4
Download citation
DOI: https://doi.org/10.1007/978-3-030-93733-1_4
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-93732-4
Online ISBN: 978-3-030-93733-1
eBook Packages: Computer ScienceComputer Science (R0)