Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

Hunt for Unseen Intrusion: Multi-Head Self-Attention Neural Detector

Full metadata record
DC Field Value Language
dc.contributor.authorSeo, Seongyun-
dc.contributor.authorHan, Sungmin-
dc.contributor.authorPark, Janghyeon-
dc.contributor.authorShim, Shinwoo-
dc.contributor.authorRyu, Han-Eul-
dc.contributor.authorCho, Byoungmo-
dc.contributor.authorLee, Sangkyun-
dc.date.accessioned2022-03-12T02:40:57Z-
dc.date.available2022-03-12T02:40:57Z-
dc.date.created2022-01-20-
dc.date.issued2021-
dc.identifier.issn2169-3536-
dc.identifier.urihttps://scholar.korea.ac.kr/handle/2021.sw.korea/138669-
dc.description.abstractA network intrusion detection (NID) system plays a critical role in cybersecurity. However, the existing machine learning-based NID research has a vital issue that their experimental settings do not reflect real-world situations where unknown attacks are constantly emerging. In particular, their train and test sets are from a single data set, which inevitably overestimates the detection power since all test attack types are known in training, and test cases will have similar characteristics to the training data. This paper introduces a new strategy to constitute test data with updated traffic with attack types not included in training data. In the proposed setting, the prediction accuracy of the existing detectors is dropped by about 20% compared to what has been reported. Also, in- depth analysis of detection performance by attack types has revealed that the existing models have strength at certain attack types but struggle to detect the other attack types such as DoS, DDoS, web attack, and port scan. To overcome the issues, we propose a new neural detector, called MHSA, based on a multi-head self-attention mechanism whose architecture suits better to capture scattered pieces of evidence in network traffic. Our model improved the overall detection performance by 29% in false positive rate at the true positive rate of 0.9 and by 9% in AUC over the current state-of-the-art models, successfully detecting the attacks that are not well captured before. Furthermore, we show that our proposed MHSA model even outperforms the best ensemble detector constructed by joining the state-of-the-art classifiers.-
dc.languageEnglish-
dc.language.isoen-
dc.publisherIEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC-
dc.subjectSUPPORT VECTOR MACHINE-
dc.subjectDETECTION SYSTEM-
dc.subjectDETECTION MODEL-
dc.subjectNETWORK-
dc.titleHunt for Unseen Intrusion: Multi-Head Self-Attention Neural Detector-
dc.typeArticle-
dc.contributor.affiliatedAuthorLee, Sangkyun-
dc.identifier.doi10.1109/ACCESS.2021.3113124-
dc.identifier.scopusid2-s2.0-85115130863-
dc.identifier.wosid000698840400001-
dc.identifier.bibliographicCitationIEEE ACCESS, v.9, pp.129635 - 129647-
dc.relation.isPartOfIEEE ACCESS-
dc.citation.titleIEEE ACCESS-
dc.citation.volume9-
dc.citation.startPage129635-
dc.citation.endPage129647-
dc.type.rimsART-
dc.type.docTypeArticle-
dc.description.journalClass1-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
dc.relation.journalResearchAreaComputer Science-
dc.relation.journalResearchAreaEngineering-
dc.relation.journalResearchAreaTelecommunications-
dc.relation.journalWebOfScienceCategoryComputer Science, Information Systems-
dc.relation.journalWebOfScienceCategoryEngineering, Electrical & Electronic-
dc.relation.journalWebOfScienceCategoryTelecommunications-
dc.subject.keywordPlusSUPPORT VECTOR MACHINE-
dc.subject.keywordPlusDETECTION SYSTEM-
dc.subject.keywordPlusDETECTION MODEL-
dc.subject.keywordPlusNETWORK-
dc.subject.keywordAuthorDetectors-
dc.subject.keywordAuthorConvolutional neural networks-
dc.subject.keywordAuthorTraining-
dc.subject.keywordAuthorFeature extraction-
dc.subject.keywordAuthorSupport vector machines-
dc.subject.keywordAuthorData models-
dc.subject.keywordAuthorDeep learning-
dc.subject.keywordAuthorDeep neural network-
dc.subject.keywordAuthorintrusion detection-
dc.subject.keywordAuthormulti-head attention-
dc.subject.keywordAuthorrealistic prediction performance evaluation-
dc.subject.keywordAuthorself-attention-
Files in This Item
There are no files associated with this item.
Appears in
Collections
School of Cyber Security > Department of Information Security > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Altmetrics

Total Views & Downloads

BROWSE