The Cross-evaluation of Machine Learning-based Network Intrusion Detection Systems

Giovanni Apruzzese, Luca Pajola, Mauro Conti

Research output: Contribution to journalArticleScientificpeer-review

34 Citations (Scopus)
21 Downloads (Pure)

Abstract

Enhancing Network Intrusion Detection Systems (NIDS) with supervised Machine Learning (ML) is tough. ML-NIDS must be trained and evaluated, operations requiring data where benign and malicious samples are clearly labeled. Such labels demand costly expert knowledge, resulting in a lack of real deployments, as well as on papers always relying on the same outdated data. The situation improved recently, as some efforts disclosed their labeled datasets. However, most past works used such datasets just as a 'yet another' testbed, overlooking the added potential provided by such availability. In contrast, we promote using such existing labeled data to cross-evaluate ML-NIDS. Such approach received only limited attention and, due to its complexity, requires a dedicated treatment. We hence propose the first cross-evaluation model. Our model highlights the broader range of realistic use-cases that can be assessed via cross-evaluations, allowing the discovery of still unknown qualities of state-of-the-art ML-NIDS. For instance, their detection surface can be extended - at no additional labeling cost. However, conducting such cross-evaluations is challenging. Hence, we propose the first framework, XeNIDS, for reliable cross-evaluations based on Network Flows. By using XeNIDS on six well-known datasets, we demonstrate the concealed potential, but also the risks, of cross-evaluations of ML-NIDS.

Original languageEnglish
Pages (from-to)5152 - 5169
Number of pages18
JournalIEEE Transactions on Network and Service Management
Volume19
Issue number4
DOIs
Publication statusPublished - 2022

Bibliographical note

Green Open Access added to TU Delft Institutional Repository 'You share, we take care!' - Taverne project https://www.openaccess.nl/en/you-share-we-take-care
Otherwise as indicated in the copyright section: the publisher is the copyright holder of this work and the author uses the Dutch legislation to make this work public.

Keywords

  • Machine Learning
  • Intrusion Detection Systems
  • Network Security
  • Evaluation

Fingerprint

Dive into the research topics of 'The Cross-evaluation of Machine Learning-based Network Intrusion Detection Systems'. Together they form a unique fingerprint.

Cite this