TY - GEN
T1 - Demise
T2 - 14th International Conference on Availability, Reliability and Security, ARES 2019
AU - Parker, Luke R.
AU - Yoo, Paul D.
AU - Asyhari, Taufiq A.
AU - Chermak, Lounis
AU - Jhi, Yoonchan
AU - Taha, Kamal
N1 - Funding Information:
We are grateful to the Laboratory of Information and Communication Systems Security at George Mason University in the U.S. for providing us a copy of AWID dataset as well as their invaluable discussions; and special thanks to Samsung SDS for their constructive criticism and financial support on this work.
Publisher Copyright:
© 2019 Association for Computing Machinery. All rights reserved.
PY - 2019/8/26
Y1 - 2019/8/26
N2 - Recent studies have proposed that traditional security technology – involving pattern-matching algorithms that check predefined pattern sets of intrusion signatures – should be replaced with sophisticated adaptive approaches that combine machine learning and behavioural analytics. However, machine learning is performance driven, and the high computational cost is incompatible with the limited computing power, memory capacity and energy resources of portable IoT-enabled devices. The convoluted nature of deep-structured machine learning means that such models also lack transparency and interpretability. The knowledge obtained by interpretable learners is critical in security software design. We therefore propose two novel models featuring a common Deep Extraction and Mutual Information Selection (DEMISe) element which extracts features using a deep-structured stacked autoencoder, prior to feature selection based on the amount of mutual information (MI) shared between each feature and the class label. An entropy-based tree wrapper is used to optimise the feature subsets identified by the DEMISe element, yielding the DEMISe with Tree Evaluation and Regression Detection (DETEReD) model. This affords ‘white box’ insight, and achieves a time to build of 603 seconds, a 99.07% detection rate, and 98.04% model accuracy. When tested against AWID, the best-referenced intrusion detection dataset, the new models achieved a test error comparable to or better than state-of-the-art machine-learning models, with a lower computational cost and higher levels of transparency and interpretability.
AB - Recent studies have proposed that traditional security technology – involving pattern-matching algorithms that check predefined pattern sets of intrusion signatures – should be replaced with sophisticated adaptive approaches that combine machine learning and behavioural analytics. However, machine learning is performance driven, and the high computational cost is incompatible with the limited computing power, memory capacity and energy resources of portable IoT-enabled devices. The convoluted nature of deep-structured machine learning means that such models also lack transparency and interpretability. The knowledge obtained by interpretable learners is critical in security software design. We therefore propose two novel models featuring a common Deep Extraction and Mutual Information Selection (DEMISe) element which extracts features using a deep-structured stacked autoencoder, prior to feature selection based on the amount of mutual information (MI) shared between each feature and the class label. An entropy-based tree wrapper is used to optimise the feature subsets identified by the DEMISe element, yielding the DEMISe with Tree Evaluation and Regression Detection (DETEReD) model. This affords ‘white box’ insight, and achieves a time to build of 603 seconds, a 99.07% detection rate, and 98.04% model accuracy. When tested against AWID, the best-referenced intrusion detection dataset, the new models achieved a test error comparable to or better than state-of-the-art machine-learning models, with a lower computational cost and higher levels of transparency and interpretability.
KW - Deep learning
KW - Feature engineering
KW - IoT
KW - Lightweight intrusion detection
KW - Mutual information
KW - Security mobility applications
KW - Security of resource constrained devices
KW - White-box modelling
UR - https://www.scopus.com/pages/publications/85071726306
U2 - 10.1145/3339252.3340497
DO - 10.1145/3339252.3340497
M3 - Conference contribution
AN - SCOPUS:85071726306
T3 - ACM International Conference Proceeding Series
BT - Proceedings of the 14th International Conference on Availability, Reliability and Security, ARES 2019
Y2 - 26 August 2019 through 29 August 2019
ER -