Preliminary Results in Using Attention for Increasing Attack Identification Efficiency

Research output: Chapter in Book/Conference proceedingPublished conference proceedingScientificpeer-review

3 Citations (Scopus)
157 Downloads (Pure)

Abstract

In previous work, we proposed an end-to-end intrusion early detection system to identify network attacks in real-time before they are complete and could cause more damage to the system under attack. To implement the approach, we have used a deep neural network which was trained in a supervised manner to extract relevant features from raw network traffic in order to classify network flows into different types of attacks. In this work, we discuss the initial results of the benefits that an attention mechanism brings to the classification performance and the capacity of the network to detect attacks earlier. We empirically evaluate our approach on the CICIDS2017 dataset. Preliminary results show that the attention mechanism improves both the balanced accuracy of the classifier as well as the early detection of attacks.
Original languageEnglish
Title of host publicationProceedings - 2023 IEEE 16th International Conference on Software Testing, Verification and Validation Workshops, ICSTW 2023
PublisherIEEE
Pages159-164
Number of pages6
ISBN (Electronic)9798350333350
ISBN (Print)979-8-3503-3336-7
DOIs
Publication statusPublished - May 2023
MoE publication typeA4 Article in a conference publication
EventIEEE International Conference on Software Testing, Verification and Validation - Dublin, Ireland
Duration: 16 Apr 202320 Apr 2023
Conference number: 16
https://conf.researchr.org/home/icst-2023

Publication series

NameIEEE International Conference on Software Testing, Verification and Validation Workshops
PublisherIEEE
ISSN (Print)2159-4848

Conference

ConferenceIEEE International Conference on Software Testing, Verification and Validation
Abbreviated titleICST
Country/TerritoryIreland
CityDublin
Period16/04/2320/04/23
Internet address

Funding

This work was made possible with funding from the European Union’s Horizon 2020 research and innovation programme, under grant agreement No. 957212 (VeriDevOps). The opinions expressed and arguments employed herein do not necessarily reflect the official views of the funding body. This work was made possible with funding from the European Union's Horizon 2020 research and innovation programme, under grant agreement No. 957212 (VeriDevOps). The opinions expressed and arguments employed herein do not necessarily reflect the official views of the funding body.

Keywords

  • Attention Mechanism
  • Deep learning
  • Convolution Neural Network
  • Early Intrusion Detection System

Fingerprint

Dive into the research topics of 'Preliminary Results in Using Attention for Increasing Attack Identification Efficiency'. Together they form a unique fingerprint.

Cite this