Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3452411.3464445acmconferencesArticle/Chapter ViewAbstractPublication PageshpdcConference Proceedingsconference-collections
research-article
Public Access

GPU-based Classification for Wireless Intrusion Detection

Published: 15 June 2021 Publication History

Abstract

Automated network intrusion detection systems (NIDS) continuously monitor the network traffic to detect attacks or/and anomalies. These systems need to be able to detect attacks and alert network engineers in real-time. Therefore, modern NIDS are built using complex machine learning algorithms that require large training datasets and are time-consuming to train. The proposed work shows that machine learning algorithms from the RAPIDS cuML library on Graphics Processing Units (GPUs) can speed-up the training process on large scale datasets. This approach is able to reduce the training time while providing high accuracy and performance. We demonstrate the proposed approach on a large subset of data extracted from the Aegean Wi-Fi Intrusion Dataset (AWID). Multiple classification experiments were performed on both CPU and GPU. We achieve up to 65x acceleration of training several machine learning methods by moving most of the pipeline computations to the GPU and leveraging the new cuML library as well as the GPU version of the CatBoost library.

References

[1]
Shilpa Bhandari, Avinash K Kukreja, Alina Lazar, Alex Sim, and Kesheng Wu. 2020. Feature Selection Improves Tree-based Classification for Wireless Intrusion Detection. In Proceedings of the 3rd International Workshop on Systems and Network Telemetry and Analytics. 19--26.
[2]
Sweta Bhattacharya, Praveen Kumar Reddy Maddikunta, Rajesh Kaluri, Saurabh Singh, Thippa Reddy Gadekallu, Mamoun Alazab, Usman Tariq, et almbox. 2020. A novel PCA-firefly based XGBoost classification model for intrusion detection in networks using GPU. Electronics, Vol. 9, 2 (2020), 219.
[3]
Leo Breiman. 2001. Random Forests. Mach. Learn., Vol. 45, 1 (Oct. 2001), 5--32.
[4]
Liwei Cao, Xiaoning Jiang, Yumei Zhao, Shouguang Wang, Dan You, and Xianli Xu. 2020. A Survey of Network Attacks on Cyber-Physical Systems. IEEE Access, Vol. 8 (2020), 44219--44227.
[5]
Ohio Supercomputer Center. 1987. Ohio Supercomputer Center. http://osc.edu/ark:/19495/f5s1ph73
[6]
Chih-Chung Chang and Chih-Jen Lin. 2011. LIBSVM: a library for support vector machines. ACM transactions on intelligent systems and technology (TIST), Vol. 2, 3 (2011), 1--27.
[7]
Tianqi Chen and Carlos Guestrin. 2016. XGBoost: A Scalable Tree Boosting System. In Proceedings of the 22Nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (San Francisco, California, USA) (KDD '16). ACM, New York, NY, USA, 785--794.
[8]
Anna Veronika Dorogush, Vasily Ershov, and Andrey Gulin. 2018. CatBoost: gradient boosting with categorical features support. arXiv preprint arXiv:1810.11363 (2018).
[9]
Cristian Estan, Ken Keys, David Moore, and George Varghese. 2004. Building a better NetFlow. ACM SIGCOMM Computer Communication Review, Vol. 34, 4 (2004), 245--256.
[10]
Yogita Hande and Akkalashmi Muddana. 2020. A Survey on Intrusion Detection System for Software Defined Networks (SDN). International Journal of Business Data (2020).
[11]
Khalid Khan, Amjad Mehmood, Shafiullah Khan, Muhammad Altaf Khan, Zeeshan Iqbal, and Wali Khan Mashwani. 2020. A survey on intrusion detection and prevention in wireless ad-hoc networks. Int. J. High Perform. Syst. Archit., Vol. 105 (May 2020), 101701.
[12]
Constantinos Kolias, Georgios Kambourakis, Angelos Stavrou, and Stefanos Gritzalis. 2016. Intrusion Detection in 802.11 Networks: Empirical Evaluation of Threats and a Public Dataset. IEEE Communications Surveys Tutorials, Vol. 18, 1 (2016), 184--208.
[13]
Alina Lazar, Kesheng Wu, and Alexander Sim. 2018. Predicting Network Traffic Using TCP Anomalies. Conference on Big Data (Big Data) (2018).
[14]
Mohammad Masdari and Hemn Khezri. 2020. A survey and taxonomy of the fuzzy signature-based Intrusion Detection Systems. Appl. Soft Comput., Vol. 92 (July 2020), 106301.
[15]
Marco Mellia, Michela Meo, Luca Muscariello, and Dario Rossi. 2008. Passive analysis of TCP anomalies. Computer Networks, Vol. 52, 14 (2008), 2663--2676.
[16]
Fabian Pedregosa, Gaël Varoquaux, Alexandre Gramfort, Vincent Michel, Bertrand Thirion, Olivier Grisel, Mathieu Blondel, Peter Prettenhofer, Ron Weiss, Vincent Dubourg, et almbox. 2011. Scikit-learn: Machine learning in Python. the Journal of machine Learning research, Vol. 12 (2011), 2825--2830.
[17]
Paulo Angelo Alves Resende and André Costa Drummond. 2018. A Survey of Random Forest Based Methods for Intrusion Detection Systems. ACM Comput. Surv., Vol. 51, 3, Article 48 (May 2018), 36 pages. https://doi.org/10.1145/3178582
[18]
Gaganjot Kaur Saini, Malka N Halgamuge, Pallavi Sharma, and James Stephen Purkis. 2020. A Review on Cyberattacks: Security Threats and Solution Techniques for Different Applications. In Cyber Warfare and Terrorism: Concepts, Methodologies, Tools, and Applications. IGI Global, 98--126.
[19]
Chris Sanders. 2017. Practical packet analysis: Using Wireshark to solve real-world network problems. No Starch Press.
[20]
Geeta Singh and Neelu Khare. 2021. A survey of intrusion detection from the perspective of intrusion datasets and machine learning techniques. International Journal of Computers and Applications (2021), 1--11.
[21]
Nasrin Sultana, Naveen Chilamkurti, Wei Peng, and Rabei Alhadad. 2019. Survey on SDN based network intrusion detection system using machine learning approaches. Peer-to-Peer Networking and Applications, Vol. 12, 2 (March 2019), 493--501.
[22]
Astha Syal, Alina Lazar, Jinoh Kim, Alex Sim, and Kesheng Wu. 2019. Automatic detection of network traffic anomalies and changes. In Proceedings of the ACM Workshop on Systems and Network Telemetry and Analytics. 3--10.

Cited By

View all
  • (2024)Optimization of Circular Loop Antenna With Step Change in Loop Width Using Machine Learning TechniquesDesign and Optimization of Wearable, Implantable, and Edible Antennas10.4018/979-8-3693-2659-6.ch006(102-126)Online publication date: 31-May-2024
  • (2023)A Gradient Boosted ML Approach to Feature Selection for Wireless Intrusion Detection2023 IEEE 97th Vehicular Technology Conference (VTC2023-Spring)10.1109/VTC2023-Spring57618.2023.10199490(1-5)Online publication date: Jun-2023
  • (2022)Hyperparameter Tuning Algorithm Comparison with Machine Learning Algorithms2022 6th International Conference on Information Technology, Information Systems and Electrical Engineering (ICITISEE)10.1109/ICITISEE57756.2022.10057630(183-188)Online publication date: 13-Dec-2022

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
SNTA '21: Proceedings of the 2021 on Systems and Network Telemetry and Analytics
June 2021
46 pages
ISBN:9781450383868
DOI:10.1145/3452411
  • General Chairs:
  • Massimo Cafaro,
  • Jinoh Kim,
  • Alex Sim
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 15 June 2021

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. classification
  2. gpu
  3. network intrusion detection
  4. wi-fi networks

Qualifiers

  • Research-article

Funding Sources

Conference

HPDC '21
Sponsor:

Acceptance Rates

Overall Acceptance Rate 22 of 106 submissions, 21%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)107
  • Downloads (Last 6 weeks)11
Reflects downloads up to 01 Sep 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Optimization of Circular Loop Antenna With Step Change in Loop Width Using Machine Learning TechniquesDesign and Optimization of Wearable, Implantable, and Edible Antennas10.4018/979-8-3693-2659-6.ch006(102-126)Online publication date: 31-May-2024
  • (2023)A Gradient Boosted ML Approach to Feature Selection for Wireless Intrusion Detection2023 IEEE 97th Vehicular Technology Conference (VTC2023-Spring)10.1109/VTC2023-Spring57618.2023.10199490(1-5)Online publication date: Jun-2023
  • (2022)Hyperparameter Tuning Algorithm Comparison with Machine Learning Algorithms2022 6th International Conference on Information Technology, Information Systems and Electrical Engineering (ICITISEE)10.1109/ICITISEE57756.2022.10057630(183-188)Online publication date: 13-Dec-2022
  • (2022)Pick Quality Over Quantity: Expert Feature Selection and Data Preprocessing for 802.11 Intrusion Detection SystemsIEEE Access10.1109/ACCESS.2022.318359710(64761-64784)Online publication date: 2022

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Get Access

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media