=Paper=
{{Paper
|id=Vol-3762/475
|storemode=property
|title=Adaptive Ensemble Learning for Intrusion Detection Systems
|pdfUrl=https://ceur-ws.org/Vol-3762/475.pdf
|volume=Vol-3762
|authors=Vincenzo Agate,Federico Concone,Alessandra De Paola,Pierluca Ferraro,Salvatore Gaglio,Giuseppe Lo Re,Marco Morana
|dblpUrl=https://dblp.org/rec/conf/ital-ia/AgateCPFGRM24
}}
==Adaptive Ensemble Learning for Intrusion Detection Systems==
Adaptive Ensemble Learning for Intrusion Detection
Systems
Vincenzo Agate, Federico Concone* , Alessandra De Paola, Pierluca Ferraro, Salvatore Gaglio,
Giuseppe Lo Re and Marco Morana
Università degli Studi di Palermo, Dipartimento di Ingegneria, Palermo, Italy
Abstract
For years, the European Commission has highlighted the need to invest in cybersecurity as a means of protecting institutions
and citizens from the many threats in cyberspace. Attacks perpetrated through the network are extremely dangerous, also
because their mitigation is complex, making it difficult to ensure an adequate level of security. One of the crucial elements in
building an overall system of protection against network-based cyber attacks are Intrusion Detection Systems (IDSs), whose
goal is to detect and identify such attacks and misuse of computer networks in a timely manner. Nowadays, the most effective
IDSs are based on Machine Learning (ML) and are able to combine and analyze information from heterogeneous sources,
such as network traffic, user activity patterns, and data extracted from system logs. However, these tools commonly exploit
specific classifiers, whose performance is highly dependent on the attacks being considered, and are unable to generalize
adequately enough to be applied in different contexts. The research laboratories of Networking and Distributed Systems and
Artificial Intelligence at the University of Palermo are carrying out research activities in order to address these issues, with the
main goal of designing a new generation of IDSs that, by dynamically and adaptively combining multiple classifiers, are able
to overcome the limitations of state-of-the-art solutions.
Keywords
Cybersecurity, Artificial Intelligence, Intrusion Detection Systems
1. Introduction will face in the near future is the adoption of Machine
Learning (ML) and, more generally, Artificial Intelligence
Today, with the increasingly pervasive use of ICT tech- (AI) methods.
nologies, cyber attacks pose a serious risk to the infras- However, a thorough study of the literature shows that
tructural, productive and economic aspects of our soci- the adoption of machine learning methods to design IDSs
ety. One of the most critical threats to today’s hyper- involves several critical issues. One of the most notice-
connected world are attacks that come from the network. able concerns is that, due to the high heterogeneity of
In fact, all social and productive realities are closely de- network traffic generated by different attacks, specific
pendent on the ability to exchange data through the net- classifiers are characterized by performance that is highly
work. This dependence can be exploited by the malicious dependent on the attacks considered. This means that
parties to gain unauthorized access to the resources of there is no single universal ML approach that can detect
institutions and organizations. One of the most effective any kind of attack in different scenarios. In addition,
solutions to such attacks are Intrusion Detection Systems different classes of ML approaches have very different ca-
(IDSs), whose main goal is to timely detect and iden- pabilities: for example, supervised methods can achieve
tify misuse of resources early enough to enable timely excellent performance but are unable to handle unknown
responses that stop any malicious behavior and ensure attacks, while unsupervised methods can detect anoma-
normal operation of systems. lies and unknown attacks but generally achieve poor
Currently, the most promising approach to designing performance with already known intrusions [1].
IDSs capable of dealing with the threats our systems The adoption of ensemble machine learning tech-
niques, which leverage multiple machine learning al-
Ital-IA 2024: 4th National Conference on Artificial Intelligence, orga-
nized by CINI, May 29-30, 2024, Naples, Italy
gorithms, promises to be a very effective approach to
*
Corresponding author. achieve higher overall performance than single methods.
$ vincenzo.agate@unipa.it (V. Agate); federico.concone@unipa.it However, in the current literature, the ensemble of classi-
(F. Concone); alessandra.depaola@unipa.it (A. De Paola); fiers is often designed through trial-and-error procedures,
pierluca.ferraro@unipa.it (P. Ferraro); salvatore.gaglio@unipa.it and there is no evidence that an approach suitable for a
(S. Gaglio); giuseppe.lore@unipa.it (G. Lo Re);
marco.morana@unipa.it (M. Morana)
specific scenario can be general enough to be adopted in
0000-0002-3326-8500 (V. Agate); 0000-0001-7638-3624 different scenarios.
(F. Concone); 0000-0002-7340-1847 (A. De Paola); Our research group, through scientific activities
0000-0003-1574-1111 (P. Ferraro); 0000-0002-8217-2230 (G. Lo Re); funded by various projects, seeks to contribute to this
0000-0002-5963-6236 (M. Morana) research area by designing new methodologies and adap-
© 2024 Copyright for this paper by its authors. Use permitted under Creative Commons License
Attribution 4.0 International (CC BY 4.0).
CEUR
ceur-ws.org
Workshop ISSN 1613-0073
Proceedings
tive solutions aiming to improve the robustness of exist- selection method and a ranking technique that evaluates
ing approaches in the field of AI- and ML-based intrusion the ability of different base classifiers to detect different
detection systems (IDS). attacks. Results are promising, but only for a subset of
The following of this paper introduces the current state the considered attack classes. The authors of [9] propose
of the art of IDS and discusses the main limitations of a model based on sustainable ensemble learning and on
current solutions, followed by a summary description of incremental learning. Such a system exploits multiclass
our research group’s contribution. Finally, a description regression models so that the ensemble is adapted to rec-
of the challenges and goals we intend to address in the ognize different types of attacks; moreover, by means
near future is provided. of an iterative update method the parameters and the
decision results of the historical model are included into
the training process of the final ensemble model.
2. Related Work The performances of the solutions described above, as
well as many other existing ensemble frameworks, are
In the dynamic domain of cybersecurity, the arms race be-
severely limited as many different classes of attacks can
tween intrusion detection mechanisms and cyber-attack
occur. Moreover, the combination of multiple ML-based
methodologies has accelerated, highlighting an urgent
classifiers generally increases the computational load,
need for innovative detection techniques. Several IDSs
thus limiting the IDS’s ability to operate timely. This
have been proposed in the literature, exploiting both
issue is particularly critical, given the need to promptly
signature-based and anomaly-based approaches [2, 3].
identify incoming threats and immediately apply appro-
The former are reliable in recognizing known attacks but
priate countermeasures.
are ineffective against those not previously seen. Con-
versely, the latter show a more flexible behavior and are
better suited to detect constantly evolving attacks, espe- 3. Research Contribution
cially by using Machine Learning (ML) techniques.
Nevertheless, the design of ML-based IDSs faces sev- In this perspective, a first contribution of our research
eral challenges, such as the difficulty of ensuring fast unit is discussed in [10], where we introduced a system
responses when dealing with high-dimensional data, as which addresses critical limitations in existing frame-
in the case of network traffic, or providing consistently works, achieving the right trade-off between number of
good performance for all types of intrusions. Moreover, recognized classes and prediction speed, in contrast to
in modern network environments with heterogeneous other multi-class IDSs in the literature.
devices, the input data distributions are subject to un- In particular, we presented a multi-layered architecture
predictable fluctuations over time. This phenomenon, for a behavior-based Intrusion Detection System that
referred to as concept drift, poses a significant challenge uses machine learning and ensemble learning techniques
in the fields of machine learning and cybersecurity, as to distinguish between benign and malicious traffic and
noted in [4]. One of the most promising directions to categorize detected malicious activities into one of nine
achieve overall good performance is the adoption of en- possible attack classes. The architecture of the system is
semble learning techniques [5], which exploit multiple shown in Figure 1.
ML algorithms to obtain better results than those of indi- The experimental evaluation was performed on the
vidual methods. CIC-IDS2017 public dataset, showing that the proposed
The IDS presented in [6], for instance, combines a two- IDS exhibits good performance in detecting all attack
stage meta classifier ensemble (i.e., rotation forest and classes according to well-established metrics.
bagging) with hybrid feature selection (particle swarm A key aspect of our proposed system is its two-layer ar-
optimization, ant colony algorithm, and genetic algo- chitecture. To prevent the system from being overloaded
rithm) to better distinguish regular and anomalous traf- with all the network traffic, and consequently to prevent
fic. However, such a solution is tailored on single attacks delayed detections, traffic filtering is preliminarily per-
instances and not suitable for dealing with multi-class formed in order to distinguish “normal” and “abnormal”
problems. The IDS introduced in [7] adopts an ensemble traffic, ensuring that only potentially malicious traffic
approach that combines decision trees, Random Forest, is advanced to the next stage for further analysis. This
and Forest by Penalizing Attributes algorithms, and a layer thus acts as a filter, improving the efficiency of the
voting technique to combine their probability distribu- whole system. Accurate classification at this stage is cru-
tions. Although the system achieves good performance cial, as traffic deemed benign is not subject to subsequent
with popular attacks, this drops in the case of rare ones. scrutiny, highlighting the importance of minimizing false
Multi-class intrusion detection is also addressed in [8], negatives to safeguard network integrity. For the design
where an ensemble approach is designed to detect dif- of the first layer, we decided to adopt a Decision Tree
ferent attacks. Such IDS also exploits a hybrid feature (DT), since experimental evaluation showed its better per-
Original features
Feature
Selection 1 First Layer
Decision Tree
Normal traffic
Abnormal traffic
Feature
Selection 2
Random Forest Second Layer
Decision Tree Soft Voting Model
Output
Neural Network
Figure 1: Architecture of the multi-layered IDS proposed in [10].
formance for binary classification, compared to Neural lelization in the training and testing of weak learners,
Networks, Random Forest, and Gaussian Naive Bayes. thereby enhancing efficiency in both training and pre-
In the second layer, a detailed analysis of malicious diction phases, a critical feature for IDS systems where
traffic is performed so thus the system generates alerts timely threat detection is paramount.
more accurately. These alerts provide network admin- This work is partially funded by the European Union -
istrators with the information they need to quickly and FESR o FSE, PON Ricerca e Innovazione 2014-2020 - DM
effectively respond to threats [11], allowing them to neu- 1062/2021.
tralize ongoing attacks quickly and efficiently.
Our solution proposes the adoption of ensemble learn-
ing techniques, incorporating a combination of different 4. Preliminary Evaluation
learning models, such as Neural Networks (NNs), Ran-
To conduct a preliminary evaluation of the proposed solu-
dom Forests (RFs), and additional DTs as weak learners.
tion, the CIC-IDS2017 dataset was used [12]. This dataset
The results of the predictions of the single models are
perfectly fits the goals of our study as it includes var-
aggregated using appropriate ensemble techniques that
ious attacks encompassing SQL-Injection, Brute Force,
yield better classification performances than those of the
XSS, DoS GoldenEye, DoS Hulk, DoS Slowhttptest, and
single weak learners. Specifically, we adopt a weighted
DoS Slowloris. These attacks were grouped under two
voting technique that assigns higher weights to the pre-
categories, i.e., Web and DOS Attacks, to streamline com-
dictions of classifiers with low uncertainty in order to
putation while maintaining detailed and accurate identi-
determine the ensemble’s final verdict.
fication of malicious events.
The adoption of this weighted voting strategy for ag-
All tests have been performed on off-the-shelf laptops
gregating classifier outputs, integrating the confidence
equipped with Intel 3805U 1.9GHz CPU and 4GB RAM.
values from neural network predictions with those of
Moreover, all the models that constitute the proposed
Decision Trees and Random Forests, notably improves
IDS have been run 1000 times using different train and
the performance of the whole IDS. Finally, it is worth
test sets at every execution.
noticing that our system’s architecture facilitates paral-
The numerous tests performed on the system have chine learning models. Indeed, ignoring the phenomenon
demonstrated its reliability and accuracy in detecting of concept drift, like many current IDSs do, inevitably
malicious traffic, as well as its time efficiency. The IDS lead to performance degradation over time.
is able to recognize and identify 9 different types of at- Our future approach will try to overcome these chal-
tack in real-time, promptly alerting administrators to lenges by orchestrating supervised and unsupervised
minimize serious consequences. In fact, on average, the systems to exploit the benefits of both approaches. The
system misses attacks in very small percentages (close to detection of unknown attacks can rely on online unsu-
1%), while it requires extremely low execution time for pervised anomaly detection systems that are adept at
both the first and second levels: some slight difference recognizing signs of zero-day attacks, all the while auto-
is appreciated in dependence on the model used in the matically adapting to concept drift without the constant
ensemble. need for manual intervention. This, in turn, can also
Besides the good performance achieved, numerous reduce the frequency of model re-training and enhance
improvements are needed to address other important system efficiency. Such systems will be used in conjunc-
limitations, that are common to many IDSs in the litera- tion with supervised ones to improve the overall accuracy
ture. for known attacks.
First of all, the solutions proposed in the literature (as The efficacy of our methodologies will be validated
well as [10]) select the set of classifiers to be adopted through extensive experimental evaluation, showcasing
through a trial-and-error process and lack a formalized our system’s capability of real-time threat detection com-
methodology that can drive the design process in differ- pared to traditional models. This will provide the re-
ent scenarios. Moreover, many of the existing solutions search community with valuable insights into the effec-
have been designed ignoring the outbreak of unknown tiveness of different ML methods and ensemble strategies
attacks. Such a “closed-world” approach makes IDSs un- against a wide range of security attacks.
suitable for recognizing special types of attacks known Looking forward, we envision further enriching our
as “zero-day”. IDS framework to improve its resilience against unknown
attacks and concept drift, offering robust defenses against
the ever-evolving landscape of cyber threats.
5. Challenges and Goals
The main goal of the research unit is the design and 6. Research Unit
development of a novel class of IDSs based on the com-
bination of several dynamically orchestrated classifiers The Networks and Distributed Systems and Artificial Intel-
(both supervised and unsupervised), with the aim of rec- ligence research laboratories at the University of Palermo,
ognizing a large set of different threats, also detecting directed by Prof. Giuseppe Lo Re and Salvatore Gaglio,
the occurrence of zero-day attacks. have experience in several research fields such as dis-
Given the strong characterization of the many appli- tributed systems, cybersecurity, artificial intelligence,
cation scenarios in which IDSs are needed, the design and machine learning. In particular, the research unit
of the system architecture will be guided by a formal- has developed deep expertise in several topics related to
ized, rigorous, and replicable approach that can steer the cybersecurity domain that mainly concern the adop-
the realization of specific IDS instances. The goal is to tion of artificial intelligence to assist the detection and
design a scalable and modular architecture, capable of identification of potential threats in cyberspace. The iden-
maintaining a low computing load while guaranteeing tified methodologies and proposed solutions have been
high detection performance and responsiveness, even in applied in different scenarios, such as intrusion detection
the presence of huge amounts of data. systems [10], malware detection systems [13, 14], social
The main challenge will be the definition of adaptive network security [15, 16], privacy-preserving distributed
orchestration techniques, which will be crucial for the systems [17, 18], adversarial machine learning [19] and
design of IDSs capable of dynamically adjusting their secure crowdsensing [20].
ensemble strategies based on the observed context. This Furthermore, it is worth noting that the research
will include the integration of both supervised and un- group’s experience in applying artificial intelligence ap-
supervised learning approaches, allowing an adaptive proaches and methods to distributed systems and cy-
response to emerging threats. bersecurity challenges has been leveraged in several
To reach this ambitious goal, the system will also have funded research projects, such as FRASI - FRamework
to address the phenomenon of concept drift, which is the for Agent-based Semantic- aware In-teroperability (FAR
continuous shift of the statistical distribution of network MIUR D.M. 8 agosto 2000), Bigger Data (D.D. MIUR n.
data over time. This poses a big challenge for current 2690 dell’11.12.2013, Piano di Azione e Coesione), SeN-
IDSs, often necessitating manual retraining of their ma- Sori - SEnsor Node as a Service for hOme and buildings
eneRgy savIng (Industria 2015: Bando Nuove Tecnolo- [8] S. Seth, K. K. Chahal, G. Singh, A novel ensem-
gie per il Made in Italy), Smart Buildings - An Ambient ble framework for an intelligent intrusion detec-
Intelligence system for optimizing energy resources in tion system, IEEE Access 9 (2021) 138451–138467.
building complexes (PO FESR Sicilia 2007-2013), OnSi- doi:10.1109/ACCESS.2021.3116219.
cily.com - a Web 3.0 platform with intelligent virtual [9] X. Li, M. Zhu, L. T. Yang, M. Xu, Z. Ma, C. Zhong,
A.V.I. assistance (PO FESR Sicilia 2007-2013), VASARI - H. Li, Y. Xiang, Sustainable ensemble learning driv-
VAlorizzazione Smart del patrimonio ARtistico delle città ing intrusion detection model, IEEE Transactions
Italiane (PNR 2015-2020), CrowdSense (PO FESR Sicilia on Dependable and Secure Computing 18 (2021)
2014-2020), Smart Wave (PO FESR Sicilia 2014-2020), S6 1591–1604. doi:10.1109/TDSC.2021.3066202.
Project - A Smart, Social and SDN-based Surveillance [10] V. Agate, D. Felice Maria, A. De Paola, P. Ferraro,
System for Smart-cities (PO FESR Sicilia 2014-2020), S3 G. Lo Re, M. Morana, A behavior-based intrusion de-
Campus - SHARING, SMART AND SUSTAINABLE CAM- tection system using ensemble learning techniques.,
PUS (POC Sicilia 2014-2020 ), Smart Venues for Agrotech in: ITASEC, 2022, pp. 207–218.
Ecosystem (POC Sicilia 2014-2020). [11] A. De Paola, P. Ferraro, S. Gaglio, G. Lo Re,
M. Morana, M. Ortolani, D. Peri, A context-aware
system for ambient assisted living, in: S. F. Ochoa,
References P. Singh, J. Bravo (Eds.), Ubiquitous Computing
and Ambient Intelligence, Springer International
[1] T. Zoppi, A. Ceccarelli, T. Puccetti, A. Bondavalli,
Publishing, Cham, 2017, pp. 426–438.
Which algorithm can detect unknown attacks?
[12] I. Sharafaldin, A. H. Lashkari, A. A. Ghorbani, To-
comparison of supervised, unsupervised and meta-
ward generating a new intrusion detection dataset
learning algorithms for intrusion detection, Com-
and intrusion traffic characterization, in: Proceed-
puters & Security 127 (2023) 103107.
ings of the 4th International Conference on Infor-
[2] A. Khraisat, I. Gondal, P. Vamplew, J. Kamruzzaman,
mation Systems Security and Privacy - Volume 1:
Survey of intrusion detection systems: techniques,
ICISSP„ INSTICC, SciTePress, 2018, pp. 108–116.
datasets and challenges, Cybersecurity 2 (2019)
doi:10.5220/0006639801080116.
20. URL: https://doi.org/10.1186/s42400-019-0038-7.
[13] A. De Paola, S. Gaglio, G. Lo Re, M. Morana, A hy-
doi:10.1186/s42400-019-0038-7.
brid system for malware detection on big data, in:
[3] A. L. Buczak, E. Guven, A survey of data min-
IEEE INFOCOM 2018 - IEEE Conference on Com-
ing and machine learning methods for cyber se-
puter Communications Workshops (INFOCOM WK-
curity intrusion detection, IEEE Communications
SHPS), 2018, pp. 45–50. doi:10.1109/INFCOMW.
Surveys & Tutorials 18 (2016) 1153–1176. doi:10.
2018.8406963.
1109/COMST.2015.2494502.
[14] F. Concone, A. De Paola, G. Lo Re, M. Morana, Twit-
[4] J. Lu, A. Liu, F. Dong, F. Gu, J. Gama, G. Zhang,
ter analysis for real-time malware discovery, in:
Learning under concept drift: A review, IEEE Trans-
2017 AEIT International Annual Conference (2017
actions on Knowledge and Data Engineering 31
AEIT), Cagliari, Italy, 2017.
(2018) 2346–2363.
[15] F. Concone, G. Lo Re, M. Morana, S. K. Das, Spade:
[5] A. A. Aburomman, M. B. I. Reaz, A survey of intru-
Multi-stage spam account detection for online so-
sion detection systems based on ensemble and hy-
cial networks, IEEE Transactions on Dependable
brid classifiers, Computers & Security 65 (2017) 135–
and Secure Computing (2022) 1–16. doi:10.1109/
152. URL: https://www.sciencedirect.com/science/
TDSC.2022.3198830.
article/pii/S0167404816301572. doi:https://doi.
[16] F. Concone, G. Lo Re, M. Morana, C. Ruocco, Twitter
org/10.1016/j.cose.2016.11.004.
spam account detection by effective labeling, in:
[6] B. A. Tama, M. Comuzzi, K.-H. Rhee, Tse-ids: A two-
3rd Italian Conference on Cyber Security, ITASEC
stage classifier ensemble for intelligent anomaly-
2019, volume 2315, IT, 2019.
based intrusion detection system, IEEE Access 7
[17] V. Agate, P. Ferraro, G. Lo Re, S. K. Das,
(2019) 94497–94507. doi:10.1109/ACCESS.2019.
Blind: A privacy preserving truth discovery
2928048.
system for mobile crowdsensing, Journal of
[7] Y. Zhou, G. Cheng, S. Jiang, M. Dai, Building
Network and Computer Applications (2023)
an efficient intrusion detection system based
103811. URL: https://www.sciencedirect.com/
on feature selection and ensemble classifier,
science/article/pii/S1084804523002308. doi:https:
Computer Networks 174 (2020) 107247. URL:
//doi.org/10.1016/j.jnca.2023.103811.
https://www.sciencedirect.com/science/article/pii/
[18] V. Agate, A. De Paola, P. Ferraro, G. Lo Re,
S1389128619314203. doi:https://doi.org/10.
M. Morana, Secureballot: A secure open
1016/j.comnet.2020.107247.
source e-voting system, Journal of Network
and Computer Applications 191 (2021) 103165.
URL: https://www.sciencedirect.com/science/
article/pii/S1084804521001776. doi:https:
//doi.org/10.1016/j.jnca.2021.103165.
[19] S. Gaglio, A. Giammanco, G. Lo Re, M. Morana,
Adversarial machine learning in e-health: attack-
ing a smart prescription system, in: International
Conference of the Italian Association for Artificial
Intelligence (2021 AI*IA), Milan, Italy, 2021.
[20] F. Concone, G. Lo Re, M. Morana, Smcp: a
secure mobile crowdsensing protocol for fog-
based applications, Human-centric Computing
and Information Sciences 10 (2020) 1–23. URL:
https://doi.org/10.1186/s13673-020-00232-y. doi:10.
1186/s13673-020-00232-y.