Skip to main navigation Skip to search Skip to main content

Siamese network based feature learning for improved intrusion detection

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Intrusion detection is a critical Cyber Security subject. Different Machine Learning (ML) approaches have been proposed for Intrusion Detection Systems (IDS). However, their application to real-life scenarios remains challenging due to high data dimensionality. Representation learning (RL) allows discriminative feature representation in a low dimensionality space. The application of this technique in IDS requires more investigation. This paper examines and discusses the contribution of Siamese network based representation learning in improving the IDS performance. Extensive experimental results under different evaluation scenarios show different improvement rates depending on the scenario.

Original languageEnglish
Title of host publicationNeural Information Processing - 26th International Conference, ICONIP 2019, Proceedings
EditorsTom Gedeon, Kok Wai Wong, Minho Lee
PublisherSpringer
Pages377-389
Number of pages13
ISBN (Print)9783030367077
DOIs
Publication statusPublished - 1 Jan 2019
Event26th International Conference on Neural Information Processing, ICONIP 2019 - Sydney, Australia
Duration: 12 Dec 201915 Dec 2019

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume11953 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference26th International Conference on Neural Information Processing, ICONIP 2019
Country/TerritoryAustralia
CitySydney
Period12/12/1915/12/19

Keywords

  • Anomaly detection
  • Feature extraction
  • IDS
  • Representation learning
  • Siamese
  • UNSW15 data-set

Fingerprint

Dive into the research topics of 'Siamese network based feature learning for improved intrusion detection'. Together they form a unique fingerprint.

Cite this