Page 47 - Read Online
P. 47

Page 148                                                  Corizzo et al. J Surveill Secur Saf 2020;1:140-50  I  http://dx.doi.org/10.20517/jsss.2020.15

               continuously, but periodically, and it can be performed offline, while previously learned models are still
               active to perform intrusion detection. For these reasons, a higher accuracy in the predictive task is still
               important to pursue, since it can lead to the identification of complex attacks that would not be detected
               by simpler feature extraction techniques. Such attacks could have a significant negative impact on the
               organizations targeted by attackers. Considering the adoption of techniques with a higher computational
               cost can also be mitigated by designing parallel or high-performance computing implementations [23,24] .

               In conclusion, even if the results presented in this study are not vast enough to demonstrate the superiority
               of the proposed method on a broad scale, they are meant to show the potential of word embeddings to
               extract a new representation for network traces that can be used to carry out intrusion detection tasks
               accurately. Feature extraction based on word embedding models requires a higher computational time than
               simpler techniques, but leads to a higher accuracy, which is important for the identification of complex
               attacks. In future work, we aim to perform an extensive evaluation with different learning scenarios
               and machine learning algorithms. We also aim to study in detail word embedding representations and
               understand how to enforce them with more sophisticated data processing steps.


               DECLARATIONS
               Authors’ contributions
               Methodology, data acquisition, implementation, redaction of manuscript and analysis of experimental
               results: Corizzo R
               Methodology, implementation and experiments: Zdravevski E
               Implementation of feature extraction prototypes: Russell M, Vagliano A
               Hypothesis formulation, methodology, data acquisition and analysis of experimental results: Japkowicz N


               Availability of data and materials
               Datasets are publicly available at the references reported in the Results section.


               Financial support and sponsorship
               We acknowledge the support of the Defense Advanced Research Projects Agency (DARPA) through the
               project ”Lifelong Streaming Anomaly Detection” (Grant No. A19-0131-003).


               Conflicts of interest
               All authors declared that there are no conflicts of interest.

               Ethical approval and consent to participate
               Not applicable.


               Consent for publication
               Not applicable.


               Copyright
               © The Author(s) 2020.


               REFERENCES
               1.   Axelsson S. Intrusion detection systems: a survey and taxonomy. Tech Rep 2000:99.
               2.   Bivens A, Palagiri C, Smith R, Szymanski B, Embrechts M. Network-based intrusion detection using neural networks. Intell Eng Syst
                   Artif Neural Netw 2002;12:579-84.
               3.   Zhang J, Zulkernine M, Haque A. Random-forests-based network intrusion detection systems. IEEE Trans Syst Man Cybern C
                   2008;38:649-59.
               4.   Kruegel C, Toth T. Using decision trees to improve signature based intrusion detection. International Workshop on Recent Advances in
   42   43   44   45   46   47   48   49   50   51   52