2022/9/28

Kitsune

Yisroel Mirsky, Tomer Doitshman, Yuval Elovici, Asaf Shabtai

AN ENSEMBLE OF AUTOENCODERS FOR ONLINE NETWORK INTRUSION DETECTION
Yisroel Mirsky, Tomer Doitshman, Yuval Elovici, and Asaf Shab Page 1 Kitsune AN
ENSEMBLE OF AUTOENCODERS FOR ONLINE NETWORK INTRUSION DETECTION
Yisroel Mirsky, Tomer Doitshman, Yuval Elovici, and Asaf Shabtai Page 2 Introduction ▶
Neural Networks (NN) are great at detecting malicious packets ▶ Great results in literature (NNs
can learn nonlinear complex patterns and behaviors) ▶ But, not so common in practice (where
is my SNORT plugin?) ▶ Existing NN solutions use supervised learning (eg, classification): 2
1. Collect packets 2. Label packets: malicious or normal 3. Train deep NN on labeled data 4.
Deploy the NN model to the device 5. Execute the model on each packet 6. When a new attack
is discovered, go to #1 Page 3 Introduction ▶ Neural Networks (NN) are great at detecting …