Memristor Based Autoencoder for Unsupervised Real-Time Network - - PowerPoint PPT Presentation

โ–ถ
memristor based autoencoder for unsupervised real time
SMART_READER_LITE
LIVE PREVIEW

Memristor Based Autoencoder for Unsupervised Real-Time Network - - PowerPoint PPT Presentation

Memristor Based Autoencoder for Unsupervised Real-Time Network Intrusion and Anomaly Detection Md. Shahanur Alam, B. Rasitha Fernando, Yassine Jaoudi, Chris Yakopcic, Raqibul Hasan, Tarek M. Taha, and Guru Subramanyam Dept. Of Electrical and


slide-1
SLIDE 1

Memristor Based Autoencoder for Unsupervised Real-Time Network Intrusion and Anomaly Detection

  • Md. Shahanur Alam, B. Rasitha Fernando, Yassine Jaoudi, Chris Yakopcic, Raqibul Hasan, Tarek M. Taha, and

Guru Subramanyam

  • Dept. Of Electrical and Computer Engineering, University of

Dayton, Dayton, OH, USA

slide-2
SLIDE 2
  • M. S. Alam et. al.

2

  • Introduction
  • Anomaly Detection Methods and Applications
  • Motivation and Challenges
  • Proposed Anomaly Detection System
  • Results of Intrusion and Anomaly Detection System
  • Summary
  • Future work

Outline

slide-3
SLIDE 3
  • M. S. Alam et. al.

3

Introduction

  • Network Intrusion
  • Intrusion Detection system
  • SNORT
  • What if new unknown packet comes?

E.g. โ€˜Zero Dayโ€™

Neural Network

SNORT Router

Positive Negative Positive + Zero Day

Block diagram of the neural network-based intrusion detection system

Normal Anomaly

slide-4
SLIDE 4
  • M. S. Alam et. al.

4

Introduction (Contd.)

  • Memristive system could be a solution

Neural Network Vs Power Consumption IoTs and Edge Devices ๐‘(๐‘Ÿ) = ๐‘’๐œš ๐‘’๐‘Ÿ โ‰ˆ200W Memristor

slide-5
SLIDE 5
  • M. S. Alam et. al.

What are the anomalies? ๐ธ2 ๐ธ1 ๐ธ3 ๐‘‚1 ๐‘‚2 ๐‘Œ ๐‘

Illustration of anomalies in two-dimensional data set

  • Abnormalities/outliers

Anomaly detection Methods:

  • Unsupervised (AE, GAN, RNN, LSTM etc)
  • Supervised (DNN, CNN)
  • Hybrid model (AE+SVM)
  • One-Class Neural Network

Applications:

  • Cyber-Intrusion Detection
  • Malware Detection
  • Internet of Things (IoTs) Big Data Anomaly Detection
  • Fraud Detection
  • Medical Anomaly Detection
  • Industrial Damage Detection

Anomaly Detection Methods and Applications

5

slide-6
SLIDE 6
  • M. S. Alam et. al.

Motivation and Challenges

Motivation:

  • Neural Network implementation for IoTs and edge devices
  • Detection of anomalies in real-time

Challenges:

  • Boundary between normal and malicious is not explicitly defined
  • Continual learning and the catastrophic forgetting

6

slide-7
SLIDE 7
  • M. S. Alam et. al.

Dataset Preprocessing

7

  • NSL-KDD network dataset๏ƒŸ KDD Cupโ€™99 dataset
  • Training data has125,973 packets, 23 different data types
  • 43 attributes, consists numerical and alphanumeric data
  • Preprocessed and sorted out the packets
  • Network is pretrained with 90% of Normal
  • Tested with 10% normal and 10% of total malicious data

0,tcp,ftp_data,SF,491,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,2,2,0,0, 0,0,1,0,0,150,25,0.17,0.03,0.17,0,0,0,0.05,0,normal,20 0,tcp,ftp_data,SF,334,0,0,0,0,0,0,1,0,0,0,0,0,0,0,0,0,0,2,2,0,0, 0,0,1,0,0,2,20,1,0,1,0.20,0,0,0,0, warezclient,15 0,0.5,0.188,0.629,3.55๐‘“โˆ’7,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0.003 91,0.00391,0,0,0,0,1,0,0,0.588,0.098,0.17,0.03,0.17,0,0,0,0.05 ,0,0,0.9523 0,0.5,0.188,0.629,2.42๐‘“โˆ’7,0,0,0,0,0,0,1,0,0,0,0,0,0,0,0,0,0.003 91,0.0039,0,0,0,0,1,0,0,0.0078,0.078,1,0,1,0.2,0,0,0,0,1,0.714 Normal Packet Malicious Packet Preprocessed Malicious Packet Preprocessed Normal Packet

slide-8
SLIDE 8
  • M. S. Alam et. al.

Positive Normal Data Malicious Data AE-2:Real-Time Training Known Unknown AE-1: Pretrained Section Router SNORT

1 2 3 4

Positive Negative Enterprise Network Positive=Normal + โ€˜zero dayโ€™ packets

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

System Prototype Model Autoencoder (AE) Neural Network

Intrusion And Anomaly Detection System with AE neural Network

Proposed Anomaly Detection System

8

  • AE learns to regenerate the input data at output
  • AE can reduce the dimension of input data

. . . . . .

x1 x2 xi x41

. . . . . .

h1,3 h1,4 h1,j

h1,90

h1,1 h1,2

. . . . . .

x'1 x'2 x'i x'41

. . . . . .

h3,3 h3,4 h3,j

h3,90

h3,1 h3,2

. . . . . .

h2,1 h2,k

h2,10

w'1(j,i) w2(j,k) w'2(k,j) w1(i,j)

41โ†’90โ†’10โ†’90โ†’41

Encoder Decoder Bottle Neck

slide-9
SLIDE 9
  • M. S. Alam et. al.

๐‘• ๐‘ฆ = แ‰ 1, ๐‘ฆ > 2 0.25๐‘ฆ + 0.5, ๐‘ฆ โ‰ค 2 0, ๐‘ฆ < 2 (3) ๐‘” ๐‘ฆ =

1 1+๐‘“โˆ’๐‘ฆ

(2) ๐ธ๐‘„

๐‘˜ = ฯƒ๐‘—=1 ๐‘‚+1 ๐‘ฆ๐‘— ร— ๐œ๐‘—๐‘˜ + โˆ’ ๐œ๐‘—๐‘˜ โˆ’

(1) DOT Product: (b)

. . .

xN+1 x1 x2

. . .

xN

=

yM

A

1

ฮฒ

yj + - + -

+

๏ณ

โˆ’

๏ณ

Memristor

R Rf R

A

2

A

3

AM

y3 y2 y1 . . .

x3

Memristor Crossbar Circuits

(c) Sigmoid Approximation:

Memristive Neural Network and Crossbar Circuit

9 Ideal and approximate Sigmoid Function

(a)

Single Neuron

Synapse

slide-10
SLIDE 10
  • M. S. Alam et. al.

10

Training of the Network

  • apply ๐‘ฆ๐‘—
  • crossbar computes the dot product ๐ธ๐‘„๐‘˜
  • utput signal ๐‘ง๐‘˜
  • error : ๐œ€

๐‘˜ = ๐‘ฆ๐‘— โˆ’ ๐‘ง๐‘˜ ๐‘”โ€ฒ ๐ธ๐‘„ ๐‘˜

  • backpropagate the error ๐œ€

๐‘˜ = ฯƒ๐‘™ ๐œ€๐‘™ ๐‘ฅ๐‘™,๐‘˜๐‘”โ€ฒ ๐ธ๐‘„ ๐‘˜ in each hidden layer

  • update the weights according ๐œ€

๐‘˜ as ฮ”๐‘ฅ ๐‘˜ = ๐œƒ๐œ€ ๐‘˜๐‘ฆ

  • calculate ๐ธ๐‘›=

1 ๐‘‚

ฯƒ(๐‘Œ๐‘— โˆ’ ๐‘

๐‘˜)2 and ๐ธ๐‘‡๐ธ = ฯƒ(๐ธโˆ’๐ธ๐‘›)2 ๐‘‚

slide-11
SLIDE 11
  • M. S. Alam et. al.

๐’‡ = ๐’‡๐Ÿ + ฯƒ(๐’€โ€ฒ๐’‹ โˆ’ ๐’๐’‹)๐Ÿ‘ D= ฯƒ(๐’€โ€ฒ๐’‹ โˆ’ ๐’๐’‹)๐Ÿ‘ โˆ†= ๐‘ฌ โˆ’ ๐‘ฌ๐’ For โˆ†> ๐‘ฌ๐‘ป๐‘ฌ, ๐‘ด = ๐Ÿ & โˆ†< ๐‘ฌ๐‘ป๐‘ฌ, ๐‘ด = ๐Ÿ ๐‘ด = ๐Ÿ/0 ? AE-1 Forward Y Data (๐’€โ€™) ๐’‡โ€ฒ = ๐’‡๐Ÿ + ฯƒ(๐’€โ€ฒ๐’‹ โˆ’ ๐’โ€ฒ๐’‹)๐Ÿ‘ โˆ†๐Ÿ= ๐‘ฌโ€ฒ โˆ’ ๐‘ฌโ€ฒ๐’ For โˆ†๐Ÿ> ๐‘ฌ๐‘ป๐‘ฌ๐Ÿ, ๐’—๐’๐’๐’๐’‘๐’™๐’ & โˆ†๐Ÿ< ๐‘ฌ๐‘ป๐‘ฌ๐Ÿ, ๐’๐’๐’‘๐’™๐’ AE-2 Forward Yโ€™

Flowchart of Real-time Anomaly detection System Anomaly Detection System

System Flowchart of Anomaly Detection System

11

Positive Normal Data Malicious Data AE-2:Real-Time Training Known Unknown AE-1: Pretrained Section Router SNORT

1 2 3 4

Positive Negative Enterprise Network Positive=Normal + โ€˜zero dayโ€™ packets

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Unknown ? Update Weight of AE-2

slide-12
SLIDE 12
  • M. S. Alam et. al.

Pretraining of Autoencoder-1 (AE-1)

12 Input feature and regenerated feature of a sample through (AE-1)

a. b.

Training Error (MSE) in software and memristor X-bar

slide-13
SLIDE 13
  • M. S. Alam et. al.

a. b.

13 Intrusion detection Accuracy (AE-1)

Intrusion Detection Accuracy

Pretraining Epochs Global Accuracy ๐‘ถ๐‘ต๐‘ถ ๐‘ถ๐‘ถ๐‘ต ๐‘ถ๐‘ฎ Case 50 95.22% 56 546 602 Software 50 92.91% 65 868 933 Memristor ๐ต๐‘‘๐‘‘๐‘ฃ๐‘ ๐‘๐‘‘๐‘ง = ๐‘‚๐‘กโˆ’๐‘‚๐บ

๐‘‚๐‘ก

ร— 100%

False Detection (Malicious + Normal)

slide-14
SLIDE 14
  • M. S. Alam et. al.

14

Intrusion Detection Accuracy (contd.)

a. b.

Malicious Packet Vs Epochs Malicious Packet Detection Accuracy Vs Epochs

slide-15
SLIDE 15
  • M. S. Alam et. al.

2/23

Anomaly Detection in real-time

๐‘ˆ

1 = ๐‘ฆ1 1 , ๐‘ฆ2 1, ๐‘ฆ1 2 , ๐‘ฆ2 2, ๐‘ฆ1 3 , ๐‘ฆ2 3, โ€ฆ

๐‘ˆ2 = ๐‘ฆ1

1 , ๐‘ฆ2 1 , ๐‘ฆ3 1 , ๐‘ฆ1 2 , ๐‘ฆ2 2, ๐‘ฆ3 2 , โ€ฆ

๐‘ˆ3 = ๐‘ฆ1

1 , ๐‘ฆ2 1 , ๐‘ฆ3 1 , ๐‘ฆ4 1 , ๐‘ฆ1 2 , ๐‘ฆ2 2 , ๐‘ฆ3 2 , ๐‘ฆ4 2, โ€ฆ

๐‘ˆ

4 = ๐‘ฆ1 1, ๐‘ฆ2 1, ๐‘ฆ3 1, ๐‘ฆ4 1, ๐‘ฆ5 1, ๐‘ฆ1 2, ๐‘ฆ2 2, ๐‘ฆ3 2, ๐‘ฆ4 2, ๐‘ฆ5 2, โ€ฆ

Real-Time Anomaly Detection:

Positive Normal Data Malicious Data AE-2:Real-Time Training Known Unknown AE-1: Pretrained Section Router SNORT

1 2 3 4

Positive Negative Enterprise Network Positive=Normal + โ€˜zero dayโ€™ packets

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

๐‘ฆ1 = ๐‘œ๐‘๐‘ ๐‘›๐‘๐‘š, ๐‘ฆ2 = ๐‘œ๐‘“๐‘ž๐‘ข๐‘ฃ๐‘œ๐‘“, ๐‘ฆ3 = ๐‘ก๐‘๐‘ข๐‘๐‘œ, ๐‘ฆ4= ๐‘—๐‘ž๐‘ก๐‘ฅ๐‘“๐‘“๐‘ž, ๐‘ฆ5 = ๐‘๐‘๐‘‘๐‘™ Anomaly Detection System

Real-time learning and anomaly detection

slide-16
SLIDE 16
  • M. S. Alam et. al.

16

Power, Area and Timing Analysis

Parameter Training Data Recognition Data

Area (mm2) 0.00271 0.00271 Power (mW) 20.6 7.56 Time (ยตs)/sample 4.02 0.384 Energy (nJ)/One Sample 82 2.90

  • ๐‘†๐‘๐‘”๐‘” = 1 ร— 107ฮฉ, ๐‘†๐‘๐‘œ = 5 ร— 104 ฮฉ
  • Wire Resistance =5 ฮฉ, ๐‘Š

๐‘›๐‘“๐‘› = 1.3๐‘ค๐‘๐‘š๐‘ข

  • Transistor Feature Size : F= 45nm
  • Op-amp power = 3 ร— 10โˆ’6 ๐‘ฅ๐‘๐‘ข๐‘ข
  • Transistor Size= 50๐บ2
  • Memristor area= 1 ร— 104 ๐‘œ๐‘›2
slide-17
SLIDE 17
  • M. S. Alam et. al.

17

Summary

  • Introduced the problem and proposed a possible solution
  • Presented the Autoencoder with memristor X-bar and the functionalities
  • Overall accuracy 92.91% with malicious packet detection accuracy 98.89%
  • Presented real-time anomaly detection system
  • Explained the power and energy requirement
slide-18
SLIDE 18
  • M. S. Alam et. al.

18

Current and future work

  • Multiple autoencoders for intrusion and malware detection
  • Incremental learning algorithm & unseen class detection
slide-19
SLIDE 19
  • M. S. Alam et. al.

19

THANK YOU

Questions?