The exponential growth of cloud computing paradigms, edge, and Internet of Things devices has created extensive and dynamic computing environments spanning from the core network to the edge, raising concerns about network perimeter definition. Adopting security measures where each device and service is authenticated and authorized is reasonable, but this approach does not guarantee complete security, as compromised devices could interact maliciously with others without being detected by Intrusion Detection Systems (IDSs). A possible solution involves deploying an in-place instance of the IDS on each device, serving as a proactive defense and alarm mechanism. In this context, Machine Learning (ML) detection models offer high automation and detection capability due to their advanced learning of intrinsic data patterns. Moreover, aggregating observations from multiple organizations, such as within a consortium using Federated Learning (FL), can extend the effectiveness of these models beyond the mere local data of each organization. However, the extensive requirements and the resulting complex architecture to accommodate all traffic profiles pose challenges in peripheral devices due to limited resource availability and data access. This thesis explores the challenges of adapting IDSs for resource-constrained devices, proposing a framework that integrates all the tasks involved in the detection process into a cohesive pipeline. It leverages and extends feature selection, model pruning, and fine-tuning techniques to derive lighter IDS setups. Moreover, the framework adopts a novel evaluation mechanism that simulates the entire monitoring-detection-mitigation process, providing a holistic assessment of the system’s performance and enabling better-informed security countermeasures for infrastructure administrators. The framework is evaluated across many deployment scenarios, simulating the transition from the core infrastructure to edge computing, proving its ability to adapt the IDSs to lighter setups while preserving high accuracy on local data and retaining historical knowledge acquired during FL rounds. The identified solutions enable improving the overall performance by minimizing the impact of the entire IDS. Furthermore, this thesis highlights the limitation of evaluating the performance of the mere detection process, which may not accurately reflect the overall effectiveness of the IDS against ongoing attacks despite the high accuracy of the model.

Reducing Intrusion Detection’s Impact through Adaptive and Knowledge-Preserving Strategies

MAGNANI, SIMONE
2024

Abstract

The exponential growth of cloud computing paradigms, edge, and Internet of Things devices has created extensive and dynamic computing environments spanning from the core network to the edge, raising concerns about network perimeter definition. Adopting security measures where each device and service is authenticated and authorized is reasonable, but this approach does not guarantee complete security, as compromised devices could interact maliciously with others without being detected by Intrusion Detection Systems (IDSs). A possible solution involves deploying an in-place instance of the IDS on each device, serving as a proactive defense and alarm mechanism. In this context, Machine Learning (ML) detection models offer high automation and detection capability due to their advanced learning of intrinsic data patterns. Moreover, aggregating observations from multiple organizations, such as within a consortium using Federated Learning (FL), can extend the effectiveness of these models beyond the mere local data of each organization. However, the extensive requirements and the resulting complex architecture to accommodate all traffic profiles pose challenges in peripheral devices due to limited resource availability and data access. This thesis explores the challenges of adapting IDSs for resource-constrained devices, proposing a framework that integrates all the tasks involved in the detection process into a cohesive pipeline. It leverages and extends feature selection, model pruning, and fine-tuning techniques to derive lighter IDS setups. Moreover, the framework adopts a novel evaluation mechanism that simulates the entire monitoring-detection-mitigation process, providing a holistic assessment of the system’s performance and enabling better-informed security countermeasures for infrastructure administrators. The framework is evaluated across many deployment scenarios, simulating the transition from the core infrastructure to edge computing, proving its ability to adapt the IDSs to lighter setups while preserving high accuracy on local data and retaining historical knowledge acquired during FL rounds. The identified solutions enable improving the overall performance by minimizing the impact of the entire IDS. Furthermore, this thesis highlights the limitation of evaluating the performance of the mere detection process, which may not accurately reflect the overall effectiveness of the IDS against ongoing attacks despite the high accuracy of the model.
23-set-2024
Inglese
ONETO, LUCA
ONETO, LUCA
ARMANDO, ALESSANDRO
Università degli studi di Genova
File in questo prodotto:
File Dimensione Formato  
phdunige_5095256.pdf

accesso aperto

Dimensione 2.44 MB
Formato Adobe PDF
2.44 MB Adobe PDF Visualizza/Apri

I documenti in UNITESI sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/20.500.14242/169904
Il codice NBN di questa tesi è URN:NBN:IT:UNIGE-169904