LE QUY DON
Technical University
VietnameseClear Cookie - decide language by browser settings

COOL: Conservation of Output Links for Pruning Algorithms in Network Intrusion Detection

Dao, T. and Lee, H. (2023) COOL: Conservation of Output Links for Pruning Algorithms in Network Intrusion Detection. IEEE Internet of Things Journal. p. 1. ISSN 23274662

Full text not available from this repository. (Upload)

Abstract

To reduce network intrusion detection latency in a high volume of data traffic, on-device detection with neuron pruning has been widely adopted by eliminating ineffective connections from a densely connected neural network. However, neuron pruning has a serious problem called output separation in which some parts of neurons can easily be pruned in the middle and become isolated from the rest of the network. To this end, we introduce a solution called the Conservation of Output Links (COOL) pruning method that iteratively preserves a set of effective connections to avoid neuron isolation. We first evaluate COOL on MNIST and CIFAR-10 datasets as well as programmable networking devices such as P4-supported switches. The experimental results show that COOL outperforms existing methods in terms of both detection time and classification accuracy, especially in extremely sparse networks. Compared to three representative pruning methods, our COOL-based classification model performs at least 25 more accurately with the upper bound for the pruning probability. To further display the effectiveness of COOL-based intrusion detection, we formulate a novel detection time minimization problem by assigning suitable detection models for switches in IoT under performance requirements and resource limitations. The experimental results demonstrate that our COOL algorithm is particularly useful for delay-critical and high-traffic applications. IEEE

Item Type: Article
Divisions: Faculties > Faculty of Radio-Electronic Engineering
Identification Number: 10.1109/JIOT.2023.3321299
Uncontrolled Keywords: Edge detection; Feature extraction; Image classification; Internet of things; Intrusion detection; Iterative methods; Neural networks; Probabilistic logics, Classification algorithm; Data planes; Data-plane; Delay; Delay minimization; Features extraction; Image edge detection; Intrusion-Detection; Output isolation; Programmable data plane; Weight pruning, Neurons
URI: http://eprints.lqdtu.edu.vn/id/eprint/10993

Actions (login required)

View Item
View Item