Individual Packet Features are a Risk to Model Generalisation in ML-Based Intrusion Detection

Kahraman Kostas, Mike Just, Michael Adam Lones

Research output: Contribution to journalArticlepeer-review

11 Downloads (Pure)

Abstract

Machine learning is increasingly employed for intrusion detection in IoT networks. This paper provides the first empirical evidence of the risks associated with modeling network traffic using individual packet features (IPF). Through a comprehensive literature review and novel experimental case studies, we identify critical limitations of IPF, such as information leakage and low data complexity. We offer the first in-depth critique of IPF-based detection systems, highlighting their risks for real-world deployment. Our results demonstrate that IPF-based models can achieve deceptively high detection rates (up to 100% in some cases), but these rates fail to generalize to new datasets, with performance dropping by more than 90% in cross-session tests. These findings underscore the importance of considering packet interactions and contextual information, rather than relying solely on IPF, for developing robust and reliable intrusion detection systems in IoT environments.
Original languageEnglish
JournalIEEE Networking Letters
Early online date3 Jan 2025
DOIs
Publication statusE-pub ahead of print - 3 Jan 2025

Keywords

  • IoT security
  • attack detection
  • intrusion detection
  • machine learning
  • network security

ASJC Scopus subject areas

  • Electrical and Electronic Engineering
  • Information Systems
  • Communication
  • Hardware and Architecture

Fingerprint

Dive into the research topics of 'Individual Packet Features are a Risk to Model Generalisation in ML-Based Intrusion Detection'. Together they form a unique fingerprint.

Cite this