NOS-Gate: Queue-Aware Streaming IDS for Consumer Gateways under Timing-Controlled Evasion

📅 2026-01-01
🏛️ arXiv.org
📈 Citations: 0
Influential: 0
📄 PDF
🤖 AI Summary
This work addresses the vulnerability of consumer gateways to adaptive attackers who exploit timing and burst patterns in encrypted traffic to evade metadata-only detection mechanisms. To counter this threat, the authors propose NOS-Gate, a lightweight, streaming intrusion detection system that introduces network-optimized spiking (NOS) dynamics to gateway-level IDS for the first time. NOS-Gate dynamically constructs bistable units and scores metadata windows to trigger a reversible rate-limiting mechanism based on a K-of-M persistence rule, temporarily reducing the weight of suspicious flows within a weighted fair queuing scheduler. Evaluated under realistic conditions, the system achieves an event recall of 0.952 at a false positive rate of 0.1%, significantly outperforming baseline methods (0.857), while requiring only 2.09 microseconds per flow for scoring and effectively reducing p99.9 queuing and collateral latency.

Technology Category

Application Category

📝 Abstract
Timing and burst patterns can leak through encryption, and an adaptive adversary can exploit them. This undermines metadata-only detection in a stand-alone consumer gateway. Therefore, consumer gateways need streaming intrusion detection on encrypted traffic using metadata only, under tight CPU and latency budgets. We present a streaming IDS for stand-alone gateways that instantiates a lightweight two-state unit derived from Network-Optimised Spiking (NOS) dynamics per flow, named NOS-Gate. NOS-Gate scores fixed-length windows of metadata features and, under a $K$-of-$M$ persistence rule, triggers a reversible mitigation that temporarily reduces the flow's weight under weighted fair queueing (WFQ). We evaluate NOS-Gate under timing-controlled evasion using an executable'worlds'benchmark that specifies benign device processes, auditable attacker budgets, contention structure, and packet-level WFQ replay to quantify queue impact. All methods are calibrated label-free via burn-in quantile thresholding. Across multiple reproducible worlds and malicious episodes, at an achieved $0.1%$ false-positive operating point, NOS-Gate attains 0.952 incident recall versus 0.857 for the best baseline in these runs. Under gating, it reduces p99.9 queueing delay and p99.9 collateral delay with a mean scoring cost of ~ 2.09 {\mu}s per flow-window on CPU.
Problem

Research questions and friction points this paper is trying to address.

timing-controlled evasion
streaming IDS
encrypted traffic
consumer gateways
metadata-only detection
Innovation

Methods, ideas, or system contributions that make the work stand out.

NOS-Gate
streaming IDS
timing-controlled evasion
metadata-only detection
weighted fair queueing
🔎 Similar Papers
No similar papers found.
Muhammad Bilal
Muhammad Bilal
Associate Professor, Lancaster University, United Kingdom
Internet of ThingsEdge ComputingCryptologyMachine LearningArtificial Intelligence
O
Omer Tariq
School of Computing, Korea Advanced Institute of Science and Technology, Daejeon, 34141, South Korea
H
Hasan Ahmed
School of Computing and Communications, Lancaster University, LA1 4WA, Lancaster, U.K.