Hybrid intrusion detection and signature generation using Deep Recurrent Neural Networks

作者: Sanmeet Kaur , Maninder Singh

DOI: 10.1007/S00521-019-04187-9

关键词: Intrusion detection systemData miningIntrusionFalse positives and false negativesRecurrent neural networkSignature (logic)Computer science

摘要: … In particular, we consider a byte sequence ‘str’ to be a candidate signature string if it occurs in at least ‘λ’ percent of malicious flows. For the signature extraction, a generalized suffix tree-…

参考文章(31)
G. Portokalidis, H.J. Bos, J.M. Slowinska, Argos: an Emulator for Fingerprinting Zero-Day Attacks ,(2006)
Yangseo Choi, Koohong Kang, Ikkyun Kim, Jintae Oh, Daewon Kim, Jongsoo Jang, Validation Methods of Suspicious Network Flows for Unknown Attack Detection ,(2009)
Cristian Estan, George Varghese, Stefan Savage, Sumeet Singh, The EarlyBird System for Real-time Detection of Unknown Worms ,(2005)
Kent Griffin, Scott Schneider, Xin Hu, Tzi-cker Chiueh, Automatic Generation of String Signatures for Malware Detection recent advances in intrusion detection. pp. 101- 120 ,(2009) , 10.1007/978-3-642-04342-0_6
Tillmann Werner, Christoph Fuchs, Elmar Gerhards-Padilla, Peter Martini, Nebula - generating syntactical network intrusion signatures international conference on malicious and unwanted software. pp. 31- 38 ,(2009) , 10.1109/MALWARE.2009.5403022
Yu Wang, Yang Xiang, Wanlei Zhou, Shunzheng Yu, Generating regular expression signatures for network traffic classification in trusted network management Journal of Network and Computer Applications. ,vol. 35, pp. 992- 1000 ,(2012) , 10.1016/J.JNCA.2011.03.017
Sanmeet Kaur, Maninder Singh, Automatic attack signature generation systems: A review ieee symposium on security and privacy. ,vol. 11, pp. 54- 61 ,(2013) , 10.1109/MSP.2013.51
Christian Kreibich, Jon Crowcroft, Honeycomb: creating intrusion detection signatures using honeypots acm special interest group on data communication. ,vol. 34, pp. 51- 56 ,(2004) , 10.1145/972374.972384
E. Ukkonen, On-line construction of suffix trees Algorithmica. ,vol. 14, pp. 249- 260 ,(1995) , 10.1007/BF01206331
Mansour Sheikhan, Zahra Jadidi, Ali Farrokhi, Intrusion detection using reduced-size RNN based on feature grouping Neural Computing and Applications. ,vol. 21, pp. 1185- 1190 ,(2012) , 10.1007/S00521-010-0487-0