IT Intrusion Detection Using Statistical Learning and Testbed Measurements

被引:1
作者
Wang, Xiaoxuan [1 ]
Stadler, Rolf [1 ]
机构
[1] KTH Royal Inst Technol, Dept Comp Sci, Stockholm, Sweden
来源
PROCEEDINGS OF 2024 IEEE/IFIP NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM, NOMS 2024 | 2024年
关键词
automated security; intrusion detection; Hidden Markov Model; Long Short-Term Memory; SNORT; forensics; HIDDEN MARKOV-MODELS;
D O I
10.1109/NOMS59830.2024.10575087
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
We study automated intrusion detection in an IT infrastructure, specifically the problem of identifying the start of an attack, the type of attack, and the sequence of actions an attacker takes, based on continuous measurements from the infrastructure. We apply statistical learning methods, including Hidden Markov Model (HMM), Long Short-Term Memory (LSTM), and Random Forest Classifier (RFC) to map sequences of observations to sequences of predicted attack actions. In contrast to most related research, we have abundant data to train the models and evaluate their predictive power. The data comes from traces we generate on an in-house testbed where we run attacks against an emulated IT infrastructure. Central to our work is a machine-learning pipeline that maps measurements from a high-dimensional observation space to a space of low dimensionality or to a small set of observation symbols. Investigating intrusions in offline as well as online scenarios, we find that both HMM and LSTM can be effective in predicting attack start time, attack type, and attack actions. If sufficient training data is available, LSTM achieves higher prediction accuracy than HMM. HMM, on the other hand, requires less computational resources and less training data for effective prediction. Also, we find that the methods we study benefit from data produced by traditional intrusion detection systems like SNORT.
引用
收藏
页数:7
相关论文
共 39 条
[1]  
Althubiti SA, 2018, 2018 28TH INTERNATIONAL TELECOMMUNICATION NETWORKS AND APPLICATIONS CONFERENCE (ITNAC), P293
[2]   Hidden Markov models for malware classification [J].
Annachhatre, Chinmayee ;
Austin, Thomas H. ;
Stamp, Mark .
JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2015, 11 (02) :59-73
[3]  
Årnes A, 2006, LECT NOTES COMPUT SC, V4219, P145
[4]   Performance Evaluation of Supervised Machine Learning Algorithms for Intrusion Detection [J].
Belavagi, Manjula C. ;
Muniyal, Balachandra .
TWELFTH INTERNATIONAL CONFERENCE ON COMMUNICATION NETWORKS, ICCN 2016 / TWELFTH INTERNATIONAL CONFERENCE ON DATA MINING AND WAREHOUSING, ICDMW 2016 / TWELFTH INTERNATIONAL CONFERENCE ON IMAGE AND SIGNAL PROCESSING, ICISP 2016, 2016, 89 :117-123
[5]   SEDE-GPS: socio-economic data enrichment based on GPS information [J].
Sperlea, Theodor ;
Fueser, Stefan ;
Boenigk, Jens ;
Heider, Dominik .
BMC BIOINFORMATICS, 2018, 19
[6]   Advance Persistent Threat Detection Using Long Short Term Memory (LSTM) Neural Networks [J].
Charan, P. V. Sai ;
Kumar, T. Gireesh ;
Anand, P. Mohan .
EMERGING TECHNOLOGIES IN COMPUTER ENGINEERING: MICROSERVICES IN BIG DATA ANALYTICS, 2019, 985 :45-54
[7]  
Chen CM, 2016, INT J INNOV COMPUT I, V12, P569
[8]  
Choubisa M., 2022, 2022 INT C IOT BLOCK, P1
[9]  
da Costa VGT, 2017, IEEE ICC
[10]   Leveraging LSTM Networks for Attack Detection in Fog-to-Things Communications [J].
Diro, Abebe ;
Chilamkurti, Naveen .
IEEE COMMUNICATIONS MAGAZINE, 2018, 56 (09) :124-130