Network intrusion detection based on n-gram frequency and time-aware transformer

被引:29
作者
Han, Xueying [1 ,2 ]
Cui, Susu [1 ,2 ]
Liu, Song [1 ,2 ]
Zhang, Chen [1 ,2 ]
Jiang, Bo [1 ,2 ]
Lu, Zhigang [1 ,2 ]
机构
[1] Chinese Acad Sci, Inst Informat Engn, Beijing, Peoples R China
[2] Univ Chinese Acad Sci, Sch Cyber Secur, Beijing, Peoples R China
关键词
Intrusion detection; Deep learning; Transformer; N; -Gram;
D O I
10.1016/j.cose.2023.103171
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Network intrusion detection system plays a critical role in protecting the target network from attacks. However, most existing detection methods cannot fully utilize the information contained in raw network traffic, such as information loss in the feature extraction process and incomplete feature dimensions, which lead to performance bottlenecks. In this paper, we propose a novel intrusion detection model based on n-gram frequency and time-aware transformer called GTID. GTID can learn traffic features from packet-level and session-level hierarchically and can minimize information as much as possible. To ex-tract packet-level features effectively, GTID considers the different roles of packet header and payload, and processes them in different ways, where n-gram frequency is used to represent payload contextual information because of its conciseness. Then, GTID uses the proposed time-aware transformer to learn session-level features for intrusion detection. The time-aware transformer considers the time intervals between packets, and learns the temporal features of a session for classification. For evaluation, several solid experiments are conducted on the ISCX2012 dataset and the CICIDS2017 dataset, and the results show the effectiveness and robustness of GTID.(c) 2023 Elsevier Ltd. All rights reserved.
引用
收藏
页数:15
相关论文
共 49 条
[1]   Network intrusion detection system: A systematic study of machine learning and deep learning approaches [J].
Ahmad, Zeeshan ;
Shahid Khan, Adnan ;
Wai Shiang, Cheah ;
Abdullah, Johari ;
Ahmad, Farhan .
TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2021, 32 (01)
[2]   n-Grams exclusion and inclusion filter for intrusion detection in Internet of Energy big data systems [J].
Aldwairi, Monther ;
Alansari, Duaa .
TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2022, 33 (03)
[3]  
Anderson J.P., 1980, Computer security threat monitoring and surveillance
[4]   GAN augmentation to deal with imbalance in imaging-based intrusion detection [J].
Andresini, Giuseppina ;
Appice, Annalisa ;
De Rose, Luca ;
Malerba, Donato .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2021, 123 (123) :108-127
[5]  
Arp D., 2022, PROC USENIX SECURITY
[6]  
Bickel S., 2005, P HUMAN LANGUAGE TEC, P193
[7]   POSEIDON: a 2-tier anomaly-based network intrusion detection system [J].
Bolzoni, Damiano ;
Etalle, Sandro ;
Hartel, Pieter ;
Zambon, Emmanuele .
FOURTH IEEE INTERNATIONAL WORKSHOP ON INFORMATION ASSURANCE, PROCEEDINGS, 2006, :144-+
[8]   A quantitative approach for intrusions detection and prevention based on statistical n-gram models [J].
Boulaiche, Ammar ;
Bouzayani, Hatem ;
Adi, Kamel .
ANT 2012 AND MOBIWIS 2012, 2012, 10 :450-457
[9]  
Brown P. F., 1992, Computational Linguistics, V18, P467
[10]   An efficient network behavior anomaly detection using a hybrid DBN-LSTM network [J].
Chen, Aiguo ;
Fu, Yang ;
Zheng, Xu ;
Lu, Guoming .
COMPUTERS & SECURITY, 2022, 114