Network intrusion detection based on n-gram frequency and time-aware transformer

被引:19
作者
Han, Xueying [1 ,2 ]
Cui, Susu [1 ,2 ]
Liu, Song [1 ,2 ]
Zhang, Chen [1 ,2 ]
Jiang, Bo [1 ,2 ]
Lu, Zhigang [1 ,2 ]
机构
[1] Chinese Acad Sci, Inst Informat Engn, Beijing, Peoples R China
[2] Univ Chinese Acad Sci, Sch Cyber Secur, Beijing, Peoples R China
关键词
Intrusion detection; Deep learning; Transformer; N; -Gram;
D O I
10.1016/j.cose.2023.103171
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Network intrusion detection system plays a critical role in protecting the target network from attacks. However, most existing detection methods cannot fully utilize the information contained in raw network traffic, such as information loss in the feature extraction process and incomplete feature dimensions, which lead to performance bottlenecks. In this paper, we propose a novel intrusion detection model based on n-gram frequency and time-aware transformer called GTID. GTID can learn traffic features from packet-level and session-level hierarchically and can minimize information as much as possible. To ex-tract packet-level features effectively, GTID considers the different roles of packet header and payload, and processes them in different ways, where n-gram frequency is used to represent payload contextual information because of its conciseness. Then, GTID uses the proposed time-aware transformer to learn session-level features for intrusion detection. The time-aware transformer considers the time intervals between packets, and learns the temporal features of a session for classification. For evaluation, several solid experiments are conducted on the ISCX2012 dataset and the CICIDS2017 dataset, and the results show the effectiveness and robustness of GTID.(c) 2023 Elsevier Ltd. All rights reserved.
引用
收藏
页数:15
相关论文
共 49 条
  • [1] Network intrusion detection system: A systematic study of machine learning and deep learning approaches
    Ahmad, Zeeshan
    Shahid Khan, Adnan
    Wai Shiang, Cheah
    Abdullah, Johari
    Ahmad, Farhan
    [J]. TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2021, 32 (01)
  • [2] n-Grams exclusion and inclusion filter for intrusion detection in Internet of Energy big data systems
    Aldwairi, Monther
    Alansari, Duaa
    [J]. TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2022, 33 (03):
  • [3] Anderson J.P., 1980, Computer security threat monitoring and surveillance
  • [4] GAN augmentation to deal with imbalance in imaging-based intrusion detection
    Andresini, Giuseppina
    Appice, Annalisa
    De Rose, Luca
    Malerba, Donato
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2021, 123 (123): : 108 - 127
  • [5] Arp D., 2022, PROC USENIX SECURITY
  • [6] Bickel Steffen, 2005, P HUMAN LANGUAGE T, P193
  • [7] POSEIDON: a 2-tier anomaly-based network intrusion detection system
    Bolzoni, Damiano
    Etalle, Sandro
    Hartel, Pieter
    Zambon, Emmanuele
    [J]. FOURTH IEEE INTERNATIONAL WORKSHOP ON INFORMATION ASSURANCE, PROCEEDINGS, 2006, : 144 - +
  • [8] A quantitative approach for intrusions detection and prevention based on statistical n-gram models
    Boulaiche, Ammar
    Bouzayani, Hatem
    Adi, Kamel
    [J]. ANT 2012 AND MOBIWIS 2012, 2012, 10 : 450 - 457
  • [9] Brown P. F., 1992, Computational Linguistics, V18, P467
  • [10] An efficient network behavior anomaly detection using a hybrid DBN-LSTM network
    Chen, Aiguo
    Fu, Yang
    Zheng, Xu
    Lu, Guoming
    [J]. COMPUTERS & SECURITY, 2022, 114