Network intrusion detection based on n-gram frequency and time-aware transformer

被引:19
作者
Han, Xueying [1 ,2 ]
Cui, Susu [1 ,2 ]
Liu, Song [1 ,2 ]
Zhang, Chen [1 ,2 ]
Jiang, Bo [1 ,2 ]
Lu, Zhigang [1 ,2 ]
机构
[1] Chinese Acad Sci, Inst Informat Engn, Beijing, Peoples R China
[2] Univ Chinese Acad Sci, Sch Cyber Secur, Beijing, Peoples R China
关键词
Intrusion detection; Deep learning; Transformer; N; -Gram;
D O I
10.1016/j.cose.2023.103171
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Network intrusion detection system plays a critical role in protecting the target network from attacks. However, most existing detection methods cannot fully utilize the information contained in raw network traffic, such as information loss in the feature extraction process and incomplete feature dimensions, which lead to performance bottlenecks. In this paper, we propose a novel intrusion detection model based on n-gram frequency and time-aware transformer called GTID. GTID can learn traffic features from packet-level and session-level hierarchically and can minimize information as much as possible. To ex-tract packet-level features effectively, GTID considers the different roles of packet header and payload, and processes them in different ways, where n-gram frequency is used to represent payload contextual information because of its conciseness. Then, GTID uses the proposed time-aware transformer to learn session-level features for intrusion detection. The time-aware transformer considers the time intervals between packets, and learns the temporal features of a session for classification. For evaluation, several solid experiments are conducted on the ISCX2012 dataset and the CICIDS2017 dataset, and the results show the effectiveness and robustness of GTID.(c) 2023 Elsevier Ltd. All rights reserved.
引用
收藏
页数:15
相关论文
共 49 条
  • [11] AN INTRUSION-DETECTION MODEL
    DENNING, DE
    [J]. IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 1987, 13 (02) : 222 - 232
  • [12] Random Forest Modeling for Network Intrusion Detection System
    Farnaaz, Nabila
    Jabbar, M. A.
    [J]. TWELFTH INTERNATIONAL CONFERENCE ON COMMUNICATION NETWORKS, ICCN 2016 / TWELFTH INTERNATIONAL CONFERENCE ON DATA MINING AND WAREHOUSING, ICDMW 2016 / TWELFTH INTERNATIONAL CONFERENCE ON IMAGE AND SIGNAL PROCESSING, ICISP 2016, 2016, 89 : 213 - 217
  • [13] Geva M, 2021, Arxiv, DOI arXiv:2012.14913
  • [14] Ghorbani AA, 2010, ADV INFORM SECUR, V47, P1, DOI 10.1007/978-0-387-88771-5
  • [15] An effective intrusion detection approach using SVM with naive Bayes feature embedding
    Gu, Jie
    Lu, Shan
    [J]. COMPUTERS & SECURITY, 2021, 103
  • [16] A novel approach to intrusion detection using SVM ensemble with feature augmentation
    Gu, Jie
    Wang, Lihong
    Wang, Huiwen
    Wang, Shanshan
    [J]. COMPUTERS & SECURITY, 2019, 86 : 53 - 62
  • [17] Layered higher order n-grams for hardening payload based anomaly intrusion detection
    Hubballi, Neminath
    Biswas, Santosh
    Nandi, Sukumar
    [J]. FIFTH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY: ARES 2010, PROCEEDINGS, 2010, : 321 - 326
  • [18] Jing DS, 2019, INT CONF ASIC
  • [19] A new method of hybrid time window embedding with transformer-based traffic data classification in IoT-networked environment
    Kozik, Rafal
    Pawlicki, Marek
    Choras, Michal
    [J]. PATTERN ANALYSIS AND APPLICATIONS, 2021, 24 (04) : 1441 - 1449
  • [20] GAN-based imbalanced data intrusion detection system
    Lee, JooHwa
    Park, KeeHyun
    [J]. PERSONAL AND UBIQUITOUS COMPUTING, 2021, 25 (01) : 121 - 128