BR-HIDF: An Anti-Sparsity and Effective Host Intrusion Detection Framework Based on Multi-Granularity Feature Extraction

被引:2
作者
He, Junjiang [1 ]
Tang, Cong [1 ]
Li, Wenshan [2 ]
Li, Tao [1 ]
Chen, Li [1 ]
Lan, Xiaolong [1 ]
机构
[1] Sichuan Univ, Sch Cyber Sci & Engn, Chengdu 610065, Peoples R China
[2] Chengdu Univ Informat Technol, Sch Cyber Sci & Engn, Chengdu 610225, Peoples R China
关键词
Feature extraction; Intrusion detection; Task analysis; Training; Training data; Real-time systems; Process control; Host-based intrusion detection; multi-granularity feature extraction; sparse feature space; anomaly detection; system calls; FEATURE-SELECTION; SEQUENCE;
D O I
10.1109/TIFS.2023.3324388
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Host-based intrusion detection systems (HIDS) have been widely acknowledged as an effective approach for detecting and mitigating malicious activities. Among various data sources utilized in HIDS, system call traces have gained significant popularity due to their inherent advantage of providing fine-grained information. Nevertheless, conventional feature extraction techniques relying on system calls tend to overlook the issue of high-dimensional sparse feature space. In this paper, we conduct a theoretical analysis to investigate the underlying causes of the sparsity problem. Subsequently, we propose an anti-sparse theory (anti-ST) as a solution to address this issue. Then, we design a multi-granularity feature extraction method (MGFE), which also meets the prerequisite mathematical conditions of the anti-ST. By applying this method, we effectively reduce the size of the feature space and minimize the number of generated features, thus mitigating sparsity. Furthermore, leveraging this approach, we propose a robust and anti-sparsity host intrusion detection framework, known as the MGFE-based Host Intrusion Detection Framework (BR-HIDF). A series of experiments were conducted to evaluate the proposed framework and compare it with the state-of-the-art method. The results demonstrate that our framework achieves impressive accuracy (97.26%), precision (97.62%), recall (96.85%), and F1 score (97.23%) in the intrusion detection task, surpassing existing frameworks. Moreover, the proposed framework significantly reduces the time overhead by 38.80%, exhibiting the highest AUC value of 0.992. Furthermore, we enhance the robustness of the detection system by integrating host-based and network-based detection, which provides greater flexibility in identifying various types of attacks.
引用
收藏
页码:485 / 499
页数:15
相关论文
共 40 条
  • [1] MGA-IDS: Optimal feature subset selection for anomaly detection framework on in-vehicle networks-CAN bus based on genetic algorithm and intrusion detection approach
    Aksu, Dogukan
    Aydin, Muhammed Ali
    [J]. COMPUTERS & SECURITY, 2022, 118
  • [2] Wrapper feature selection method based differential evolution and extreme learning machine for intrusion detection system
    Al-Yaseen, Wathiq Laftah
    Idrees, Ali Kadhum
    Almasoudy, Faezah Hamad
    [J]. PATTERN RECOGNITION, 2022, 132
  • [3] Alariti SS, 2012, INT CONF INTERNET, P211
  • [4] Deep learning approaches for anomaly-based intrusion detection systems: A survey, taxonomy, and open issues
    Aldweesh, Arwa
    Derhab, Abdelouahid
    Emam, Ahmed Z.
    [J]. KNOWLEDGE-BASED SYSTEMS, 2020, 189 (189)
  • [5] Deep Abstraction and Weighted Feature Selection for Wi-Fi Impersonation Detection
    Aminanto, Muhamad Erza
    Choi, Rakyong
    Tanuwidjaja, Harry Chandra
    Yoo, Paul D.
    Kim, Kwangjo
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2018, 13 (03) : 621 - 636
  • [6] A Semantic Approach to Host-Based Intrusion Detection Systems Using Contiguous and Discontiguous System Call Patterns
    Creech, Gideon
    Hu, Jiankun
    [J]. IEEE TRANSACTIONS ON COMPUTERS, 2014, 63 (04) : 807 - 819
  • [7] Das PK, 2017, IEEE CONF COMPUT, P487, DOI 10.1109/INFCOMW.2017.8116425
  • [8] Supervised feature selection techniques in network intrusion detection: A critical review
    Di Mauro, M.
    Galatro, G.
    Fortino, G.
    Liotta, A.
    [J]. ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE, 2021, 101
  • [9] Eisenstein J, 2019, ADAPT COMPUT MACH LE, P1
  • [10] An anomaly detection framework for cyber-security data
    Evangelou, Marina
    Adams, Niall M.
    [J]. COMPUTERS & SECURITY, 2020, 97