Hybrid intrusion detection and signature generation using Deep Recurrent Neural Networks

被引:59
作者
Kaur, Sanmeet [1 ]
Singh, Maninder [1 ]
机构
[1] Thapar Univ Patiala, Comp Sci & Engn Dept, Patiala, Punjab, India
关键词
Deep learning; Intrusion Detection System; LSTM; Attack detection; Signature generation; Machine learning; Web attacks; Zero-day attack; LEARNING APPROACH;
D O I
10.1007/s00521-019-04187-9
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Automated signature generation for Intrusion Detection Systems (IDSs) for proactive security of networks is a promising area of research. An IDS monitors a system or activities of a network for detecting any policy violations or malicious actions and produces reports to the management system. Numerous solutions have been proposed by various researchers so far for intrusion detection in networks. However, the need to efficiently identifying any intrusion in the network is on the rise as the network attacks are increasing exponentially. This research work proposes a deep learning-based system for hybrid intrusion detection and signature generation of unknown web attacks referred as D-Sign. D-Sign is capable of successfully detecting and generating attack signatures with high accuracy, sensitivity and specificity. It has been for attack detection and signature generation of web-based attacks. D-Sign has reported significantly low False Positives and False Negatives. The experimental results demonstrated that the proposed system identifies the attacks proactively than other state-of-the-art approaches and generates signatures effectively thereby causing minimum damage due to network attacks.
引用
收藏
页码:7859 / 7877
页数:19
相关论文
共 37 条
[1]  
[Anonymous], 2017, Open Web Application Security Project (OWASP)
[2]  
Azzouni A., 2017, ARXIV170505690
[3]  
Choi S, 2016, I C INF COMM TECH CO, P1191, DOI 10.1109/ICTC.2016.7763403
[4]  
Costa M., 2005, P 21 ACM SIGOPS S OP, P133
[5]   A Self-Adaptive Deep Learning-Based System for Anomaly Detection in 5G Networks [J].
Fernandez Maimo, Lorenzo ;
Perales Gomez, Angel Luis ;
Garcia Clemente, Felix J. ;
Gil Perez, Manuel ;
Martinez Perez, Gregorio .
IEEE ACCESS, 2018, 6 :7700-7712
[6]  
Gallagher B, 2008, CTR ADV SIGN IM SCI, P1
[7]  
Griffin K, 2009, LECT NOTES COMPUT SC, V5758, P101, DOI 10.1007/978-3-642-04342-0_6
[8]   Automatic Attack Signature Generation Systems: A Review [J].
Kaur, Sanmeet ;
Singh, Maninder .
IEEE SECURITY & PRIVACY, 2013, 11 (06) :54-61
[9]  
Kim HA, 2004, USENIX ASSOCIATION PROCEEDINGS OF THE 13TH USENIX SECURITY SYMPOSIUM, P271
[10]  
Kim I., 2009, INT J COMPUTERS, V3, P104