An auto-learning approach for network intrusion detection

被引:6
作者
Boulaiche, Ammar [1 ,2 ]
Adi, Kamel [2 ]
机构
[1] Univ Bejaia, Dept Comp Sci, Bejaia 06000, Algeria
[2] Univ Quebec Outaouais, Comp Secur Res Lab, Quebec City, PQ, Canada
关键词
Intrusion detection; Honeypots; Fuzzy hashing; DARPA'99 dataset; UNSW-NB15; dataset; LONGEST COMMON SUBSEQUENCE; SIGNATURES; GENERATION; SET;
D O I
10.1007/s11235-017-0395-z
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
In this paper, we propose a novel intrusion detection technique with a fully automatic attack signatures generation capability. The proposed approach exploits a honeypot traffic data analysis to build an attack scenarios database, used to detect potential intrusions. Furthermore, for an effective and efficient intrusion detection mechanism, we introduce several new or adapted algorithms for signature generation, signature comparison, etc. Finally, we use DARPA'99 and UNSW-NB15 traffic to evaluate the proposed approach. The results indicate that the generated attack signatures are of high quality with low rates of false negatives and false positives.
引用
收藏
页码:277 / 294
页数:18
相关论文
共 50 条
  • [21] Network intrusion detection methods based on deep learning
    Li X.
    Zhang S.
    Recent Patents on Engineering, 2021, 15 (04):
  • [22] Campus Network Intrusion Detection based on Federated Learning
    Chen, Junjun
    Guo, Qiang
    Fu, Zhongnan
    Shang, Qun
    Ma, Hao
    Wu, Di
    2022 INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS (IJCNN), 2022,
  • [23] Distributed Transfer Network Learning Based Intrusion Detection
    Gou, Shuiping
    Wang, Yuqin
    Jiao, Licheng
    Feng, Jing
    Yao, Yao
    2009 IEEE INTERNATIONAL SYMPOSIUM ON PARALLEL AND DISTRIBUTED PROCESSING WITH APPLICATIONS, PROCEEDINGS, 2009, : 511 - 515
  • [24] Deep Learning Applications for Intrusion Detection in Network Traffic
    Getman, A. I.
    Rybolovlev, D. A.
    Nikolskaya, A. G.
    PROGRAMMING AND COMPUTER SOFTWARE, 2024, 50 (07) : 493 - 510
  • [25] Lightweight Federated Learning for Efficient Network Intrusion Detection
    Bouayad, Abdelhak
    Alami, Hamza
    Idrissi, Meryem Janati
    Berrada, Ismail
    IEEE ACCESS, 2024, 12 : 172027 - 172045
  • [26] Deep Learning for Network Intrusion Detection in Virtual Networks
    Spiekermann, Daniel
    Eggendorfer, Tobias
    Keller, Joerg
    ELECTRONICS, 2024, 13 (18)
  • [27] A case-based approach to network intrusion detection
    Schwartz, DG
    Stoecklin, S
    Yilmaz, E
    PROCEEDINGS OF THE FIFTH INTERNATIONAL CONFERENCE ON INFORMATION FUSION, VOL II, 2002, : 1084 - 1089
  • [28] Multivariable Heuristic Approach to Intrusion Detection in Network Environments
    Niemiec, Marcin
    Kosciej, Rafal
    Gdowski, Bartlomiej
    ENTROPY, 2021, 23 (06)
  • [29] NetSTAT: A network-based intrusion detection approach
    Vigna, G
    Kemmerer, RA
    14TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 1998, : 25 - 34
  • [30] Learning Vector Quantization Neural Network Method for Network Intrusion Detection
    YANG Degang1
    2. Department of Mathematics and Computer Science
    3. Department of Modern Educational Technology
    4. Department of Mathematics
    WuhanUniversityJournalofNaturalSciences, 2007, (01) : 147 - 150