Detection and Recognition of Atomic Evasions Against Network Intrusion Detection/Prevention Systems

被引:4
作者
Jia Jingping [1 ]
Chen Kehua [1 ]
Chen Jia [2 ]
Zhou Dengwen [1 ]
Ma Wei [1 ]
机构
[1] North China Elect Power Univ, Sch Control & Comp Engn, Beijing 102206, Peoples R China
[2] China Commun Asset Management Co Ltd, Beijing 100013, Peoples R China
基金
北京市自然科学基金;
关键词
Network intrusion detection/prevention; network evasion; term frequency and inverse document frequency;
D O I
10.1109/ACCESS.2019.2925639
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Network evasions can bypass network intrusion detection/prevention systems to deliver exploits, attacks, or malware to victims without being detected. This paper presents a novel method for the detection and recognition of atomic network evasions by the classification of a transmission control protocol (TCP) stream's packet behavior. The syntax for the conversion of TCP streams to codeword streams is proposed to facilitate the extraction of statistical features while preserving the evasion behavior attributes of original network flows. We developed a feature extraction method of employing the normalized term frequencies of codewords to characterize intra and inter packet attribute patterns hidden in actual TCP streams. A TCP stream is then transformed to a fixed length numeric feature vector. Supervised multi-class classifiers are built on the extracted feature vectors to differentiate different types of evasions from normal streams. The quantitative evaluations on an evasion dataset consisting of normal network flows and eight types of atomic evasion flows demonstrated that the proposed approach achieved an encouraging performance with an accuracy of 98.95%.
引用
收藏
页码:87816 / 87826
页数:11
相关论文
共 41 条
[1]   Adversarial Anomaly Detection Using Centroid-based Clustering [J].
Anindya, Imrul Chowdhury ;
Kantarcioglu, Murat .
2018 IEEE INTERNATIONAL CONFERENCE ON INFORMATION REUSE AND INTEGRATION (IRI), 2018, :1-8
[2]  
[Anonymous], 2010, P 6 INT CONFERENCE P, DOI [DOI 10.1145/1921168.1921179, 10.1145/1921168.1921179]
[3]  
[Anonymous], 2011, PROC ANN HAWAII INT
[4]  
Bukac V, 2010, THESIS MASARYKOVA U
[5]   Extending Advanced Evasion Techniques Using Combinatorial Search [J].
Chammem, M'hamed ;
Hamdi, Mohamed ;
Kim, Tai-Hoon .
2014 7TH INTERNATIONAL CONFERENCE ON SECURITY TECHNOLOGY (SECTECH), 2014, :41-46
[6]   Evasion Techniques: Sneaking through Your Intrusion Detection/Prevention Systems [J].
Cheng, Tsung-Huan ;
Lin, Ying-Dar ;
Lai, Yuan-Cheng ;
Lin, Po-Ching .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2012, 14 (04) :1011-1020
[7]  
Du H., 2018, ARXIV180901562
[8]  
Gorton A., 2004, COMBINING EVASION TE
[9]  
Hamid Yasir., 2016, British Journal of Applied Science and Technology, V15, P1
[10]  
Hettich S., 1999, The UCI KDD Archive