Intrusion Detection System Based on Integrated System Calls Graph and Neural Networks

被引:16
作者
Mora-Gimeno, F. J. [1 ]
Mora-Mora, H. [1 ]
Volckaert, B. [2 ]
Atrey, A. [2 ]
机构
[1] Univ Alicante, Dept Comp Technol, San Vicente Del Raspeig 03690, Spain
[2] Univ Ghent, Dept Informat Technol, B-9000 Ghent, Belgium
来源
IEEE ACCESS | 2021年 / 9卷 / 09期
关键词
Intrusion detection; Proposals; Hidden Markov models; Neural networks; Analytical models; Data structures; Text categorization; Anomaly detection; intrusion detection system; neural networks; system calls graph; DEEP LEARNING APPROACH; MODEL;
D O I
10.1109/ACCESS.2021.3049249
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Computer security is one of the main challenges of today's technological infrastructures, whereas intrusion detection systems are one of the most widely used technologies to secure computer systems. The intrusion detection systems use a variety of information sources, one of the most important sources are the applications' system calls. The intrusion detection systems use many different detection techniques, e.g. system calls sequences, text classification techniques and system calls graphs. However, existing techniques obtain poor results in the detection of complex attack patterns, so it is necessary to improve the detection results. This paper presents an intrusion detection system model that integrates multiple detection techniques into a single system with the goal of modeling the global behavior of the applications. In addition, the paper proposes a new modified system calls graph to integrate and represent the information of the different techniques in a single data structure. The system uses a deep neural network to combine the results of the different detection techniques used in the global model. The result of the study shows the improvement obtained in the detection results with respect to the use of individual techniques, the proposed model achieves higher detection rates and lower false positives. The proposal has been validated onto three datasets with different levels of complexity.
引用
收藏
页码:9822 / 9833
页数:12
相关论文
共 58 条
[1]   Network Anomaly Intrusion Detection Using a Nonparametric Bayesian Approach and Feature Selection [J].
Alhakami, Wajdi ;
Alharbi, Abdullah ;
Bourouis, Sami ;
Alroobaea, Roobaea ;
Bouguila, Nizar .
IEEE ACCESS, 2019, 7 :52181-52190
[2]   Real Time Security Assessment of the Power System Using a Hybrid Support Vector Machine and Multilayer Perceptron Neural Network Algorithms [J].
Alimi, Oyeniyi Akeem ;
Ouahada, Khmaies ;
Abu-Mahfouz, Adnan M. .
SUSTAINABILITY, 2019, 11 (13)
[3]   A Multi-Classifier Network-Based Crypto Ransomware Detection System: A Case Study of Locky Ransomware [J].
Almashhadani, Ahmad O. ;
Kaiiali, Mustafa ;
Sezer, Sakir ;
O'Kane, Philip .
IEEE ACCESS, 2019, 7 :47053-47067
[4]   An intrusion detection system for connected vehicles in smart cities [J].
Aloqaily, Moayad ;
Otoum, Safa ;
Al Ridhawi, Ismaeel ;
Jararweh, Yaser .
AD HOC NETWORKS, 2019, 90
[5]  
Alpaño PVS, 2017, TENCON IEEE REGION, P2825, DOI 10.1109/TENCON.2017.8228342
[6]   Sample Selected Extreme Learning Machine Based Intrusion Detection in Fog Computing and MEC [J].
An, Xingshuo ;
Zhou, Xianwei ;
Lu, Xing ;
Lin, Fuhong ;
Yang, Lei .
WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2018,
[7]  
Anandapriya M, 2015, PROCEEDINGS OF 2015 IEEE 9TH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS AND CONTROL (ISCO)
[8]  
[Anonymous], P THE INT C ENG MIS, DOI DOI 10.1145/2832987.2833067
[9]  
Bai Y., 2020, IEEE T INTELL TRANSP, V21, P919, DOI [10.1109/TITS.2019.2908074, DOI 10.1109/TITS.2019.2908074]
[10]   A Survey of Intrusion Detection Systems Leveraging Host Data [J].
Bridges, Robert A. ;
Glass-Vanderlan, Tarrah R. ;
Iannacone, Michael D. ;
Vincent, Maria S. ;
Chen, Qian .
ACM COMPUTING SURVEYS, 2020, 52 (06)