Deep learning-based feature extraction and optimizing pattern matching for intrusion detection using finite state machine

被引:14
作者
Abbasi, Junaid Shabbir [1 ,2 ]
Bashir, Faisal [1 ,2 ]
Qureshi, Kashif Naseer [1 ,2 ]
ul Islam, Muhammad Najam [2 ]
Jeon, Gwanggil [3 ]
机构
[1] Bahria Univ, Dept Comp Sci, Islamabad, Pakistan
[2] Bahria Univ, Cyber Reconnaissance & Combat CRC Lab, Islamabad, Pakistan
[3] Incheon Natl Univ, Dept Embedded Syst Engn, Incheon, South Korea
关键词
Deep learning; Detection; Pattern matching; Machine learning; Intrusion detection; Attacks;
D O I
10.1016/j.compeleceng.2021.107094
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Deep learning has gained popularity for feature extraction in the field of Network Intrusion Detection and Prevention System (NIDPS) to extract the patterns matching and secure the networks by detecting the unknown and malicious activities. The malicious activities and security attacks are disturbing the normal operations of networks. The new attacks are difficult to monitor due to their new features and pattern types. Different types of methods have been adopted for feature extraction and pattern matching. Deep learning is one of them and subfield of machine learning where it solves the optimization issues layer-wise by looking at the deep structure. On the other hand, pattern matching is another considerable method for intrusion detection due to its variety of applications. However, pattern matching methods are consuming more than 70% of the total running time and cause overhead. In this paper, we propose two methods including Deep Learning-based Feature Extraction (DLFE) and Optimization of Pattern Matching (OPM) for NIDPS systems to optimizes the pattern matching engine in intrusion detection. The experiments are performed by using the snort ruleset for pattern matching and obtained the results. The experiment results show the better performance of proposed methods in terms of time, throughput, and memory.
引用
收藏
页数:12
相关论文
共 25 条
  • [1] Anomaly-based intrusion detection system through feature selection analysis and building hybrid efficient model
    Aljawarneh, Shadi
    Aldwairi, Monther
    Yassein, Muneer Bani
    [J]. JOURNAL OF COMPUTATIONAL SCIENCE, 2018, 25 : 152 - 160
  • [2] Arudchutha S, 2013, INT CONF IND INF SYS, P231, DOI 10.1109/ICIInfS.2013.6731987
  • [3] Askwith B.:, 2019, IEEE ACCESS
  • [4] Fast and scalable pattern matching for network intrusion detection systems
    Dharmapurikar, Sarang
    Lockwood, John W.
    [J]. IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2006, 24 (10) : 1781 - 1792
  • [5] An efficient parallel-network packet pattern-matching approach using GPUs
    Hung, Che-Lun
    Lin, Chun-Yuan
    Wang, Hsiao-Hsi
    [J]. JOURNAL OF SYSTEMS ARCHITECTURE, 2014, 60 (05) : 431 - 439
  • [6] An adaptive interference-aware and traffic-aware channel assignment strategy for backhaul networks
    Iqbal, Saleem
    Abdullah, Abdul Hanan
    Qureshi, Kashif Naseer
    [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2020, 32 (11)
  • [7] A survey of deep learning-based network anomaly detection
    Kwon, Donghwoon
    Kim, Hyunjoo
    Kim, Jinoh
    Suh, Sang C.
    Kim, Ikkyun
    Kim, Kuinam J.
    [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2019, 22 (Suppl 1): : 949 - 961
  • [8] SafeDrive: Detecting Distracted Driving Behaviors Using Wrist-Worn Devices
    Jiang, Landu
    Lin, Xinye
    Liu, Xue
    Bi, Chongguang
    Xing, Guoliang
    [J]. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies, 2017, 1 (04)
  • [9] Lin CH, 2018, PROCEEDINGS OF 4TH IEEE INTERNATIONAL CONFERENCE ON APPLIED SYSTEM INNOVATION 2018 ( IEEE ICASI 2018 ), P578, DOI 10.1109/ICASI.2018.8394319
  • [10] Lu R, 2016, IEEE CONF COMM NETW, P342, DOI 10.1109/CNS.2016.7860502