Advanced Intrusion Detection Combining Signature-Based and Behavior-Based Detection Methods
نویسندگان
چکیده
Recently, devices in real-time systems, such as residential facilities, vehicles, factories, and social infrastructure, have been increasingly connected to communication networks. Although these provide administrative convenience enable the development of more sophisticated control critical cybersecurity concerns challenges remain. In this paper, we propose a hybrid anomaly detection method that combines statistical filtering composite autoencoder effectively detect anomalous behaviors possibly caused by malicious activity order mitigate risk cyberattacks. We used SWaT dataset, which was collected from real water treatment system, conduct case study cyberattacks on industrial systems validate performance proposed approach. then evaluated dataset with two time window settings for autoencoder. According experimental results, improved precision, recall, F1-score up 0.008, 0.067, 0.039, respectively, compared an autoencoder-only Moreover, computational cost terms execution time. The reduced 8.03% Through show detected anomalies than approach it also operated significantly faster.
منابع مشابه
Signature-Based Approach for Intrusion Detection
This research presents a data mining technique for discovering masquerader intrusion. User/system access data are used as a basis for deriving statistically significant event patterns. These patterns could be considered as a user/system access signature. Signature-based approach employs a model discovery technique to derive a reference ground model accounting for the user/system access data. A ...
متن کاملExclusion-based Signature Matching for Intrusion Detection
We consider the problem of efficient string-based signature matching for Network Intrusion Detection Systems (NIDSes). String matching computations dominate in the overall cost of running a NIDS, despite the use of efficient generalpurpose string matching algorithms. Aiming at increasing the efficiency and capacity of NIDSes, we have designed ExB, a string matching algorithm tailored to the spe...
متن کاملIntrusion Detection based on Incremental Combining Classifiers
Intrusion detection (ID) is the task of analysis the event occurring on a network system in order to detect abnormal activity. Intrusion Detection System has increased due to its more constructive working than traditional security mechanisms. As the network data is dynamic in nature, it leads to the problem of incremental learning of dynamic data. Now, combining classifiers is a new method for ...
متن کاملUSAID: Unifying Signature-Based and Anomaly-Based Intrusion Detection
Most intrusion detection techniques suffer from either an inability to detect unknown intrusions, or unacceptably high false alarm rates. However, there lacks a general basis to analyze and find solutions to these problems. In this paper, we propose such a theoretical basis for intrusion detection, which makes it possible to systematically express and analyze the detection performance metrics s...
متن کاملSimulation-Based Radar Detection Methods
In this paper, radar detection based on Monte Carlo sampling is studied. Two detectors based on Importance Sampling are presented. In these detectors, called Particle Detector, the approximated likelihood ratio is calculated by Monte Carlo sampling. In the first detector, the unknown parameters are first estimated and are substituted in the likelihood ratio (like the GLRT method). In the sec...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Electronics
سال: 2022
ISSN: ['2079-9292']
DOI: https://doi.org/10.3390/electronics11060867