Advanced Intrusion Detection Combining Signature-Based and Behavior-Based Detection Methods

نویسندگان

چکیده

Recently, devices in real-time systems, such as residential facilities, vehicles, factories, and social infrastructure, have been increasingly connected to communication networks. Although these provide administrative convenience enable the development of more sophisticated control critical cybersecurity concerns challenges remain. In this paper, we propose a hybrid anomaly detection method that combines statistical filtering composite autoencoder effectively detect anomalous behaviors possibly caused by malicious activity order mitigate risk cyberattacks. We used SWaT dataset, which was collected from real water treatment system, conduct case study cyberattacks on industrial systems validate performance proposed approach. then evaluated dataset with two time window settings for autoencoder. According experimental results, improved precision, recall, F1-score up 0.008, 0.067, 0.039, respectively, compared an autoencoder-only Moreover, computational cost terms execution time. The reduced 8.03% Through show detected anomalies than approach it also operated significantly faster.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Signature-Based Approach for Intrusion Detection

This research presents a data mining technique for discovering masquerader intrusion. User/system access data are used as a basis for deriving statistically significant event patterns. These patterns could be considered as a user/system access signature. Signature-based approach employs a model discovery technique to derive a reference ground model accounting for the user/system access data. A ...

متن کامل

Exclusion-based Signature Matching for Intrusion Detection

We consider the problem of efficient string-based signature matching for Network Intrusion Detection Systems (NIDSes). String matching computations dominate in the overall cost of running a NIDS, despite the use of efficient generalpurpose string matching algorithms. Aiming at increasing the efficiency and capacity of NIDSes, we have designed ExB, a string matching algorithm tailored to the spe...

متن کامل

Intrusion Detection based on Incremental Combining Classifiers

Intrusion detection (ID) is the task of analysis the event occurring on a network system in order to detect abnormal activity. Intrusion Detection System has increased due to its more constructive working than traditional security mechanisms. As the network data is dynamic in nature, it leads to the problem of incremental learning of dynamic data. Now, combining classifiers is a new method for ...

متن کامل

USAID: Unifying Signature-Based and Anomaly-Based Intrusion Detection

Most intrusion detection techniques suffer from either an inability to detect unknown intrusions, or unacceptably high false alarm rates. However, there lacks a general basis to analyze and find solutions to these problems. In this paper, we propose such a theoretical basis for intrusion detection, which makes it possible to systematically express and analyze the detection performance metrics s...

متن کامل

Simulation-Based Radar Detection Methods

In this paper, radar detection based on Monte Carlo sampling is studied. Two detectors based on Importance Sampling are presented. In these detectors, called Particle Detector, the approximated likelihood ratio is calculated by Monte Carlo sampling. In the first detector, the unknown parameters are first estimated and are substituted in the likelihood ratio (like the GLRT method). In the sec...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Electronics

سال: 2022

ISSN: ['2079-9292']

DOI: https://doi.org/10.3390/electronics11060867