Host-Based Intrusion Detection Model Using Siamese Network

نویسندگان

چکیده

As cyberattacks become more intelligent, the difficulty increases for traditional intrusion detection systems to detect advanced attacks that deviate from previously stored patterns. To solve this problem, a deep learning-based system model has emerged analyzes intelligent attack patterns through data learning. However, learning models have disadvantage of having re-learn each time new cyberattack method emerges. The required learn large amount is not efficient. In paper, an experiment was conducted using Leipzig Intrusion Detection Data Set (LID-DS), which host-based set released in 2018. addition, order evaluate and improve performance system, consisting pre-processing, vector-to-image processing, training testing steps proposed. steps, Siamese Convolutional Neural Network (Siamese-CNN) constructed few-shot method, shows excellent by small data. Siamese-CNN determines whether type same based on similarity score sample converted image. accuracy calculated technique. Vanilla (Vanilla-CNN) are compared confirm Siamese-CNN. result measuring accuracy, precision, recall, F1-score indicators, it confirmed recall proposed study increased about 6% Vanilla-CNN model.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Process Aware Host-based Intrusion Detection Model

Nowadays, many organizations use Process Aware Information Systems (PAISs) to automate their business process. As any other information systems, security plays a major role in PAIS to provide a secure state and maintain the system in it. In order to provide security in a PAIS, a Process Aware Host-based Intrusion Detection (PAHID) model is proposed in this paper. The model detects host-based in...

متن کامل

Host-Based Intrusion Detection Using User Signatures

An intrusion occurs when an attacker gains unauthorized access to a valid user’s account and performs disruptive behavior while masquerading as that user. The attacker may harm the user’s account directly and can use it to launch attacks on other accounts or machines. Developing “signatures” of users of a computer system is a useful method for detecting when this scenario happens. Our approach ...

متن کامل

Intrusion Detection Using Evolutionary Hidden Markov Model

Intrusion detection systems are responsible for diagnosing and detecting any unauthorized use of the system, exploitation or destruction, which is able to prevent cyber-attacks using the network package analysis. one of the major challenges in the use of these tools is lack of educational patterns of attacks on the part of the engine analysis; engine failure that caused the complete training,  ...

متن کامل

Analysis of Host-Based and Network-Based Intrusion Detection System

Intrusion-detection systems (IDS) aim at detecting attacks against computer systems and networks or, in general, against information systems. Its basic aim is to protect the system against malwares and unauthorized access of a network or a system. Intrusion Detection is of two types Network-IDS and Host BasedIDS. This paper covers the scope of both the types and their result analysis along with...

متن کامل

Survey on Host and Network Based Intrusion Detection System

-------------------------------------------------------------------ABSTRACT--------------------------------------------------------------With invent of new technologies and devices, Intrusion has become an area of concern because of security issues, in the ever growing area of cyber-attack. An intrusion detection system (IDS) is defined as a device or software application which monitors system ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Access

سال: 2021

ISSN: ['2169-3536']

DOI: https://doi.org/10.1109/access.2021.3082160