Host-Based Intrusion Detection Model Using Siamese Network
نویسندگان
چکیده
As cyberattacks become more intelligent, the difficulty increases for traditional intrusion detection systems to detect advanced attacks that deviate from previously stored patterns. To solve this problem, a deep learning-based system model has emerged analyzes intelligent attack patterns through data learning. However, learning models have disadvantage of having re-learn each time new cyberattack method emerges. The required learn large amount is not efficient. In paper, an experiment was conducted using Leipzig Intrusion Detection Data Set (LID-DS), which host-based set released in 2018. addition, order evaluate and improve performance system, consisting pre-processing, vector-to-image processing, training testing steps proposed. steps, Siamese Convolutional Neural Network (Siamese-CNN) constructed few-shot method, shows excellent by small data. Siamese-CNN determines whether type same based on similarity score sample converted image. accuracy calculated technique. Vanilla (Vanilla-CNN) are compared confirm Siamese-CNN. result measuring accuracy, precision, recall, F1-score indicators, it confirmed recall proposed study increased about 6% Vanilla-CNN model.
منابع مشابه
Process Aware Host-based Intrusion Detection Model
Nowadays, many organizations use Process Aware Information Systems (PAISs) to automate their business process. As any other information systems, security plays a major role in PAIS to provide a secure state and maintain the system in it. In order to provide security in a PAIS, a Process Aware Host-based Intrusion Detection (PAHID) model is proposed in this paper. The model detects host-based in...
متن کاملHost-Based Intrusion Detection Using User Signatures
An intrusion occurs when an attacker gains unauthorized access to a valid user’s account and performs disruptive behavior while masquerading as that user. The attacker may harm the user’s account directly and can use it to launch attacks on other accounts or machines. Developing “signatures” of users of a computer system is a useful method for detecting when this scenario happens. Our approach ...
متن کاملIntrusion Detection Using Evolutionary Hidden Markov Model
Intrusion detection systems are responsible for diagnosing and detecting any unauthorized use of the system, exploitation or destruction, which is able to prevent cyber-attacks using the network package analysis. one of the major challenges in the use of these tools is lack of educational patterns of attacks on the part of the engine analysis; engine failure that caused the complete training, ...
متن کاملAnalysis of Host-Based and Network-Based Intrusion Detection System
Intrusion-detection systems (IDS) aim at detecting attacks against computer systems and networks or, in general, against information systems. Its basic aim is to protect the system against malwares and unauthorized access of a network or a system. Intrusion Detection is of two types Network-IDS and Host BasedIDS. This paper covers the scope of both the types and their result analysis along with...
متن کاملSurvey on Host and Network Based Intrusion Detection System
-------------------------------------------------------------------ABSTRACT--------------------------------------------------------------With invent of new technologies and devices, Intrusion has become an area of concern because of security issues, in the ever growing area of cyber-attack. An intrusion detection system (IDS) is defined as a device or software application which monitors system ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Access
سال: 2021
ISSN: ['2169-3536']
DOI: https://doi.org/10.1109/access.2021.3082160