Hybrid intrusion detection with weighted signature generation over anomalous Internet episodes

被引:81
|
作者
Hwang, Kai [1 ]
Cai, Min [1 ]
Chen, Ying [1 ]
Qin, Min [1 ]
机构
[1] Univ So Calif, USC Viterbi Sch Engn, Internet & Grid Comp Lab, Los Angeles, CA 90089 USA
基金
美国国家科学基金会;
关键词
network security; intrusion detection systems; anomaly detection; signature generation; SNORT and Bro systems; false alarms; Internet episodes; traffic data mining;
D O I
10.1109/TDSC.2007.9
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
This paper reports the design principles and evaluation results of a new experimental hybrid intrusion detection system (HIDS). This hybrid system combines the advantages of low false-positive rate of signature-based intrusion detection system (IDS) and the ability of anomaly detection system ( ADS) to detect novel unknown attacks. By mining anomalous traffic episodes from Internet connections, we build an ADS that detects anomalies beyond the capabilities of signature-based SNORT or Bro systems. A weighted signature generation scheme is developed to integrate ADS with SNORT by extracting signatures from anomalies detected. HIDS extracts signatures from the output of ADS and adds them into the SNORT signature database for fast and accurate intrusion detection. By testing our HIDS scheme over real-life Internet trace data mixed with 10 days of Massachusetts Institute of Technology/ Lincoln Laboratory (MIT/LL) attack data set, our experimental results show a 60 percent detection rate of the HIDS, compared with 30 percent and 22 percent in using the SNORT and Bro systems, respectively. This sharp increase in detection rate is obtained with less than 3 percent false alarms. The signatures generated by ADS upgrade the SNORT performance by 33 percent. The HIDS approach proves the vitality of detecting intrusions and anomalies, simultaneously, by automated data mining and signature generation over Internet connection episodes.
引用
收藏
页码:41 / 55
页数:15
相关论文
共 50 条
  • [21] Hybrid Network Intrusion Detection System for Smart Environments Based on Internet of Things
    Subbarayalu, Venkatraman
    Surendiran, B.
    Kumar, P. Arun Raj
    COMPUTER JOURNAL, 2019, 62 (12): : 1822 - 1839
  • [22] A Hybrid Intrusion Detection Model Combining SAE with Kernel Approximation in Internet of Things
    Wu, Yukun
    Lee, Wei William
    Gong, Xuan
    Wang, Hui
    SENSORS, 2020, 20 (19) : 1 - 18
  • [23] Group intrusion detection in the Internet of Things using a hybrid recurrent neural network
    Asma Belhadi
    Youcef Djenouri
    Djamel Djenouri
    Gautam Srivastava
    Jerry Chun-Wei Lin
    Cluster Computing, 2023, 26 : 1147 - 1158
  • [24] A Hybrid Ensemble Learning-based Intrusion Detection System for the Internet of Things
    Alani, Mohammed M.
    Awad, Ali Ismail
    Barkat, Ezedin
    2024 IEEE INTERNATIONAL CONFERENCE ON CYBER SECURITY AND RESILIENCE, CSR, 2024, : 1 - 8
  • [25] A novel hybrid intrusion detection system (Ids) for the detection of internet of things (IoT) network attacks
    Ramadan R.A.
    Yadav K.
    Annals of Emerging Technologies in Computing, 2020, 4 (05) : 61 - 74
  • [26] SDAID: Towards a Hybrid Signature and Deep Analysis-based Intrusion Detection Method
    Vo, Hoang V.
    Nguyen, Hoa N.
    Nguyen, Tu N.
    Du, Hanh P.
    2022 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM 2022), 2022, : 2615 - 2620
  • [27] A Light-Weighted Model of GRU plus CNN Hybrid for Network Intrusion Detection
    Yang, Dong
    Zhou, Can
    Wei, Songjie
    ADVANCED INTELLIGENT COMPUTING TECHNOLOGY AND APPLICATIONS, ICIC 2023, PT V, 2023, 14090 : 314 - 326
  • [28] Anomaly detection in Internet intrusion detection by hybrid of self-organization and kernel auto-associators
    Zhang, Bai-ling
    Gupta, Gopal
    DYNAMICS OF CONTINUOUS DISCRETE AND IMPULSIVE SYSTEMS-SERIES B-APPLICATIONS & ALGORITHMS, 2006, 13 : 51 - 55
  • [29] Robust intrusion detection for network communication on the Internet of Things: a hybrid machine learning approach
    Soltani, Nasim
    Rahmani, Amir Masoud
    Bohlouli, Mahdi
    Hosseinzadeh, Mehdi
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2024, 27 (07): : 9975 - 9991
  • [30] A hybrid model of rough sets and relevance vector machine for intrusion detection of internet of things
    Wang, Zhi
    Journal of Computational Information Systems, 2012, 8 (23): : 9881 - 9886