Combining dynamic and static host intrusion detection features using variational long short-term memory recurrent autoencoder
DOI:
https://doi.org/10.21638/11701/spbu10.2024.104Abstract
Despite the many advantages offered by Host Intrusion Detection Systems (HIDS), they are rarely adopted in mainstream cybersecurity strategies. Unlike Network Intrusion Detection Systems, a HIDS is the last layer of defence between potential attacks and the underlying OSs. One of the main reasons behind this is its poor capabilities to adequately protect against zero-day attacks. With the rising number of zero-day exploits and related attacks, this is an increasingly imperative requirement for a modern HIDS. In this paper variational long short-term memory — recurrent autoencoder approach which improves zero-day attack detection is proposed. We have practically implemented our model using TensorFlow and evaluated its performance using benchmark ADFA-LD and UNM datasets. We have also compared the results against those from notable publications in the area.
Keywords:
HIDS, anomaly detection, variational autoencoder, deep learning
Downloads
References
References
The incident response analyst report. Moscow, Kaspersky Publ., 2022, 20 p.
Hochreiter S., Schmidhuber J. Long short-term memory. Neural Computation, 1997, vol. 9, iss. 8, pp. 1735–1780. https://www.doi.org/10.1162/neco.1997.9.8.1735
Chandra R. Competition and collaboration in cooperative coevolution of Elman recurrent neural networks for time-series prediction. IEEE Transactions on Neural Networks and Learning Systems, 2015, vol. 26, no. 12, pp. 3123–3136. https://doi.org/10.1109/TNNLS.2015.2404823
Cho K., van Merrienboer B., Gulcehre C., Bougares F., Schwenk H., Bengio Y. Learning phrase representations using RNN encoder–decoder for statistical machine translation. Proceedings of Conference on Empirical Methods in Natural Language Processing (EMNLP), 2014, pp. 1724–1734. https://doi.org/10.3115/v1/D14-1179
Graves A., Liwicki M., Fern'andez S., Bertolami R., Bunke H., Schmidhuber J. A novel connectionist system for unconstrained handwriting recognition. IEEE Transactions on Pattern Analysis and Machine Intelligence, 2009, vol. 31, no. 5, pp. 855–868.
Deepika S., Erinc M., Ismini P., Johannes K., Sten H., Matthieu G., Andreas H. Human activity recognition using recurrent neural networks. Proceedings of International Cross-Domain Conference for Machine Learning and Knowledge Extraction. Reggio, Italy, 2017, pp. 267–274.
Fabius O., van Amersfoort J. R. Variational recurrent auto-encoders. ArXiv preprint, 2015, no. 1412.6581. https://arxiv.org/abs/1412.6581
Kingma D. P., Welling M. Auto-encoding variational Bayes. Proceedings of 2nd International Conference on Learning Representations (ICLR), 2014, pp. 1–6.
Warrender C., Forrest S., Pearlmutter B. Detecting intrusions using system calls: alternative data models. Proceedings of the 1999 IEEE Symposium on Security and Privacy. Oakland, USA, 1999, pp. 133–145. https://doi.org/10.1109/SECPRI.1999.766910
Maggi F., Matteucci M., Zanero S. Detecting intrusions through system call sequence and argument analysis. IEEE Transactions on Dependable and Secure Computing, 2010, vol. 7, iss. 4, pp. 381–395. https://doi.org/10.1109/TDSC.2008.69
Xie M., Hu J., Yu X., Chang E. Evaluating host-based anomaly detection systems: application of the frequency-based algorithms to ADFA-LD. Proceedings of 8th International Conference on Network and System Security. Xian, China, 2014, pp. 542–549. https://doi.org/10.1007/978-3-319-11698-344
Xie M., Hu J., Slay J. Evaluating host-based anomaly detection systems: Application of the one-class SVM algorithm to ADFA-LD. International Conference on Fuzzy Systems and Knowledge Discovery (FSKD). Xiamen, China, 2014, pp. 978–982.
Creech G., Hu J. A semantic approach to host-based intrusion detection systems using contiguous and discontiguous system call patterns. IEEE Transactions on Computers, 2014, vol. 63, iss. 4, pp. 807–819. https://doi.org/10.1109/TC.2013.13
Ikram Y. S., Madkour M. A. I. Enhanced host-based intrusion detection using system call traces. Journal of King Abdulaziz University (Computing and Information Technology Sciences), 2019, vol. 8, pp. 93–109.
Zhang Y., Luo S., Pan L., Zhang H. Syscall-BSEM: Behavioral semantics enhancement method of system call sequence for high accurate and robust host intrusion detection. Future Generation Computer Systems, 2021, vol. 125, pp. 112–126.
Osamor F., Wellman B. Deep learning-based hybrid model for efficient anomaly detection. International Journal of Advanced Computer Science and Applications, 2022, vol. 13, no. 4, pp. 975–979. https://doi.org/10.14569/IJACSA.2022.01304111
Anandapriya M., Lakshmanan B. Anomaly based host intrusion detection system using semantic based system call patterns. IEEE 9th International Conference on Intelligent Systems and Control (ISCO). Coimbatore, India, 2015, pp. 1–4. https://doi.org/10.1109/ISCO.2015.7282244
Lu Y., Teng S. Application of sequence embedding in host-based intrusion detection system. IEEE 24th International Conference on Computer Supported Cooperative Work in Design (CSCWD). Dalian, China, 2021, pp. 434–439.
Ouarda L., Bourenane M., Bouderah B. Towards a better similarity algorithm for host-based intrusion detection system. Journal of Intelligent Systems, 2023, vol. 32, no. 1, art. no. 20220259. https://doi.org/10.1515/jisys-2022-0259
Le T.-T.-H., Kim J., Kim H. An effective intrusion detection classifier using long short-term memory with gradient descent optimization. Proceedings of the 2017 International Conference on Platform Technology and Service (PlatCon). Busan, Korea, 2017, pp. 1–6. https://doi.org/10.1109/PlatCon.2017.7883684
Staudemeyer R. C., Omlin C. W. Evaluating performance of long short-term memory recurrent neural networks on intrusion detection data. Proceedings of the South African Institute for Computer Scientists and Information Technologists Conference (SAICSIT 13). New York, ACM, 2013, pp. 218–224. https://doi.org/10.1145/2513456.2513490
Staudemeyer R. C. Applying long short-term memory recurrent neural networks to intrusion detection. South African Computer Journal, 2015, vol. 56. https://doi.org/10.18489/sacj.v56i1.248
Bontemps L., Cao V. L., McDermott J., Le-Khac N. A. Collective anomaly detection based on long short-term memory recurrent neural networks. Proceedings of 3rd International Conference on Future Data and Security Engineering, Springer International Publishing, 2016, pp. 141–152. https://doi.org/10.1007/978-3-319-48057-29
Kim J., Kim J., Thu H. L. T., Kim H. Long short term memory recurrent neural network classifier for intrusion detection. International Conference on Platform Technology and Service (PlatCon), 2016, pp. 1–5. https://doi.org/10.1109/PlatCon.2016.7456805
Blei D. M., Kucukelbir A., McAuliffe J. D. Variational inference: A review for statisticians. Journal of the American Statistical Association, 2017, vol. 112, iss. 518, pp. 859–877. https://doi.org/10.1080/01621459.2017.1285773
Liu T. F., Ting K. M., Zhou Z.-H. Isolation forest. Proceedings of the 2008 Eighth IEEE International Conference on Data Mining. Pisa, Italy, 2008, pp. 413–422.
University of New Mexico (UNM) dataset for intrusion detection. Available at: https://www.cs.unm.edu/ immsec/data-sets.htm (accessed: August 15, 2022).
The ADFA Intrusion Detection Datasets. Available at: https://research.unsw.edu.au/projects/adfa-ids-datasets (accessed: September 10, 2023).
Yeung D. Y., Ding Y. Host-based intrusion detection using dynamic and static behavioral models. Pattern Recognition, 2003, vol. 36, no. 1, pp. 229–243.
Wang W., Guan X. H., Zhang X. L. Modeling program behaviors by hidden Markov models for intrusion detection. Proceedings of 2004 International Conference on Machine Learning and Cybernetics (IEEE Cat. no. 04EX826). Shanghai, China, 2004, vol. 5, pp. 2830–2835.
Murtaza S. S., Khreich W., Hamou-Lhadj A., Gagnon S. A trace abstraction approach for host-based anomaly detection. 2015 IEEE Symposium on Computational Intelligence for Security and Defense Applications (CISDA). Verona, 2015, pp. 1–8.
Borisaniya B., Patel D. Evaluation of modified vector space representation using ADFA-LD and ADFA-WD datasets. Journal of Information Security, 2015, vol. 6, no. 3, pp. 250–264.
Downloads
Published
How to Cite
Issue
Section
License
Articles of "Vestnik of Saint Petersburg University. Applied Mathematics. Computer Science. Control Processes" are open access distributed under the terms of the License Agreement with Saint Petersburg State University, which permits to the authors unrestricted distribution and self-archiving free of charge.