Loading...

A content-based deep intrusion detection system

Soltani, M ; Sharif University of Technology | 2021

366 Viewed
  1. Type of Document: Article
  2. DOI: 10.1007/s10207-021-00567-2
  3. Publisher: Springer Science and Business Media Deutschland GmbH , 2021
  4. Abstract:
  5. The growing number of Internet users and the prevalence of web applications make it necessary to deal with very complex software and applications in the network. This results in an increasing number of new vulnerabilities in the systems, and leading to an increase in cyber threats and, in particular, zero-day attacks. The cost of generating appropriate signatures for these attacks is a potential motive for using machine learning-based methodologies. Although there are many studies on using learning-based methods for attack detection, they generally use extracted features and overlook raw contents. This approach can lessen the performance of detection systems against content-based attacks like SQL injection, Cross-site Scripting (XSS), and various viruses. In this work, we propose a framework, called deep intrusion detection (DID) system, that uses the pure content of traffic flows in addition to traffic metadata in the learning and detection phases of a passive DNN IDS. To this end, we deploy and evaluate an offline IDS following the framework using LSTM as a deep learning technique. Due to the inherent nature of deep learning, it can process high-dimensional data content and, accordingly, discover the sophisticated relations between the auto extracted features of the traffic. To evaluate the proposed DID system, we use the CIC-IDS2017 and CSE-CIC-IDS2018 datasets. The evaluation metrics, such as precision and recall, reach 0.992 and 0.998 on CIC-IDS2017, and 0.933 and 0.923 on CSE-CIC-IDS2018, respectively, which show the high performance of the proposed DID method. © 2021, The Author(s), under exclusive licence to Springer-Verlag GmbH, DE
  6. Keywords:
  7. Application programs ; Clustering algorithms ; Computer viruses ; Intrusion detection ; Long short-term memory ; Network security ; Viruses ; Content-based ; Content-based attack ; Deep learning ; Internet users ; Intrusion Detection Systems ; Intrusion-Detection ; Malware detection ; Misuse ; Performance ; WEB application ; Denial-of-service attack
  8. Source: International Journal of Information Security ; 2021 ; 16155262 (ISSN)
  9. URL: https://link.springer.com/article/10.1007/s10207-021-00567-2