Back to Search
Start Over
Methods for Host-based Intrusion Detection with Deep Learning
- Source :
- Digital Threats: Research and Practice. 2:1-29
- Publication Year :
- 2021
- Publisher :
- Association for Computing Machinery (ACM), 2021.
-
Abstract
- Host-based Intrusion Detection Systems (HIDS) automatically detect events that indicate compromise by adversarial applications. HIDS are generally formulated as analyses of sequences of system events such as bash commands or system calls. Anomaly-based approaches to HIDS leverage models of normal (a.k.a. baseline) system behavior to detect and report abnormal events and have the advantage of being able to detect novel attacks. In this article, we develop a new method for anomaly-based HIDS using deep learning predictions of sequence-to-sequence behavior in system calls. Our proposed method, called the ALAD algorithm, aggregates predictions at the application level to detect anomalies. We investigate the use of several deep learning architectures, including WaveNet and several recurrent networks. We show that ALAD empowered with deep learning significantly outperforms previous approaches. We train and evaluate our models using an existing dataset, ADFA-LD, and a new dataset of our own construction, PLAID. As deep learning models are black box in nature, we use an alternate approach, allotaxonographs, to characterize and understand differences in baseline vs. attack sequences in HIDS datasets such as PLAID.
- Subjects :
- Black box (phreaking)
Computer Networks and Communications
Computer science
business.industry
Deep learning
Intrusion detection system
Machine learning
computer.software_genre
Computer Science Applications
Hardware and Architecture
Leverage (statistics)
Artificial intelligence
business
Safety Research
Host (network)
computer
Software
AKA
Information Systems
Subjects
Details
- ISSN :
- 25765337 and 26921626
- Volume :
- 2
- Database :
- OpenAIRE
- Journal :
- Digital Threats: Research and Practice
- Accession number :
- edsair.doi...........121cc864f9469181e6b4070a5db1d731
- Full Text :
- https://doi.org/10.1145/3461462