NLP methods in host-based intrusion detection systems: A systematic review and future directions

被引:12
|
作者
Sworna, Zarrin Tasnim [1 ,2 ]
Mousavi, Zahra [1 ,3 ,4 ]
Babar, Muhammad Ali [1 ,2 ,3 ]
机构
[1] Univ Adelaide, Sch Comp Sci, Adelaide, SA, Australia
[2] Cyber Secur Cooperat Res Ctr, Joondalup, Australia
[3] Univ Adelaide, Ctr Res Engn Software Technol CREST, Adelaide, SA, Australia
[4] CSIRO Data61, Eveleigh, Australia
关键词
Natural language processing; Host-based intrusion detection; Cyber security; Anomaly detection; DATASET;
D O I
10.1016/j.jnca.2023.103761
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Host-based Intrusion Detection System (HIDS) is an effective last line of defense for defending against cyber security attacks after perimeter defenses (e.g., Network-based Intrusion Detection System and Firewall) have failed or been bypassed. HIDS is widely adopted in the industry as HIDS is ranked among the top two most used security tools by Security Operation Centers (SOC) of organizations. Although effective and efficient HIDS is highly desirable for industrial organizations, the evolution of increasingly complex attack patterns causes several challenges resulting in performance degradation of HIDS (e.g., high false alert rate creating alert fatigue for SOC staff). Since Natural Language Processing (NLP) methods are better suited for identifying complex attack patterns, an increasing number of HIDS are leveraging the advances in NLP that have shown effective and efficient performance in precisely detecting low footprint, zero-day attacks and predicting an attacker's next steps. This active research trend of using NLP in HIDS demands a synthesized and comprehensive body of knowledge of NLP-based HIDS. Despite the drastically growing adoption of NLP in HIDS development, there has been relatively little effort allocated to systematically analyze and synthesize the available peer review literature to understand how NLP is used in HIDS development. The lack of a synthesized and comprehensive body of knowledge on such an important topic motivated us to conduct a Systematic Literature Review (SLR) of the papers on the end-to-end pipeline of the use of NLP in HIDS development. For the end-to-end NLP-based HIDS development pipeline, we identify, taxonomically categorize and systematically compare the state-of-the-art of NLP methods usage in HIDS, attacks detected by these NLP methods, datasets and evaluation metrics which are used to evaluate the NLP-based HIDS. We highlight the relevant prevalent practices, considerations, advantages and limitations to support the HIDS developers. We also outline the future research directions for the NLP-based HIDS development.
引用
收藏
页数:29
相关论文
共 50 条
  • [1] A Systematic Literature Review on Host-Based Intrusion Detection Systems
    Satilmis, Hami
    Akleylek, Sedat
    Tok, Zaliha Yuce
    IEEE ACCESS, 2024, 12 : 27237 - 27266
  • [2] Methods for Host-based Intrusion Detection with Deep Learning
    Ring J.H.
    Van Oort C.M.
    Durst S.
    White V.
    Near J.P.
    Skalka C.
    Digital Threats: Research and Practice, 2021, 2 (04):
  • [3] Host-Based Intrusion Detection System with System Calls: Review and Future Trends
    Liu, Ming
    Xue, Zhi
    Xu, Xianghua
    Zhong, Changmin
    Chen, Jinjun
    ACM COMPUTING SURVEYS, 2019, 51 (05)
  • [4] Review of Intrusion Detection Systems Taxonomy, Techniques, Methods and Future Research Directions
    Mikulas, Matus
    Kotuliak, Ivan
    2024 NEW TRENDS IN SIGNAL PROCESSING, NTSP 2024, 2024, : 105 - 112
  • [5] Enhancing Security of Host-Based Intrusion Detection Systems for the Internet of Things
    Nallakaruppan, M. K.
    Somayaji, Siva Rama Krishnan
    Fuladi, Siddhesh
    Benedetto, Francesco
    Ulaganathan, Senthil Kumaran
    Yenduri, Gokul
    IEEE ACCESS, 2024, 12 : 31788 - 31797
  • [6] DAHID: Domain Adaptive Host-based Intrusion Detection
    Ajayi, Oluwagbemiga
    Gangopadhyay, Aryya
    PROCEEDINGS OF THE 2021 IEEE INTERNATIONAL CONFERENCE ON CYBER SECURITY AND RESILIENCE (IEEE CSR), 2021, : 467 - 472
  • [7] A Novel Mechanism for Host-Based Intrusion Detection System
    Harshitha, Ch Gayathri
    Rao, M. Kameswara
    Kumar, P. Neelesh
    FIRST INTERNATIONAL CONFERENCE ON SUSTAINABLE TECHNOLOGIES FOR COMPUTATIONAL INTELLIGENCE, 2020, 1045 : 527 - 536
  • [8] A Behavioral Graph Model for Host-Based Intrusion Detection
    Cao, Zechun
    Huang, Shou-Hsuan Stephen
    JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2023, 18 (02): : 48 - 57
  • [9] The Design and Implementation of Host-based Intrusion Detection System
    Lin Ying
    Zhang Yan
    Ou Yang-Jia
    2010 THIRD INTERNATIONAL SYMPOSIUM ON INTELLIGENT INFORMATION TECHNOLOGY AND SECURITY INFORMATICS (IITSI 2010), 2010, : 595 - 598
  • [10] Host-Based Intrusion Detection Using Statistical Approaches
    Gautam, Sunil Kumar
    Om, Hari
    PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON FRONTIERS IN INTELLIGENT COMPUTING: THEORY AND APPLICATIONS (FICTA) 2015, 2016, 404 : 481 - 493