Poster: VULCAN - Repurposing Accessibility Features for Behavior-based Intrusion Detection Dataset Generation

被引:0
|
作者
van Sloun, Christian [1 ]
Wehrle, Klaus [1 ]
机构
[1] Rhein Westfal TH Aachen, Aachen, Germany
来源
PROCEEDINGS OF THE 2023 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, CCS 2023 | 2023年
关键词
Intrusion Detection; Dataset Generation; Accessibility Features;
D O I
10.1145/3576915.3624404
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The generation of datasets is one of the most promising approaches to collecting the necessary behavior data to train machine learning models for host-based intrusion detection. While various dataset generation methods have been proposed, they are often limited and either only generate network traffic or are restricted to a narrowsubset of applications. We present Vulcan, a preliminary framework that uses accessibility features to generate datasets by simulating user interactions for an extendable set of applications. It uses behavior profiles that define realistic user behavior and facilitate dataset updates upon changes in software versions, thus reducing the effort required to keep a dataset relevant. Preliminary results show that using accessibility features presents a promising approach to improving the quality of datasets in the HIDS domain.
引用
收藏
页码:3543 / 3545
页数:3
相关论文
共 50 条
  • [1] Behavior-Based Intrusion Detection in Encrypted Environments
    Koch, Robert
    Golling, Mario
    Rodosek, Gabi Dreo
    IEEE COMMUNICATIONS MAGAZINE, 2014, 52 (07) : 124 - 131
  • [2] Behavior-based intrusion detection in mobile phone systems
    Boukerche, A
    Notare, MSMA
    JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2002, 62 (09) : 1476 - 1490
  • [3] Behavior-based features model for malware detection
    Galal H.S.
    Mahdy Y.B.
    Atiea M.A.
    Journal of Computer Virology and Hacking Techniques, 2016, 12 (2) : 59 - 67
  • [4] A Behavior-based Intrusion Detection Technique for Smart Grid Infrastructure
    Kwon, YooJin
    Kim, Huy Kang
    Lim, Yong Hun
    Lim, Jong In
    2015 IEEE EINDHOVEN POWERTECH, 2015,
  • [5] User Behavior-Based Intrusion Detection Using Statistical Techniques
    Malek, Zakiyabanu S.
    Trivedi, Bhushan
    Shah, Axita
    ADVANCED INFORMATICS FOR COMPUTING RESEARCH, PT II, 2019, 956 : 480 - 489
  • [6] Behavior-based Worm Detection and Signature Generation
    Yao, Yu
    Lv, Junwei
    Gao, Fuxiang
    Zhang, Yanfang
    Yu, Ge
    2008 INTERNATIONAL MULTISYMPOSIUMS ON COMPUTER AND COMPUTATIONAL SCIENCES (IMSCCS), 2008, : 124 - 131
  • [7] Advanced Intrusion Detection Combining Signature-Based and Behavior-Based Detection Methods
    Kwon, Hee-Yong
    Kim, Taesic
    Lee, Mun-Kyu
    ELECTRONICS, 2022, 11 (06)
  • [8] Intelligent Mobile Malware Detection via Behavior-based Features
    Liu, Yihong
    Huang, Xiaokun
    INTERNATIONAL CONFERENCE ON ELECTRICAL AND CONTROL ENGINEERING (ICECE 2015), 2015, : 402 - 407
  • [9] BNID: A Behavior-based Network Intrusion Detection at Network-Layer in Cloud Environment
    Ghanshala, Kamal Kumar
    Mishra, Preeti
    Joshi, R. C.
    Sharma, Sachin
    2018 FIRST INTERNATIONAL CONFERENCE ON SECURE CYBER COMPUTING AND COMMUNICATIONS (ICSCCC 2018), 2018, : 100 - 105
  • [10] Behavior-based spyware detection
    Kirda, Engin
    Kruegel, Christopher
    USENIX Association Proceedings of the 15th USENIX Security Symposium, 2006, : 273 - 288