Siamese neural network architecture for homoglyph attacks detection

被引:10
|
作者
Vinayakumar, R. [1 ]
Soman, K. P. [1 ]
机构
[1] Amrita Vishwa Vidyapeetham, Amrita Sch Engn, Ctr Computat Engn & Networking CEN, Coimbatore, Tamil Nadu, India
来源
ICT EXPRESS | 2020年 / 6卷 / 01期
关键词
Homoglyph; Spoofing; Deep learning; Siamese neural networks; Recurrent structures;
D O I
10.1016/j.icte.2019.05.002
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Primarily an adversary uses homoglyph or spoofing attack approach to obfuscate domain name, file name or process names. This approach facilitates to create domain name, file name or process names which look visually homogeneous to legitimate domain name, file name or process names. This paper introduces Siamese neural network architecture which uses the application of recurrent structures with Keras character level embedding to learn the optimal features by considering an input in the form of raw strings. For comparative study, various recurrent structures are used. The performances obtained by recurrent structures are almost closer. However, the proposed method performed well in comparison to the existing methods such as Edit Distance, Visual Edit Distance and Siamese convolutional neural networks. (C) 2020 The Korean Institute of Communications and Information Sciences (KICS). Publishing services by Elsevier B.V.
引用
收藏
页码:16 / 19
页数:4
相关论文
共 50 条
  • [41] Hybrid neural network framework for detection of cyber attacks at smart infrastructures
    Krundyshev, Vasiliy
    Kalinin, Maxim
    PROCEEDINGS OF THE 12TH INTERNATIONAL CONFERENCE ON SECURITY OF INFORMATION AND NETWORKS (SIN'19), 2019,
  • [42] A hybrid neural network approach to the classification of novel attacks for intrusion detection
    Pan, W
    Li, WH
    PARALLEL AND DISTRIBUTED PROCESSING AND APPLICATIONS, 2005, 3758 : 564 - 575
  • [43] Siamese Neural Networks for Class Activity Detection
    Li, Hang
    Wang, Zhiwei
    Tang, Jiliang
    Ding, Wenbiao
    Liu, Zitao
    ARTIFICIAL INTELLIGENCE IN EDUCATION (AIED 2020), PT II, 2020, 12164 : 162 - 167
  • [44] Homoglyph Attack Detection with Unpaired Data
    Lu, Yiwei
    Kumar, Mahesh K.
    Mohammed, Noman
    Wang, Yang
    SEC'19: PROCEEDINGS OF THE 4TH ACM/IEEE SYMPOSIUM ON EDGE COMPUTING, 2019, : 377 - 382
  • [45] Face Verification Using Convolutional Neural Networks with Siamese Architecture
    Bukovcikova, Zuzana
    Sopiak, Dominik
    Oravec, Milos
    Pavlovicova, Jarmila
    PROCEEDINGS OF 2017 INTERNATIONAL SYMPOSIUM ELMAR, 2017, : 205 - 208
  • [46] Network Intrusion Detection Based on an Efficient Neural Architecture Search
    Lyu, Renjian
    He, Mingshu
    Zhang, Yu
    Jin, Lei
    Wang, Xinlei
    SYMMETRY-BASEL, 2021, 13 (08):
  • [47] An optimized convolutional neural network architecture for lung cancer detection
    Pathan, Sameena
    Ali, Tanweer
    Sudheesh, P. G.
    Kumar, P. Vasanth
    Rao, Divya
    APL BIOENGINEERING, 2024, 8 (02):
  • [48] Convolutional neural network architecture for detection and classification of diseases in fruits
    Kumar, Yogesh
    Hasteer, Nitasha
    Bhardwaj, Anshul
    Yogesh
    CURRENT SCIENCE, 2022, 122 (11): : 1315 - 1320
  • [49] Efficient Topic Detection Using an Adaptive Neural Network Architecture
    Manai, Meriem
    Ben Yahia, Sadok
    ADVANCES IN INFORMATION SYSTEMS, ARTIFICIAL INTELLIGENCE AND KNOWLEDGE MANAGEMENT, ICIKS 2023, 2024, 486 : 145 - 157
  • [50] A Scalable Optical Neural Network Architecture Using Coherent Detection
    Sludds, Alexander
    Bernstein, Liane
    Hamerly, Ryan
    Soljacic, Marin
    Englund, Dirk
    AI AND OPTICAL DATA SCIENCES, 2020, 11299