Exploiting n-gram location for intrusion detection

被引:10
|
作者
Angiulli, Fabrizio [1 ]
Argento, Luciano [1 ]
Furfaro, Angelo [1 ]
机构
[1] Univ Calabria, DIMES, P Bucci 41C, I-87036 Arcavacata Di Rende, CS, Italy
关键词
Intrusion detection systems; Semi-supervised learning; N-grams; Anomaly detection; FTP traffic;
D O I
10.1109/ICTAI.2015.155
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Signature-based and protocol-based intrusion detection systems (IDS) are employed as means to reveal content-based network attacks. Such systems have proven to be effective in identifying known intrusion attempts and exploits but they fail to recognize new types of attacks or carefully crafted variants of well known ones. This paper presents the design and the development of an anomaly-based IDS technique which is able to detect content-based attacks carried out over application level protocols, like HTTP and FTP. In order to identify anomalous packets, the payload is split up in chunks of equal length and the n-gram technique is used to learn which byte sequences usually appear in each chunk. The devised technique builds a different model for each pair < protocol of interest, packet length > and uses them to classify the incoming traffic. Models are build by means of a semi-supervised approach. Experimental results witness that the technique achieves an excellent accuracy with a very low false positive rate.
引用
收藏
页码:1093 / 1098
页数:6
相关论文
共 50 条
  • [1] N-gram MalGAN: Evading machine learning detection via feature n-gram
    Zhu, Enmin
    Zhang, Jianjie
    Yan, Jijie
    Chen, Kongyang
    Gao, Chongzhi
    [J]. DIGITAL COMMUNICATIONS AND NETWORKS, 2022, 8 (04) : 485 - 491
  • [2] N-gram MalGAN:Evading machine learning detection via feature n-gram
    Enmin Zhu
    Jianjie Zhang
    Jijie Yan
    Kongyang Chen
    Chongzhi Gao
    [J]. Digital Communications and Networks., 2022, 8 (04) - 491
  • [3] Host Based Intrusion Detection System Using Frequency Analysis of N-Gram Terms
    Subba, Basant
    Biswas, Santosh
    Karmakar, Sushata
    [J]. TENCON 2017 - 2017 IEEE REGION 10 CONFERENCE, 2017, : 2006 - 2011
  • [4] Network intrusion detection based on n-gram frequency and time-aware transformer
    Han, Xueying
    Cui, Susu
    Liu, Song
    Zhang, Chen
    Jiang, Bo
    Lu, Zhigang
    [J]. COMPUTERS & SECURITY, 2023, 128
  • [5] N-gram analysis for computer virus detection
    Reddy, D. Krishna Sandeep
    Pujari, Arun K.
    [J]. JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2006, 2 (03): : 231 - 239
  • [6] N-gram Density based Malware Detection
    O'Kane, Philip
    Sezer, Sakir
    McLaughlin, Kieran
    [J]. 2014 WORLD SYMPOSIUM ON COMPUTER APPLICATIONS & RESEARCH (WSCAR), 2014,
  • [7] Product Reviews based on Location using N-gram model
    Varma, Kajal S.
    Mahajan, Arpana
    Degadwala, Sheshang D.
    [J]. PROCEEDINGS OF THE 2018 3RD INTERNATIONAL CONFERENCE ON INVENTIVE COMPUTATION TECHNOLOGIES (ICICT 2018), 2018, : 100 - 104
  • [8] N-gram Insight
    Prans, George
    [J]. AMERICAN SCIENTIST, 2011, 99 (05) : 356 - 357
  • [9] Byte Level n-Gram Analysis for Malware Detection
    Jain, Sacbin
    Meena, Yogesb Kumar
    [J]. COMPUTER NETWORKS AND INTELLIGENT COMPUTING, 2011, 157 : 51 - 59
  • [10] N-Gram FST Indexing for Spoken Term Detection
    Liu, Chao
    Wang, Dong
    Tejedor, Javier
    [J]. 13TH ANNUAL CONFERENCE OF THE INTERNATIONAL SPEECH COMMUNICATION ASSOCIATION 2012 (INTERSPEECH 2012), VOLS 1-3, 2012, : 2091 - 2094