Recurrent Neural Networks for Enhancement of Signature-based Network Intrusion Detection Systems

07/09/2018
by   Soroush M. Sohi, et al.
0

Security of information passing through the Internet is threatened by today's most advanced malware ranging from orchestrated botnets to much simpler polymorphic worms. These threads, as examples of zero-day attacks, are able to change their behavior several times at the early phases of their existence to bypass the network intrusion detection systems (NIDS). It is known that even well- designed, and frequently-updated signature-based NIDS cannot detect the zero-day treats due to the lack of an adequate signature database, adaptive to intelligent attacks on the Internet. On the other hand, applying traditional machine learning methods could not narrow this gap. More importantly, having an NIDS, it should be tested on malicious traffic dataset that not only represents known attacks, but also can to some extent reflect the characteristics of unknown, zero-day attacks. Generating such traffic is identified in the literature as one of the main obstacles for evaluating the effectiveness of NIDS. To address these issues, we apply Recurrent Neural Networks (RNNs) known as powerful tools in finding complex patterns and generating similar ones. In this regard, we first examine whether it is possible to generate new, unseen mutants of a polymorphic worm. Our results demonstrate that our synthetic mutants exhibit the same characteristics as the original mutants, i.e., known mutants fed into the RNN. Besides, we assess the ability of RNNs to generate synthetic signatures from the most advanced malware. We claim that by adding the RNN-generated, synthetic signatures to the set of the signatures of a signature-based NIDS it is possible to improve the malware detection rate of that. To support this and evaluate the feasibility of our approach, we conduct extensive experiments and provide exhaustive discussion on our experimental results.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
03/01/2020

Efficient Wu-Manber Pattern Matching Hardware for Intrusion and Malware Detection

Network intrusion detection systems and antivirus software are essential...
research
08/31/2022

Zero-day DDoS Attack Detection

The ability to detect zero-day (novel) attacks has become essential in t...
research
08/08/2023

Different Mechanisms of Machine Learning and Optimization Algorithms Utilized in Intrusion Detection Systems

Malicious software is an integral part of cybercrime defense. Due to the...
research
01/31/2020

An Autonomous Intrusion Detection System Using Ensemble of Advanced Learners

An intrusion detection system (IDS) is a vital security component of mod...
research
01/18/2021

Applying High-Performance Bioinformatics Tools for Outlier Detection in Log Data

Most of today's security solutions, such as security information and eve...
research
05/28/2018

Identification of Flaws in the Design of Signatures for Intrusion Detection Systems

Signature-based Intrusion Detection System (SIDS) provides a promising s...
research
05/01/2019

On the Convergence Rates of Learning-based Signature Generation Schemes to Contain Self-propagating Malware

In this paper, we investigate the importance of a defense system's learn...

Please sign up or login with your details

Forgot password? Click here to reset