...
首页> 外文期刊>Procedia Computer Science >On the analysis of open source datasets: validating IDS implementation for well-known and zero day attack detection
【24h】

On the analysis of open source datasets: validating IDS implementation for well-known and zero day attack detection

机译:在开源数据集的分析:验证众所周知和零日攻击检测的IDS实现

获取原文
           

摘要

This paper presents the implementation of an anomaly-based Intrusion Detection System (IDS), capable to detect well-known and zero-day attacks. First, we extend our previous work by generating the Machine Learning (ML) predictors based on KDD99, NSL-KDD and CIC-IDS2018 datasets, and providing the programming language evaluation and the final validation platform. We have built IDS detection solution in two phases. The firstTrainingphase explores available datasets to generate the predictors. The second phase is composed of two processes.Extractiongenerates the statistical network traffic metrics from the PCAP files and processes them into commma separated values (CSV) files. ThePredictionloads predictors in main memory and feeds them with CSV files to predict the well-known and zero-day attacks. The aforementioned initial datasets contain the statistical network traffic metrics of the well-known attacks, collected at runtime execution of the malicious software. Zero day attacks can generate a statistical network traffic metrics similar to well-known attacks. Therefore, to showcase the zero-day anomaly detection, we realise a validation platform. Six attacks (three Denial of Service (DoS) and three scanning), not recorded in the initial datasets, are executed in an isolated environment. The achieved result indicates a misclassification prediction error that inhibits the application of the automatic attack responses, although the misclassification errors were minimised, during theTrainingphase.
机译:本文介绍了基于异常的入侵检测系统(IDS),能够检测众所周知和零日攻击。首先,我们通过基于KDD99,NSL-KDD和CIC-IDS2018数据集生成机器学习(ML)预测器来扩展我们以前的工作,并提供编程语言评估和最终验证平台。我们在两个阶段内建立了ID检测解决方案。 FirstRoringPhase探索可用数据集以生成预测器。第二阶段由两个进程组成.Extraction从PCAP文件中的统计网络流量指标并将其处理到句号分离值(CSV)文件中。主存储器中的预测器预测器,并用CSV文件馈送它们以预测众所周知和零日攻击。上述初始数据集包含在恶意软件的运行时执行的众所周知的攻击的统计网络流量指标。零日攻击可以生成类似于着名的攻击的统计网络流量指标。因此,为了展示零天异常检测,我们实现了一个验证平台。在孤立的环境中执行六次攻击(三个拒绝服务(DOS)和三个扫描),未记录在初始数据集中。所实现的结果表示错误分类预测误差,其抑制自动攻击响应的应用,尽管在束缚相位期间最小化错误分类误差。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号