Flow-Based Rules Generation for Intrusion Detection System using Machine Learning Approach

Yasir Saleem, Usama Anwar, Muhammad Khawar Bashir, Sheraz Naseer, Nadia Tabassum
{"title":"Flow-Based Rules Generation for Intrusion Detection System using Machine Learning Approach","authors":"Yasir Saleem, Usama Anwar, Muhammad Khawar Bashir, Sheraz Naseer, Nadia Tabassum","doi":"10.54692/lgurjcsit.2020.0403100","DOIUrl":null,"url":null,"abstract":"Rapid increase in internet users also brought new ways of privacy and security exploitation. Intrusion is one of such attacks in which an authorized user can access system resources and is major concern for cyber security community. Although AV and firewall companies work hard to cope with this kind of attacks and generate signatures for such exploits but still, they are lagging behind badly in this race. This research proposes an approach to ease the task of rules generationby making use of machine learning for this purpose. We used 17 network features to train a random forest classifier and this trained classifier is then translated into rules which can easily be integrated with most commonly used firewalls like snort and suricata etc. This work targets five kind of attacks: brute force, denial of service, HTTP DoS, infiltrate from inside and SSH brute force. Separate rules are generated for each kind of attack. As not every generated rule contributes toward detection that's why an evaluation mechanism is also used which selects the best rule on the basis of precision and f-measure values. Generated rules for some attacks have 100% precision with detection rate of more than 99% which represents effectiveness of this approach on traditional firewalls. As our proposed system translates trained classifier model into set of rules for firewalls so it is not only effective for rules generation but also give machine learning characteristics to traditional firewall to some extent. ","PeriodicalId":197260,"journal":{"name":"Lahore Garrison University Research Journal of Computer Science and Information Technology","volume":"42 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Lahore Garrison University Research Journal of Computer Science and Information Technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.54692/lgurjcsit.2020.0403100","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Rapid increase in internet users also brought new ways of privacy and security exploitation. Intrusion is one of such attacks in which an authorized user can access system resources and is major concern for cyber security community. Although AV and firewall companies work hard to cope with this kind of attacks and generate signatures for such exploits but still, they are lagging behind badly in this race. This research proposes an approach to ease the task of rules generationby making use of machine learning for this purpose. We used 17 network features to train a random forest classifier and this trained classifier is then translated into rules which can easily be integrated with most commonly used firewalls like snort and suricata etc. This work targets five kind of attacks: brute force, denial of service, HTTP DoS, infiltrate from inside and SSH brute force. Separate rules are generated for each kind of attack. As not every generated rule contributes toward detection that's why an evaluation mechanism is also used which selects the best rule on the basis of precision and f-measure values. Generated rules for some attacks have 100% precision with detection rate of more than 99% which represents effectiveness of this approach on traditional firewalls. As our proposed system translates trained classifier model into set of rules for firewalls so it is not only effective for rules generation but also give machine learning characteristics to traditional firewall to some extent. 
基于机器学习的入侵检测系统流规则生成
互联网用户的快速增长也带来了新的隐私和安全利用方式。入侵是一种授权用户访问系统资源的攻击方式,是网络安全界关注的主要问题。尽管反病毒和防火墙公司努力应对这种攻击,并为这种攻击生成签名,但他们仍然在这场竞赛中严重落后。本研究提出了一种通过利用机器学习来简化规则生成任务的方法。我们使用17个网络特征来训练一个随机森林分类器,然后这个训练好的分类器被转换成规则,这些规则可以很容易地与最常用的防火墙(如snort和suricata等)集成。这项工作针对五种攻击:暴力破解、拒绝服务攻击、HTTP拒绝服务攻击、内部渗透攻击和SSH暴力破解攻击。针对每种攻击生成单独的规则。由于并非每个生成的规则都有助于检测,因此还使用了评估机制,该机制根据精度和f-measure值选择最佳规则。对某些攻击生成的规则准确率达到100%,检测率达到99%以上,表明该方法在传统防火墙上是有效的。由于我们提出的系统将训练好的分类器模型转化为防火墙的规则集,因此它不仅对规则生成有效,而且在一定程度上赋予了传统防火墙的机器学习特征。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信