Rodyti trumpą aprašą

dc.contributor.authorČeponis, Dainius
dc.contributor.authorGoranin, Nikolaj
dc.date.accessioned2023-09-18T20:15:06Z
dc.date.available2023-09-18T20:15:06Z
dc.date.issued2019
dc.identifier.issn1939-0114
dc.identifier.urihttps://etalpykla.vilniustech.lt/handle/123456789/148207
dc.description.abstractThe increasing amount of malware and cyberattacks on a host level increases the need for a reliable anomaly-based host IDS (HIDS) that would be able to deal with zero-day attacks and would ensure low false alarm rate (FAR), which is critical for the detection of such activity. Deep learning methods such as convolutional neural networks (CNNs) and recurrent neural networks (RNNs) are considered to be highly suitable for solving data-driven security solutions. Therefore, it is necessary to perform the comparative analysis of such methods in order to evaluate their efficiency in attack classification as well as their ability to distinguish malicious and benign activity. In this article, we present the results achieved with the AWSCTD (attack-caused Windows OS system calls traces dataset), which can be considered as the most exhaustive set of host-level anomalies at the moment, including 112.56 million system calls from 12110 executable malware samples and 3145 benign software samples with 16.3 million system calls. The best results were obtained with CNNs with up to 90.0% accuracy for family classification and 95.0% accuracy for malicious/benign determination. RNNs demonstrated slightly inferior results. Furthermore, CNN tuning via an increase in the number of layers should make them practically applicable for host-level anomaly detection.eng
dc.formatPDF
dc.format.extentp. 1-12
dc.format.mediumtekstas / txt
dc.language.isoeng
dc.relation.isreferencedbyACM Digital Library
dc.relation.isreferencedbyINSPEC
dc.relation.isreferencedbyScopus
dc.relation.isreferencedbyScience Citation Index Expanded (Web of Science)
dc.rightsLaisvai prieinamas internete
dc.source.urihttp://downloads.hindawi.com/journals/scn/2019/2317976.pdf
dc.source.urihttps://doi.org/10.1155/2019/2317976
dc.source.urihttps://talpykla.elaba.lt/elaba-fedora/objects/elaba:43080179/datastreams/MAIN/content
dc.titleEvaluation of deep learning methods efficiency for malicious and benign system calls classification on the AWSCTD
dc.typeStraipsnis Web of Science DB / Article in Web of Science DB
dcterms.accessRightsThis is an open access article distributed under the Creative Commons Attribution License
dcterms.references37
dc.type.pubtypeS1 - Straipsnis Web of Science DB / Web of Science DB article
dc.contributor.institutionVilniaus Gedimino technikos universitetas
dc.contributor.facultyFundamentinių mokslų fakultetas / Faculty of Fundamental Sciences
dc.subject.researchfieldT 007 - Informatikos inžinerija / Informatics engineering
dc.subject.vgtuprioritizedfieldsIK0101 - Informacijos ir informacinių technologijų sauga / Information and Information Technologies Security
dc.subject.ltspecializationsL106 - Transportas, logistika ir informacinės ir ryšių technologijos (IRT) / Transport, logistic and information and communication technologies
dc.subject.endeep learnining
dc.subject.enanomaly
dc.subject.enmalicious
dc.subject.ensystem call
dcterms.sourcetitleSecurity and communication networks
dc.description.volumevol. 2019
dc.publisher.nameHindawi
dc.publisher.cityLondon
dc.identifier.doi000499165000001
dc.identifier.doi10.1155/2019/2317976
dc.identifier.elaba43080179


Šio įrašo failai

Thumbnail

Šis įrašas yra šioje (-se) kolekcijoje (-ose)

Rodyti trumpą aprašą