Research of Model Increasing Reliability Intrusion Detection Systems
Keywords:Machine learning, Dataset, Malware, Preprocessor, Metasploit, k nearest neighbors method, Intrusion detection system
The paper presents the results of the using, a recurrent neural network to detect malicious software as part of the Snort intrusion detection system.The research was conducted on datasets generated on the basis of athena, dyre, engrat, grum, mimikatz, surtr malware exploiting vulnerability CVE-2022-20685 in the Snort intrusion detection system. Processing of input traffic data was carried out before the frag-3 and modbus preprocessors. The method of k nearest neighbors was used as a mathematical apparatus. The simulation of the developed software at different iterations.
All research results are presented in https://github.com/T-JN
G.Stoneburner, “Underlying Technical Models for Information Technology Security” , NIST Special Publication 800-33, 2001.
R.Atefinia, M.Ahmadi, Performance Evaluation of Apache Spark Mlib Algorithms on an Untrusion Detection Dataset. [Online].Available:https://arxiv.org/abs/2212.05269
M. Bachi, A. Harti, J. Fabini and T. Zseby, Walling up Backdoors in Intrusion Detection Systems. [Online].Available:https://arxiv.org/abs/1909.07866
National standard of the Russian Federation, “Quality of official information”, GOST R-51170-98, (2020)// 12, Moscow, Standardinform.
B.E.Zolbayar et al, “Generating practical adversarial network traffic flows using NIDSGAN”, [Online].Available:https://arxiv.org/abs/2203.06694
F. Zhong et al, “MalFox: Camouflaged adversarial malware example generation based on Conv-GAN againist black—box detectors”, [Online].Available:https://arxiv.org/abs/2011.01509
Dominik Kus et al, “A false sense of security? Revisting the state of machine learning-based industrial intrusion system”, [Online].Available:https://arxiv.org/abs/2205.09199
K. Jallad, M. Aljnidi and M.Desoki, «Big data analysis and distributed deep learning for next-generation intrusion detection system optimization», (2022)//[Online].Available: https://arxiv.org/abs/2209.13961
A. Branitsky and I. Kotenko, «Analysis and classification of methods for detecting network attacks», Proceedings of SPIIRAS, (2016) // issue 45, pp. 207-244.
Electronic resource dedicated to digital transformation technologies. [Online].Available:https://www.osp.ru/os/2020/03/13055601
T. V. Jamgharyan and V.H.Ispiryan, “Network infrastructures assessment stability” Proceedings of 13th International Conference on Computer Science and Information Technologies (CSIT), Yerevan, Armenia, pp. 199-203, 2021.
Malware Bazaar Database. [Online]. Available:https://bazaar.abuse.ch/browse/
Malware database. [Online]. Available:http://vxvault.net/ViriList.php
Malware repository. [Online]. Available:https://avcaesar.malware.lu/
Viruses repository. [Online]. Available:https://virusshare.com/
G. Campos, A.Zimek, et al, «On the evaluation of unsupervised outlier detection: measures,datasets, and an empirical study». [Online].Available:https://link.springer.com/article/10.1007/s10618-015-0444-8
Professional information and analytical resource dedicated to machine learning, pattern recognition and data mining. [Online].Available: http://www. machinelearning.ru
T. Jamgharyan, “Research of obfuscated malware with a capsule neural network”, Mathematical Problems of Computer Science, vol. 58, 67–83, 2022.
Website for identifying, defining and cataloging publicly disclosed cybersecurity vulnerabilities. [Online].Available:https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-20685
T.Jamgharyan, “Modernization of intrusion detection system via the generative model”, «Haikakan Banak» («Armenian Army») Defense-Academic journal, National Defense Research University, Ministry of Defense, Republic of Armenia, no. 2, pp.75-79, 2021. [Online].Available:https://razmavaraget.files.wordpress.com/2022/01/hb2-final.pdf
How to Cite
Copyright (c) 2023 Timur V. Jamgharyan
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.