False Alert Detection Based on Deep Learning and Machine Learning

False Alert Detection Based on Deep Learning and Machine Learning

Shudong Li, Danyi Qin, Xiaobo Wu, Juan Li, Baohui Li, Weihong Han
Copyright: © 2022 |Pages: 21
DOI: 10.4018/IJSWIS.297035
Article PDF Download
Open access articles are freely available for download

Abstract

Among the large number of network attack alerts generated every day, actual security incidents are usually overwhelmed by a large number of redundant alerts. Therefore, how to remove these redundant alerts in real time and improve the quality of alerts is an urgent problem to be solved in large-scale network security protection. This paper uses the method of combining machine learning and deep learning to improve the effect of false alarm detection and then more accurately identify real alarms, that is, in the process of training the model, the features of a hidden layer output of the DNN model are used as input to train the machine learning model. In order to verify the proposed method, we use the marked alert data to do classification experiments, and finally use the accuracy recall rate, precision, and F1 value to evaluate the model. Good results have been obtained.
Article Preview
Top

Introduction

The internet is developing very rapidly, making people’s lives more convenient. While enjoying related services, it is also very important that information can be effectively protected. The integrity, privacy, and availability of information must be taken into consideration. As network security becomes more and more important, many security products, such as Firewalls, Intrusion Detection Systems, Vulnerability Scanning Systems, Update Service Systems, etc. continue to appear, and there are a large number of security data which can be used for auditing, such as router logs, syslog, host logs, etc. However, even if various security measures continue to be adopted, network security incidents have not decreased. Of course, this has a lot to do with the ever-expanding scale of the Internet, but there is no doubt that the situation of network security is becoming more and more serious.

The security guarantee of the information system is a defense system, including protection, detection, reaction, and recovery four levels (NURBOL, 2010). IDS (Intrusion Detection System) refers to a system have intrusion detection function. The IDS is responsible for “supervising early warning” by collecting system programs, operating systems, network packets, applications, etc. Discover the behavior of hazard system security or violation of security strategies. The security policy of intrusion detection system requires the collection of complete data. This is different from the general information system. Sometimes we need to deal with a large number of warnings, which requires high computer performance. However, for intrusion detection technology, the quality of security data generated at home and abroad is very low, and a large number of artificial analyses was required.

At present, IDS has a variety of products, but the basic principles are the same, mainly divided into three modules: The data package sniffing, the alert detection engine and the report of the alert.

There are many problems around the intrusion detection system, we need to solve: Signature generates, attack detection performance measurements, the alert analysis, etc., In particular, the alert analysis has become a hot spot for related research since 2000. People find out for existing safety products: Any single security product is difficult to meet people's safety requirement. The firewall cannot prevent unknown security incidents, the alerts generated by the intrusion detection system have serious false positives and missed reports, and the amount of data from various security data sources is beyond the reach of human ability. The amount of security data generated in a large-scale network is huge, and a 100Mbps access network can often generate more than one hundred thousand alerts per hour (Li Dong et al., 2009). Among the large number of alerts generated every day, actual security incidents are usually overwhelmed by a large number of redundant alerts (ie, false alerts). Many techniques for analyzing the alerts generated by IDS: fuzzy theory, information theory, statistics, data mining machine learning (Shudong Li et al., 2021), pattern recognition, artificial intelligence, etc., their purpose is to discover real attacks from the large number of alerts generated by IDS. How to remove these redundant alerts in real time and improve the quality of alerts is an urgent problem to be solved in large-scale network security protection.

But how do false alerts occur? Taking the open-source intrusion detection system SNORT as an example, the corresponding signature (a set of conditions that the data packet needs) will generate a large number of alerts. Therefore, which will bring two main problems of alert analysis:

Complete Article List

Search this Journal:
Reset
Volume 20: 1 Issue (2024)
Volume 19: 1 Issue (2023)
Volume 18: 4 Issues (2022): 2 Released, 2 Forthcoming
Volume 17: 4 Issues (2021)
Volume 16: 4 Issues (2020)
Volume 15: 4 Issues (2019)
Volume 14: 4 Issues (2018)
Volume 13: 4 Issues (2017)
Volume 12: 4 Issues (2016)
Volume 11: 4 Issues (2015)
Volume 10: 4 Issues (2014)
Volume 9: 4 Issues (2013)
Volume 8: 4 Issues (2012)
Volume 7: 4 Issues (2011)
Volume 6: 4 Issues (2010)
Volume 5: 4 Issues (2009)
Volume 4: 4 Issues (2008)
Volume 3: 4 Issues (2007)
Volume 2: 4 Issues (2006)
Volume 1: 4 Issues (2005)
View Complete Journal Contents Listing