Abstract
The system call sequence is widely used as raw data due to its prospective performance in host-based intrusion detection methods using machine learning. However, evolutionary intrusion attacks such as the obfuscation technique can achieve the same invasion purpose and effect while changing the malicious system call combination to bypass the abnormal identification, which makes the detection results not robust and even invalid. In this paper, we present a behavioral semantics enhancement method of system call sequence to overcome the problem. This method combines sequence completion to extend behavior information capacity with system calls abstraction and invocation switching differential encoding to improve abstractive representation ability. To complete behavioral semantics features extraction and data classification, the enhanced sequences are transformed to vector matrices and input into the multi-channel Text-CNN. Evaluation experiments show that the proposed method outperforms all of the compared works significantly, which suggests it has a more accurate and robust performance in detecting obfuscation attacks.
Original language | English |
---|---|
Pages (from-to) | 112-126 |
Number of pages | 15 |
Journal | Future Generation Computer Systems |
Volume | 125 |
DOIs | |
Publication status | Published - Dec 2021 |
Keywords
- Behavioral semantics
- Deep learning
- Host intrusion detection
- Obfuscation attack
- System call