Cargando…

Evaluating Word Embedding Feature Extraction Techniques for Host-Based Intrusion Detection Systems

Research into Intrusion and Anomaly Detectors at the Host level typically pays much attention to extracting attributes from system call traces. These include window-based, Hidden Markov Models, and sequence-model-based attributes. Recently, several works have been focusing on sequence-model-based fe...

Descripción completa

Detalles Bibliográficos
Autores principales: Mvula, Paul K., Branco, Paula, Jourdan, Guy-Vincent, Viktor, Herna L.
Formato: Online Artículo Texto
Lenguaje:English
Publicado: Springer International Publishing 2023
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10077957/
https://www.ncbi.nlm.nih.gov/pubmed/37035459
http://dx.doi.org/10.1007/s44248-023-00002-y
_version_ 1785020410671136768
author Mvula, Paul K.
Branco, Paula
Jourdan, Guy-Vincent
Viktor, Herna L.
author_facet Mvula, Paul K.
Branco, Paula
Jourdan, Guy-Vincent
Viktor, Herna L.
author_sort Mvula, Paul K.
collection PubMed
description Research into Intrusion and Anomaly Detectors at the Host level typically pays much attention to extracting attributes from system call traces. These include window-based, Hidden Markov Models, and sequence-model-based attributes. Recently, several works have been focusing on sequence-model-based feature extractors, specifically Word2Vec and GloVe, to extract embeddings from the system call traces due to their ability to capture semantic relationships among system calls. However, due to the nature of the data, these extractors introduce inconsistencies in the extracted features, causing the Machine Learning models built on them to yield inaccurate and potentially misleading results. In this paper, we first highlight the research challenges posed by these extractors. Then, we conduct experiments with new feature sets assessing their suitability to address the detected issues. Our experiments show that Word2Vec is prone to introducing more duplicated samples than GloVe. Regarding the solutions proposed, we found that concatenating the embedding vectors generated by Word2Vec and GloVe yields the overall best balanced accuracy. In addition to resolving the challenge of data leakage, this approach enables an improvement in performance relative to other alternatives.
format Online
Article
Text
id pubmed-10077957
institution National Center for Biotechnology Information
language English
publishDate 2023
publisher Springer International Publishing
record_format MEDLINE/PubMed
spelling pubmed-100779572023-04-07 Evaluating Word Embedding Feature Extraction Techniques for Host-Based Intrusion Detection Systems Mvula, Paul K. Branco, Paula Jourdan, Guy-Vincent Viktor, Herna L. Discov Data Research Research into Intrusion and Anomaly Detectors at the Host level typically pays much attention to extracting attributes from system call traces. These include window-based, Hidden Markov Models, and sequence-model-based attributes. Recently, several works have been focusing on sequence-model-based feature extractors, specifically Word2Vec and GloVe, to extract embeddings from the system call traces due to their ability to capture semantic relationships among system calls. However, due to the nature of the data, these extractors introduce inconsistencies in the extracted features, causing the Machine Learning models built on them to yield inaccurate and potentially misleading results. In this paper, we first highlight the research challenges posed by these extractors. Then, we conduct experiments with new feature sets assessing their suitability to address the detected issues. Our experiments show that Word2Vec is prone to introducing more duplicated samples than GloVe. Regarding the solutions proposed, we found that concatenating the embedding vectors generated by Word2Vec and GloVe yields the overall best balanced accuracy. In addition to resolving the challenge of data leakage, this approach enables an improvement in performance relative to other alternatives. Springer International Publishing 2023-03-30 2023 /pmc/articles/PMC10077957/ /pubmed/37035459 http://dx.doi.org/10.1007/s44248-023-00002-y Text en © The Author(s) 2023 https://creativecommons.org/licenses/by/4.0/Open AccessThis article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article's Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article's Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by/4.0/ (https://creativecommons.org/licenses/by/4.0/) .
spellingShingle Research
Mvula, Paul K.
Branco, Paula
Jourdan, Guy-Vincent
Viktor, Herna L.
Evaluating Word Embedding Feature Extraction Techniques for Host-Based Intrusion Detection Systems
title Evaluating Word Embedding Feature Extraction Techniques for Host-Based Intrusion Detection Systems
title_full Evaluating Word Embedding Feature Extraction Techniques for Host-Based Intrusion Detection Systems
title_fullStr Evaluating Word Embedding Feature Extraction Techniques for Host-Based Intrusion Detection Systems
title_full_unstemmed Evaluating Word Embedding Feature Extraction Techniques for Host-Based Intrusion Detection Systems
title_short Evaluating Word Embedding Feature Extraction Techniques for Host-Based Intrusion Detection Systems
title_sort evaluating word embedding feature extraction techniques for host-based intrusion detection systems
topic Research
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10077957/
https://www.ncbi.nlm.nih.gov/pubmed/37035459
http://dx.doi.org/10.1007/s44248-023-00002-y
work_keys_str_mv AT mvulapaulk evaluatingwordembeddingfeatureextractiontechniquesforhostbasedintrusiondetectionsystems
AT brancopaula evaluatingwordembeddingfeatureextractiontechniquesforhostbasedintrusiondetectionsystems
AT jourdanguyvincent evaluatingwordembeddingfeatureextractiontechniquesforhostbasedintrusiondetectionsystems
AT viktorhernal evaluatingwordembeddingfeatureextractiontechniquesforhostbasedintrusiondetectionsystems