TY - JOUR
T1 - Deep learning for detecting logic-flaw-exploiting network attacks
T2 - An end-to-end approach
AU - Zou, Qingtian
AU - Singhal, Anoop
AU - Sun, Xiaoyan
AU - Liu, Peng
N1 - Funding Information:
This work was supported by NIST 60NANB20D180.
Publisher Copyright:
© 2022 - IOS Press. All rights reserved.
PY - 2021
Y1 - 2021
N2 - Network attacks have become a major security concern for organizations worldwide. A category of network attacks that exploit the logic (security) flaws of a few widely-deployed authentication protocols has been commonly observed in recent years. Such logic-flaw-exploiting network attacks often do not have distinguishing signatures, and can thus easily evade the typical signature-based network intrusion detection systems. Recently, researchers have applied neural networks to detect network attacks with network logs. However, public network data sets have major drawbacks such as limited data sample variations and unbalanced data with respect to malicious and benign samples. In this paper, we present a new end-to-end approach based on protocol fuzzing to automatically generate high-quality network data, on which deep learning models can be trained for network attack detection. Our findings show that protocol fuzzing can generate data samples that cover real-world data, and deep learning models trained with fuzzed data can successfully detect the logic-flaw-exploiting network attacks.
AB - Network attacks have become a major security concern for organizations worldwide. A category of network attacks that exploit the logic (security) flaws of a few widely-deployed authentication protocols has been commonly observed in recent years. Such logic-flaw-exploiting network attacks often do not have distinguishing signatures, and can thus easily evade the typical signature-based network intrusion detection systems. Recently, researchers have applied neural networks to detect network attacks with network logs. However, public network data sets have major drawbacks such as limited data sample variations and unbalanced data with respect to malicious and benign samples. In this paper, we present a new end-to-end approach based on protocol fuzzing to automatically generate high-quality network data, on which deep learning models can be trained for network attack detection. Our findings show that protocol fuzzing can generate data samples that cover real-world data, and deep learning models trained with fuzzed data can successfully detect the logic-flaw-exploiting network attacks.
UR - http://www.scopus.com/inward/record.url?scp=85138470787&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85138470787&partnerID=8YFLogxK
U2 - 10.3233/JCS-210101
DO - 10.3233/JCS-210101
M3 - Article
AN - SCOPUS:85138470787
SN - 0926-227X
VL - 30
SP - 541
EP - 570
JO - Journal of Computer Security
JF - Journal of Computer Security
IS - 4
ER -