An Automatic Generation Alignment of Attack Signatures Based on Rule Matching Degree

Aiming at the problems of weak anti-noise ability and inaccurate signature generation of existing automatic attack signature generation methods proposing an algorithm based on rule matching degree in the context of the integrated Space-Earth integration network. Classify sequences based on rule matching degree (MDF), and construct a hierarchical guide tree according to the similarity between the two sequences. Then select the optimal alignment between two sequences according to the layers. Among them, the improved production rule sequence alignment algorithm (PRSA) is used to discover and retain comprehensible knowledge in the form of production rules. Fitness function is introduced and similarity measure function is modified to make the alignment between two sequences more reasonable. The experimental results show that this method has good anti-noise ability and the accuracy of attack feature extraction is higher.

[1]  Ya-Wen Lin,et al.  Simulating Exploits for the Creation and Refinement of Detection Signatures , 2017, 2017 IEEE 25th International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems (MASCOTS).

[2]  Dharmaraj R. Patil,et al.  Implementation of network intrusion detection system using variant of decision tree algorithm , 2015, 2015 International Conference on Nascent Technologies in the Engineering Field (ICNTE).

[3]  S. B. Needleman,et al.  A general method applicable to the search for similarities in the amino acid sequence of two proteins. , 1970, Journal of molecular biology.

[4]  Tang Yong Noise-tolerant approach for automatically generating signatures of network attacks , 2009 .

[5]  M S Waterman,et al.  Identification of common molecular subsequences. , 1981, Journal of molecular biology.

[6]  B. M. A. Al-Maqaleh Genetic Algorithm Approach to Automated Discovery of Comprehensible Production Rules , 2012, 2012 Second International Conference on Advanced Computing & Communication Technologies.

[7]  Hu Yong-gang Approach for attack signatures generating based on SVM and sequence alignment , 2012 .

[8]  Amol Borkar,et al.  A survey on Intrusion Detection System (IDS) and Internal Intrusion Detection and protection system (IIDPS) , 2017, 2017 International Conference on Inventive Computing and Informatics (ICICI).

[9]  Christus,et al.  A General Method Applicable to the Search for Similarities in the Amino Acid Sequence of Two Proteins , 2022 .

[10]  Hossain Shahriar,et al.  Towards an Attack Signature Generation Framework for Intrusion Detection Systems , 2017, 2017 IEEE 15th Intl Conf on Dependable, Autonomic and Secure Computing, 15th Intl Conf on Pervasive Intelligence and Computing, 3rd Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress(DASC/PiCom/DataCom/CyberSciTech).