2023
DOI: 10.1016/j.cose.2022.102961
|View full text |Cite
|
Sign up to set email alerts
|

Stacking ensemble-based HIDS framework for detecting anomalous system processes in Windows based operating systems using multiple word embedding

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 9 publications
(4 citation statements)
references
References 21 publications
0
4
0
Order By: Relevance
“…The HADS framework suggested by Kumar and Subba 28 utilized for the analysis of the procedure files including sequences of dynamic link library training calls created by numerous application and model developments to the Windows functioning model kernel, enabling the detection of anomalous processes. The model deploy files were primarily distorted into their corresponding n‐gram attribute vectors, which were then used as input to train a Stacking Ensemble Model (SEM) built on base classifiers, and a fully connected network built on meta classifier for the detection as either normal or abnormal.…”
Section: Reviewmentioning
confidence: 99%
“…The HADS framework suggested by Kumar and Subba 28 utilized for the analysis of the procedure files including sequences of dynamic link library training calls created by numerous application and model developments to the Windows functioning model kernel, enabling the detection of anomalous processes. The model deploy files were primarily distorted into their corresponding n‐gram attribute vectors, which were then used as input to train a Stacking Ensemble Model (SEM) built on base classifiers, and a fully connected network built on meta classifier for the detection as either normal or abnormal.…”
Section: Reviewmentioning
confidence: 99%
“…The sequence models capture the semantic meaning of syscalls by calculating the probability distribution over the traces. These include but are not limited to Long-Short Term Memory (LSTM) [ 19 ], Gated Recurrent Units (GRUs), Recurrent Neural Networks (RNNs) [ 20 ], Word2Vec [ 21 ], and GloVe embeddings [ 22 ]. Sequence models have received much interest due to their remarkable ability in capturing inter-word correlations.…”
Section: Related Workmentioning
confidence: 99%
“…3 In order to ensure the safety of IoT systems, researchers are actively investigating novel protection methods. In the same vein, a relatively new branch of machine learning 4 known as Natural Language Processing (NLP) 5 is becoming increasingly crucial to IoT systems' security. Although NLP has grown significantly in recent years, it is still vague how NLP techniques should be employed to protect IoT systems.…”
Section: Introductionmentioning
confidence: 99%