Writing classification rules to identify malicious network traffic is a time-consuming and error-prone task. Learning-based classification systems automatically extract such rules from positive and negative traffic examples. However, due to limitations in the representation of network traffic and the learning strategy, these systems lack both expressiveness to cover a range of attacks and interpretability in fully describing the attack traffic's structure at the session layer. This paper presents Sharingan system, which uses program synthesis techniques to generate network classification programs at the session layer. Sharingan accepts raw network traces as inputs, and reports potential patterns of the attack traffic in NetQRE, a domain specific language designed for specifying session-layer quantitative properties. Using Sharingan, network operators can better analyze the attack pattern due to the following advantages of Sharingan's learning process: (1) it requires minimal feature engineering, (2) it is amenable to efficient implementation of the learnt classifier, and (3) the synthesized program is easy to decipher and edit. We develop a range of novel optimizations that reduce the synthesis time for large and complex tasks to a matter of minutes. Our experiments show that Sharingan is able to correctly identify attacks from a diverse set of network attack traces and generates explainable outputs, while achieving accuracy comparable to state-of-the-art learning-based intrusion detection systems.
翻译:编写用于识别恶意网络交通的分类规则是一项耗时和容易出错的任务。基于学习的分类系统自动从正面和负面交通实例中提取此类规则。然而,由于网络交通和学习战略的代表性有限,这些系统缺乏明确性,无法涵盖一系列攻击,也无法在会议层全面描述攻击交通的结构。本文介绍了Sshadean系统,该系统使用程序综合技术生成会议层的网络分类程序。Shadian接受原始网络痕迹作为投入,并报告NetQRE攻击交通的潜在模式。NetQRE是一种用于指定会话级数量属性的域域性特定语言。由于Shadian的学习过程具有以下优势,网络操作员可以更好地分析攻击模式:(1)它需要最低限度的特征工程,(2)它便于高效地实施所学的分类器,(3)综合程序易于解密和编辑。我们开发了一系列新的优化,将大型和复杂任务的综合时间缩短到几分钟。我们的实验显示,Shadan能够准确地从一组网络袭击的可比较性跟踪和可解释的系统中识别攻击的准确性。