A novel host-based intrusion detection approach leveraging audit logs

Jiaqing Jiang, Hongyang Chu, Donghai Tian*

*Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

Abstract

Host-based intrusion detection systems (HIDS) struggle to detect advanced cyber attacks (e.g., APT, LoTL) due to their stealthy nature and reliance on either structural or semantic features alone. We hypothesize that integrating semantic audit log analysis with structural provenance graph learning improves detection accuracy and adaptability. To validate this, we propose MalSnif, a novel framework that (1) parses audit logs to construct provenance graphs enriched with process/event relationships, (2) simplifies graphs by pruning peripheral nodes while retaining critical attack trajectories, and (3) employs NLP techniques (word2vec, GRU, BiLSTM) to extract semantic features, combined with a graph convolutional network (GCN) for detection. Implemented using PyTorch and ETW, MalSnif addresses data imbalance via strategic downsampling during training. Evaluations show that our approach can effectively detect different kinds of cyber attacks and outperforms recent methods. In addition, our methods for simplifying process event sequences and provenance graphs also yield effective and explainable results.

Original languageEnglish
Article number107995
JournalFuture Generation Computer Systems
Volume174
DOIs
Publication statusPublished - Jan 2026

Keywords

  • Audit log analysis
  • Graph neural network
  • Provenance graph
  • Semantic-structural fusion

Fingerprint

Dive into the research topics of 'A novel host-based intrusion detection approach leveraging audit logs'. Together they form a unique fingerprint.

Cite this