Comparison of Anomaly Detection Accuracy of Host-based Intrusion Detection Systems based on Different Machine Learning Algorithms
被引:0
作者:
Shin, Yukyung
论文数: 0引用数: 0
h-index: 0
机构:
Ajou Univ, Dept Data Sci, Grad Sch, Suwon, South KoreaAjou Univ, Dept Data Sci, Grad Sch, Suwon, South Korea
Shin, Yukyung
[1
]
Kim, Kangseok
论文数: 0引用数: 0
h-index: 0
机构:
Ajou Univ, Dept Data Sci, Grad Sch, Suwon, South Korea
Ajou Univ, Dept Cyber Secur, Suwon, South KoreaAjou Univ, Dept Data Sci, Grad Sch, Suwon, South Korea
Kim, Kangseok
[1
,2
]
机构:
[1] Ajou Univ, Dept Data Sci, Grad Sch, Suwon, South Korea
[2] Ajou Univ, Dept Cyber Secur, Suwon, South Korea
Anomaly detection;
host based intrusion detection system;
system calls;
cyber security;
machine learning;
simulation;
MODEL;
D O I:
10.14569/ijacsa.2020.0110233
中图分类号:
TP301 [理论、方法];
学科分类号:
081202 ;
摘要:
Among the different host-based intrusion detection systems, an anomaly-based intrusion detection system detects attacks based on deviations from normal behavior; however, such a system has a low detection rate. Therefore, several studies have been conducted to increase the accurate detection rate of anomaly-based intrusion detection systems; recently, some of these studies involved the development of intrusion detection models using machine learning algorithms to overcome the limitations of existing anomaly-based intrusion detection methodologies as well as signature-based intrusion detection methodologies. In a similar vein, in this study, we propose a method for improving the intrusion detection accuracy of anomaly-based intrusion detection systems by applying various machine learning algorithms for classification of normal and attack data. To verify the effectiveness of the proposed intrusion detection models, we use the ADFA Linux Dataset which consists of system call traces for attacks on the latest operating systems. Further, for verification, we develop models and perform simulations for host-based intrusion detection systems based on machine learning algorithms to detect and classify anomalies using the Arena simulation tool.