Detecting network intrusions by data mining and variable-length sequence pattern matching

被引:0
作者
Tian Xinguang1
2. Inst. of Computing Technology
机构
关键词
intrusion detection; anomaly detection; system call; data mining; variable-length pattern;
D O I
暂无
中图分类号
TP393.08 [];
学科分类号
0839 ; 1402 ;
摘要
Anomaly detection has been an active research topic in the field of network intrusion detection for many years. A novel method is presented for anomaly detection based on system calls into the kernels of Unix or Linux systems. The method uses the data mining technique to model the normal behavior of a privileged program and uses a variable-length pattern matching algorithm to perform the comparison of the current behavior and historic normal behavior, which is more suitable for this problem than the fixed-length pattern matching algorithm proposed by Forrest et al. At the detection stage, the particularity of the audit data is taken into account, and two alternative schemes could be used to distinguish between normalities and intrusions. The method gives attention to both computational efficiency and detection accuracy and is especially applicable for on-line detection. The performance of the method is evaluated using the typical testing data set, and the results show that it is significantly better than the anomaly detection method based on hidden Markov models proposed by Yan et al. and the method based on fixed-length patterns proposed by Forrest and Hofmeyr. The novel method has been applied to practical hosted-based intrusion detection systems and achieved high detection performance.
引用
收藏
页码:405 / 411
页数:7
相关论文
共 5 条
[1]   A Method for Anomaly Detection of User Behaviors Based on Machine Learning [J].
TIAN Xin-guang 1 ;
2.Department of Electronic Engineering ;
3.Research Institute of Beijing Capitel Group Corporation ;
4.Institute of Computing Technology .
The Journal of China Universities of Posts and Telecommunications, 2006, (02) :61-65
[2]   An empirical study of two approaches to sequence learning for anomaly detection [J].
Lane, T ;
Brodley, CE .
MACHINE LEARNING, 2003, 51 (01) :73-107
[3]   Intrusion detection techniques and approaches [J].
Verwoerd, T ;
Hunt, R .
COMPUTER COMMUNICATIONS, 2002, 25 (15) :1356-1365
[4]   Intrusion detection using sequences of system calls [J].
Hofmeyr, Steven A. ;
Forrest, Stephanie ;
Somayaji, Anil .
Journal of Computer Security, 1998, 6 (03) :151-180
[5]   Computer immunology [J].
Forrest, S ;
Hofmeyr, SA ;
Somayaji, A .
COMMUNICATIONS OF THE ACM, 1997, 40 (10) :88-96