A Multi-Order Markov Chain Based Scheme for Anomaly Detection

被引:11
|
作者
Sha, Wenyao [1 ]
Zhu, Yongxin [1 ]
Huang, Tian [1 ]
Qiu, Meikang [2 ]
Zhu, Yan [1 ]
Zhang, Qiannan [1 ]
机构
[1] Shanghai Jiao Tong Univ, Sch Microelect, Shanghai 200030, Peoples R China
[2] Univ Kentucky, Dept Elect & Comp Engn, Lexington, KY 40506 USA
来源
2013 IEEE 37TH ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE WORKSHOPS (COMPSACW) | 2013年
关键词
Markov chain; Kth-order Markov chain; multivariate time series; anomaly detection; COMPUTER AUDIT DATA; INTRUSION-DETECTION; MODEL;
D O I
10.1109/COMPSACW.2013.12
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
This paper presents a feasible multi-order Markov chain based scheme for anomaly detection in server systems. In our approach, both the high-order Markov chain and multivariate time series are taken into account, along with the detailed design of training and testing algorithms. To evaluate its effectiveness, the Defense Advanced Research Projects Agency (DARPA) Intrusion Detection Evaluation Data Set is used as stimuli to our model, by which system calls and the corresponding return values form a two-dimensional input set. The calculation result shows that this approach is able to produce several effective indicators of anomalies. In addition to the absolute values given by an individual single-order model, we also notice a novelty unprecedented before, i.e., the changes in ranking positions of outputs from different-order ones also correlate closely with abnormal behaviours. Moreover, the analysis and application proves our approach's efficiency in consuming reasonable cost of time and storage.
引用
收藏
页码:83 / 88
页数:6
相关论文
共 50 条
  • [31] An Intelligent Security System Using Enhanced Anomaly-Based Detection Scheme
    Louati, Faten
    Barika Ktata, Farah
    Amous, Ikram
    COMPUTER JOURNAL, 2024, 67 (06) : 2317 - 2330
  • [32] Loose Game Theory Based Anomaly Detection Scheme for SDN-Based mMTC Services
    Wang, Bizhu
    Sun, Yan
    Xu, Xiaodong
    IEEE ACCESS, 2019, 7 : 139350 - 139357
  • [33] A New Outlier Detection Algorithms based on Markov chain
    Yang, Jun
    Wang, YingLong
    ADVANCED RESEARCH ON MATERIAL ENGINEERING, ARCHITECTURAL ENGINEERING AND INFORMATIZATION, 2012, 366 : 456 - 459
  • [34] Robustness of the Markov-chain model for cyber-attack detection
    Ye, N
    Zhang, YB
    Borror, CM
    IEEE TRANSACTIONS ON RELIABILITY, 2004, 53 (01) : 116 - 123
  • [35] Multi-order nearest neighbor prediction for recommendation systems
    Sun, Xiaohan
    Zhang, Li
    DIGITAL SIGNAL PROCESSING, 2022, 127
  • [36] A protocol anomaly detection method based on optimized hidden Markov model
    Qiu Wei
    Yang Yingjie
    Wang Yongwei
    Chang Dexian
    Liu Jiang
    Hu Hao
    PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON MECHATRONICS, MATERIALS, CHEMISTRY AND COMPUTER ENGINEERING 2015 (ICMMCCE 2015), 2015, 39 : 1649 - 1657
  • [37] A New Intrusion Detection Technology by Markov Chain
    Cao Lai-Cheng
    2009 INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE AND COMPUTATIONAL INTELLIGENCE, VOL I, PROCEEDINGS, 2009, : 296 - 300
  • [38] HMMs (Hidden Markov models) based on anomaly intrusion detection method
    Gao, B
    Ma, HY
    Yang, YH
    2002 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-4, PROCEEDINGS, 2002, : 381 - 385
  • [39] An Anomaly Detection Scheme based on LSTM Autoencoder for Energy Management
    Nam, Hong-Soon
    Jeong, Youn-Kwae
    Park, Jong Won
    11TH INTERNATIONAL CONFERENCE ON ICT CONVERGENCE: DATA, NETWORK, AND AI IN THE AGE OF UNTACT (ICTC 2020), 2020, : 1445 - 1447
  • [40] Sketch based anomaly detection scheme in wireless sensor networks
    Li, Guorui
    Wang, Ying
    2013 INTERNATIONAL CONFERENCE ON CYBER-ENABLED DISTRIBUTED COMPUTING AND KNOWLEDGE DISCOVERY (CYBERC), 2013, : 344 - 348