A new Intrusion Detection method based on process profiling

被引:11
|
作者
Okazaki, Y [1 ]
Sato, I [1 ]
Goto, S [1 ]
机构
[1] Waseda Univ, Sch Sci & Engn, Shinjuku Ku, Tokyo 1698555, Japan
来源
2002 SYMPOSIUM ON APPLICATIONS AND THE INTERNET (SAINT 2002), PROCEEDINGS | 2002年
关键词
Intrusion Detection; IDS; AID; MID; profile; DP matching;
D O I
10.1109/SAINT.2002.994455
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
There have been two well-known models for intrusion detection. They are called Anomaly Intrusion Detection (AID) model and Misuse Intrusion Detection (MID) model. The former model analyzes user behavior and the statistics of a process in normal situation, and it checks whether the system is being used in a different manner. The latter model maintains database of known intrusion technique and detects intrusion by comparing a behavior against the database. An intrusion detection method based on an AID model can detect a new intrusion method. however it needs to update. the data describing users behavior and the statistics in normal usage, We call these information profiles, There are several problems in AID to be addressed. The profiles are tend to be large. Detecting intrusion needs a large amount of system resource, like CPU time and memory and disk space. An AND model requires less amount of system resource to detect intrusion. However it cannot detect new. unknown intrusion methods. Our method solves these problems by recording system calls from daemon processes and setuid programs. We improved detection accuracy by adopting a DP matching scheme.
引用
收藏
页码:82 / 90
页数:9
相关论文
共 50 条
  • [1] A New Intrusion Detection Method Based on Antibody Concentration
    Zeng, Jie
    Li, Tao
    Li, Guiyang
    Li, Haibo
    EMERGING INTELLIGENT COMPUTING TECHNOLOGY AND APPLICATIONS: WITH ASPECTS OF ARTIFICIAL INTELLIGENCE, 2009, 5755 : 500 - 509
  • [2] A new intrusion detection method based on discriminant analysis
    Asaka, M
    Onabuta, T
    Inoue, T
    Okazawa, S
    Goto, S
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2001, E84D (05) : 570 - 577
  • [3] A New Intrusion Detection Method Based on Industrial Internet
    Wu, Yuhong
    Hu, Xiangdong
    JOURNAL OF INTERNET TECHNOLOGY, 2025, 26 (01): : 123 - 135
  • [4] A New Intrusion Detection Method Based on Adaptive Feature Extraction
    Wu, Ya-Li
    Li, Guo-Ting
    Fu, Yu-Long
    Wang, Xiao-Peng
    PROCEEDINGS OF THE 38TH CHINESE CONTROL CONFERENCE (CCC), 2019, : 8643 - 8648
  • [5] A new intrusion detection method based on artificial immune system
    Wang, Baoyi
    Zhang, Shaomin
    2007 IFIP INTERNATIONAL CONFERENCE ON NETWORK AND PARALLEL COMPUTING WORKSHOPS, PROCEEDINGS, 2007, : 91 - 98
  • [6] Locality-based server profiling for intrusion detection
    Lee, Robert
    Lang, Sheau-Dong
    INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2008, 5075 : 205 - 216
  • [7] A New DSGRU-Based Intrusion Detection Method for the Internet of Things
    Liu, Yueling
    Lan, Yingcong
    Yang, Changsong
    Ding, Yong
    Li, Chunhai
    ELECTRONICS, 2023, 12 (23)
  • [8] A New Industrial Intrusion Detection Method Based on CNN-BiLSTM
    Wang, Jun
    Si, Changfu
    Wang, Zhen
    Fu, Qiang
    CMC-COMPUTERS MATERIALS & CONTINUA, 2024, 79 (03): : 4297 - 4318
  • [9] New Method for Intrusion Detection Based on BPNN and Improved GA Optimization
    Gu, Yuesheng
    Liu, Yanpei
    Feng, Hongyu
    INFORMATION COMPUTING AND APPLICATIONS, PT II, 2011, 244 : 434 - 440
  • [10] A New Feature Extraction Method of Intrusion Detection
    Zhu Xiaorong
    Wang Dianchun
    Ye Changguo
    PROCEEDINGS OF THE FIRST INTERNATIONAL WORKSHOP ON EDUCATION TECHNOLOGY AND COMPUTER SCIENCE, VOL II, 2009, : 504 - +