A new Intrusion Detection method based on process profiling

被引:11
|
作者
Okazaki, Y [1 ]
Sato, I [1 ]
Goto, S [1 ]
机构
[1] Waseda Univ, Sch Sci & Engn, Shinjuku Ku, Tokyo 1698555, Japan
来源
2002 SYMPOSIUM ON APPLICATIONS AND THE INTERNET (SAINT 2002), PROCEEDINGS | 2002年
关键词
Intrusion Detection; IDS; AID; MID; profile; DP matching;
D O I
10.1109/SAINT.2002.994455
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
There have been two well-known models for intrusion detection. They are called Anomaly Intrusion Detection (AID) model and Misuse Intrusion Detection (MID) model. The former model analyzes user behavior and the statistics of a process in normal situation, and it checks whether the system is being used in a different manner. The latter model maintains database of known intrusion technique and detects intrusion by comparing a behavior against the database. An intrusion detection method based on an AID model can detect a new intrusion method. however it needs to update. the data describing users behavior and the statistics in normal usage, We call these information profiles, There are several problems in AID to be addressed. The profiles are tend to be large. Detecting intrusion needs a large amount of system resource, like CPU time and memory and disk space. An AND model requires less amount of system resource to detect intrusion. However it cannot detect new. unknown intrusion methods. Our method solves these problems by recording system calls from daemon processes and setuid programs. We improved detection accuracy by adopting a DP matching scheme.
引用
收藏
页码:82 / 90
页数:9
相关论文
共 50 条
  • [21] The Method of Classified Danger Sensed for Windows Process Intrusion Detection
    Xu, Fei
    Tan, Chengyu
    Zheng, Yi
    Geng, Ming
    ICMECG: 2009 INTERNATIONAL CONFERENCE ON MANAGEMENT OF E-COMMERCE AND E-GOVERNMENT, PROCEEDINGS, 2009, : 469 - 472
  • [22] Toward an Intrusion Detection Approach for IoT based on Radio Communications Profiling
    Roux, Jonathan
    Alata, Eric
    Auriol, Guillaume
    Nicomette, Vincent
    Kaaniche, Mohamed
    2017 13TH EUROPEAN DEPENDABLE COMPUTING CONFERENCE (EDCC 2017), 2017, : 147 - 150
  • [23] An Intrusion Detection Scheme for Driverless Vehicles Based Gyroscope Sensor Profiling
    Alheeti, Khattab M. Ali
    Al-Zaidi, Rabab
    Woods, John
    McDonald-Maier, Klaus
    2017 IEEE INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS (ICCE), 2017,
  • [24] A NEW INTRUSION DETECTION METHOD BASED ON FSM AND CACHE MEMORY IN AD HOC NETWORKS
    Jalali, Dina Sadat
    Shahrbanoonezhad, Alireza
    2011 IEEE INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND INTELLIGENCE SYSTEMS, 2011, : 413 - 417
  • [25] Intrusion Detection Method Based on Wavelet Neural Network
    Sun, Jianjing
    Yang, Han
    Tian, Jingwen
    Wu, Fan
    WKDD: 2009 SECOND INTERNATIONAL WORKSHOP ON KNOWLEDGE DISCOVERY AND DATA MINING, PROCEEDINGS, 2009, : 851 - +
  • [26] Network intrusion detection method based on WaveNet and BiGRU
    Ma Z.
    Li J.
    Lu Y.
    Chen C.
    Xi Tong Gong Cheng Yu Dian Zi Ji Shu/Systems Engineering and Electronics, 2022, 44 (08): : 2652 - 2660
  • [27] Intrusion Detection Method Based on Improved Neural Network
    Tang Hai-he
    2018 INTERNATIONAL CONFERENCE ON SMART GRID AND ELECTRICAL AUTOMATION (ICSGEA), 2018, : 151 - 154
  • [28] On Copulas-Based Classification Method for Intrusion Detection
    Khobzaoui, Abdelkader
    Mesfioui, Mhamed
    Yousfate, Abderrahmane
    Bensaber, Boucif Amar
    COMPUTER SCIENCE AND ITS APPLICATIONS, CIIA 2015, 2015, 456 : 394 - 405
  • [29] An Anomaly Intrusion Detection Method Based on Shell Commands
    Du, Ye
    Wang, Tong
    2008 IEEE INTERNATIONAL SYMPOSIUM ON KNOWLEDGE ACQUISITION AND MODELING WORKSHOP PROCEEDINGS, VOLS 1 AND 2, 2008, : 798 - +
  • [30] An Efficient Intrusion Detection Method Based on Dynamic Autoencoder
    Zhao, Ruijie
    Yin, Jie
    Xue, Zhi
    Gui, Guan
    Adebisi, Bamidele
    Ohtsuki, Tomoaki
    Gacanin, Haris
    Sari, Hikmet
    IEEE WIRELESS COMMUNICATIONS LETTERS, 2021, 10 (08) : 1707 - 1711