A new Intrusion Detection method based on process profiling

被引:11
|
作者
Okazaki, Y [1 ]
Sato, I [1 ]
Goto, S [1 ]
机构
[1] Waseda Univ, Sch Sci & Engn, Shinjuku Ku, Tokyo 1698555, Japan
来源
2002 SYMPOSIUM ON APPLICATIONS AND THE INTERNET (SAINT 2002), PROCEEDINGS | 2002年
关键词
Intrusion Detection; IDS; AID; MID; profile; DP matching;
D O I
10.1109/SAINT.2002.994455
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
There have been two well-known models for intrusion detection. They are called Anomaly Intrusion Detection (AID) model and Misuse Intrusion Detection (MID) model. The former model analyzes user behavior and the statistics of a process in normal situation, and it checks whether the system is being used in a different manner. The latter model maintains database of known intrusion technique and detects intrusion by comparing a behavior against the database. An intrusion detection method based on an AID model can detect a new intrusion method. however it needs to update. the data describing users behavior and the statistics in normal usage, We call these information profiles, There are several problems in AID to be addressed. The profiles are tend to be large. Detecting intrusion needs a large amount of system resource, like CPU time and memory and disk space. An AND model requires less amount of system resource to detect intrusion. However it cannot detect new. unknown intrusion methods. Our method solves these problems by recording system calls from daemon processes and setuid programs. We improved detection accuracy by adopting a DP matching scheme.
引用
收藏
页码:82 / 90
页数:9
相关论文
共 50 条
  • [31] Intrusion detection method based on nonlinear correlation measure
    Ambusaidi, Mohammed A.
    Tan, Zhiyuan
    He, Xiangjian
    Nanda, Priyadarsi
    Lu, Liang Fu
    Jamdagni, Aruna
    INTERNATIONAL JOURNAL OF INTERNET PROTOCOL TECHNOLOGY, 2014, 8 (2-3) : 77 - 86
  • [32] Research on Intrusion Detection Method Based On Neural Network
    Xu Chi
    Chen Jin
    MEMS, NANO AND SMART SYSTEMS, PTS 1-6, 2012, 403-408 : 1479 - +
  • [33] Network Intrusion Detection with Threat Agent Profiling
    Bajtos, Tomas
    Gajdos, Andrej
    Kleinova, Lenka
    Lucivjanska, Katarina
    Sokol, Pavol
    SECURITY AND COMMUNICATION NETWORKS, 2018,
  • [34] An Efficient Intrusion Detection Method Based on LightGBM and Autoencoder
    Tang, Chaofei
    Luktarhan, Nurbol
    Zhao, Yuxin
    SYMMETRY-BASEL, 2020, 12 (09):
  • [35] A Novel Hybrid Anomaly Based Intrusion Detection Method
    Qazanfari, Kazem
    Mirpouryan, Minoo Sadat
    Gharaee, Hossein
    2012 SIXTH INTERNATIONAL SYMPOSIUM ON TELECOMMUNICATIONS (IST), 2012, : 942 - 947
  • [36] A wireless intrusion detection method based on neural network
    Liu, Yan-heng
    Tian, Da-xin
    Wei, Da
    PROCEEDINGS OF THE IASTED INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTER SCIENCE AND TECHNOLOGY, 2006, : 207 - +
  • [37] An Adaptive and Collaborative Method Based on GMRA for Intrusion Detection
    Teng, Shaohua
    Zhang, Yongzhi
    Zhang, Wei
    Liang, Lu
    COMPUTER SUPPORTED COOPERATIVE WORK AND SOCIAL COMPUTING, CHINESECSCW 2021, PT I, 2022, 1491 : 72 - 84
  • [38] Intrusion detection method based on imbalanced learning classification
    Li, Xiangjun
    Kong, Ke
    Shen, Hua
    Wei, Zhixiang
    Liao, Xiaofeng
    JOURNAL OF EXPERIMENTAL & THEORETICAL ARTIFICIAL INTELLIGENCE, 2024, 36 (05) : 657 - 677
  • [39] An intrusion detection method based on active transfer learning
    Li, Jingmei
    Wu, Weifei
    Xue, Di
    INTELLIGENT DATA ANALYSIS, 2020, 24 (02) : 363 - 383
  • [40] IKPCA-ELM-based Intrusion Detection Method
    Wang, Hui
    Wang, Chengjie
    Shen, Zihao
    Lin, Dengwei
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2020, 14 (07): : 3076 - 3092