A new Intrusion Detection method based on process profiling

被引:11
|
作者
Okazaki, Y [1 ]
Sato, I [1 ]
Goto, S [1 ]
机构
[1] Waseda Univ, Sch Sci & Engn, Shinjuku Ku, Tokyo 1698555, Japan
来源
2002 SYMPOSIUM ON APPLICATIONS AND THE INTERNET (SAINT 2002), PROCEEDINGS | 2002年
关键词
Intrusion Detection; IDS; AID; MID; profile; DP matching;
D O I
10.1109/SAINT.2002.994455
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
There have been two well-known models for intrusion detection. They are called Anomaly Intrusion Detection (AID) model and Misuse Intrusion Detection (MID) model. The former model analyzes user behavior and the statistics of a process in normal situation, and it checks whether the system is being used in a different manner. The latter model maintains database of known intrusion technique and detects intrusion by comparing a behavior against the database. An intrusion detection method based on an AID model can detect a new intrusion method. however it needs to update. the data describing users behavior and the statistics in normal usage, We call these information profiles, There are several problems in AID to be addressed. The profiles are tend to be large. Detecting intrusion needs a large amount of system resource, like CPU time and memory and disk space. An AND model requires less amount of system resource to detect intrusion. However it cannot detect new. unknown intrusion methods. Our method solves these problems by recording system calls from daemon processes and setuid programs. We improved detection accuracy by adopting a DP matching scheme.
引用
收藏
页码:82 / 90
页数:9
相关论文
共 50 条
  • [41] Intrusion Detection Method for MANET Based on Graph Theory
    Zhang Bingtao
    Wang Xiaopeng
    Wang Lucheng
    Zhang Zhonglin
    Li Yanlin
    Liu Hu
    JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2018, 40 (06) : 1446 - 1452
  • [42] Intrusion Detection Technology Based on Machine Learning Method
    Cao Yonghui
    EBM 2010: INTERNATIONAL CONFERENCE ON ENGINEERING AND BUSINESS MANAGEMENT, VOLS 1-8, 2010, : 5165 - 5168
  • [43] A Network Intrusion Detection Method Based on Bagging Ensemble
    Zhang, Zichen
    Kong, Shanshan
    Xiao, Tianyun
    Yang, Aimin
    SYMMETRY-BASEL, 2024, 16 (07):
  • [44] Research on Intrusion Detection Method Based On Neural Network
    Xu Chi
    Zhang Wen Fang
    MEMS, NANO AND SMART SYSTEMS, PTS 1-6, 2012, 403-408 : 1483 - +
  • [45] A Process-Oriented Intrusion Detection Method for Industrial Control Systems
    Colbert, Edward
    Sullivan, Daniel
    Hutchinson, Steve
    Renard, Kenneth
    Smith, Sidney
    PROCEEDINGS OF THE 11TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS 2016), 2016, : 497 - 500
  • [46] Intrusion detection via behavioural profiling on mobile and wireless networked devices
    Zincir, I
    Furnell, S
    Phippen, A
    EUROMEDIA '2005: 11TH ANNUAL EUROMEDIA CONFERENCE, 2005, : 67 - 71
  • [47] Intrusion Detection in Cyber Physical Systems Based on Process Modelling
    Holczer, Tamas
    Gazdag, Andras
    Miru, Gyorgy
    PROCEEDINGS OF THE 15TH EUROPEAN CONFERENCE ON CYBER WARFARE AND SECURITY (ECCWS 2016), 2016, : 127 - 135
  • [48] Research on intrusion detection based on graph partitioning method
    Zhu, C. (cuiling_zhu@163.com), 1600, Binary Information Press, P.O. Box 162, Bethel, CT 06801-0162, United States (09):
  • [49] An intrusion detection method based on clustering multidimensional sets
    Zhong, Yong
    Qin, Xiao-Lin
    Lin, Dong-Mei
    PROCEEDINGS OF 2006 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2006, : 2799 - +
  • [50] A new data normalization method for unsupervised anomaly intrusion detection
    Long-zheng Cai
    Jian Chen
    Yun Ke
    Tao Chen
    Zhi-gang Li
    Journal of Zhejiang University SCIENCE C, 2010, 11 : 778 - 784