Detecting intrusions using system calls: Alternative data models

被引:547
作者
Warrender, C [1 ]
Forrest, S [1 ]
Pearlmutter, B [1 ]
机构
[1] Univ New Mexico, Dept Comp Sci, Albuquerque, NM 87131 USA
来源
PROCEEDINGS OF THE 1999 IEEE SYMPOSIUM ON SECURITY AND PRIVACY | 1999年
关键词
D O I
10.1109/SECPRI.1999.766910
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Intrusion detection systems rely on a wide variety of observable data to distinguish between legitimate and illegitimate activities. In this paper we study one such observable-sequences of system calls into the kernel of an operating system. Using system-call data sets generated by several different programs, we compare the ability of different data modeling methods to represent normal behavior accurately and to recognize intrusions. We compare the following methods: Simple enumeration of observed sequences, comparison of relative frequencies of different sequences, a rule induction technique, and Hidden Markov Models (HMMs). We discuss the factors affecting the performance of each method, and conclude that for this particular problem, weaker methods than HMMs are likely sufficient.
引用
收藏
页码:133 / 145
页数:13
相关论文
共 16 条
[1]  
[Anonymous], MACHINE LEARNING
[2]  
[Anonymous], NIDES STAT COMPONENT
[3]  
CARRASCO R, 1994, P 2 INT C GRAMM INF, P139
[4]  
Cohen WW, 1995, MACHINE LEARNING
[5]   GAUGING SIMILARITY WITH N-GRAMS - LANGUAGE-INDEPENDENT CATEGORIZATION OF TEXT [J].
DAMASHEK, M .
SCIENCE, 1995, 267 (5199) :843-848
[6]   A sense of self for unix processes [J].
Forrest, S ;
Hofmeyr, SA ;
Somayaji, A ;
Longstaff, TA .
1996 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 1996, :120-128
[7]   A statistically based system for prioritizing information exploration under uncertainty [J].
Helman, P ;
Bhangoo, J .
IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART A-SYSTEMS AND HUMANS, 1997, 27 (04) :449-466
[8]   Intelligent agents for intrusion detection [J].
Helmer, GG ;
Wong, JSK ;
Honavar, V ;
Miller, L .
1998 IEEE INFORMATION TECHNOLOGY CONFERENCE, PROCEEDINGS, 1998, :121-124
[9]  
Hofmeyr S. A., 1998, Journal of Computer Security, V6, P151
[10]  
Ko C., 1994, Proceedings. 10th Annual Computer Security Applications Conference (Cat. No.94TH8032), P134, DOI 10.1109/CSAC.1994.367313