An intrusion detection and alert correlation approach based on revising probabilistic classifiers using expert knowledge

被引:33
作者
Benferhat, Salem [1 ,2 ]
Boudjelida, Abdelhamid [1 ,2 ]
Tabia, Karim [1 ,2 ]
Drias, Habiba [3 ]
机构
[1] Univ Lille Nord France, F-59000 Lille, France
[2] UArtois, CRIL UMR CNRS 8188, F-62300 Lens, France
[3] Univ Sci & Technol Houari Boumediene, Algiers, Algeria
关键词
Bayesian classifiers; Decision trees; Intrusion detection; Alert correlation Expert knowledge;
D O I
10.1007/s10489-012-0383-7
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Bayesian networks are important knowledge representation tools for handling uncertain pieces of information. The success of these models is strongly related to their capacity to represent and handle dependence relations. Some forms of Bayesian networks have been successfully applied in many classification tasks. In particular, naive Bayes classifiers have been used for intrusion detection and alerts correlation. This paper analyses the advantage of adding expert knowledge to probabilistic classifiers in the context of intrusion detection and alerts correlation. As examples of probabilistic classifiers, we will consider the well-known Naive Bayes, Tree Augmented Na < ve Bayes (TAN), Hidden Naive Bayes (HNB) and decision tree classifiers. Our approach can be applied for any classifier where the outcome is a probability distribution over a set of classes (or decisions). In particular, we study how additional expert knowledge such as "it is expected that 80 % of traffic will be normal" can be integrated in classification tasks. Our aim is to revise probabilistic classifiers' outputs in order to fit expert knowledge. Experimental results show that our approach improves existing results on different benchmarks from intrusion detection and alert correlation areas.
引用
收藏
页码:520 / 540
页数:21
相关论文
共 70 条
[1]   Bayesian forecaster using class-based optimization [J].
Ahn, Jae Joon ;
Byun, Hyun Woo ;
Oh, Kyong Joo ;
Kim, Tae Yoon .
APPLIED INTELLIGENCE, 2012, 36 (03) :553-563
[2]  
An XD, 2006, 2006 ICEC: EIGHTH INTERNATIONAL CONFERENCE ON ELECTRONIC COMMERCE, PROCEEDINGS, P208
[3]  
[Anonymous], 2002, Proceedings of the 9th ACM conference on Computer and communications security, CCS'02, DOI DOI 10.1145/586110.586144
[4]  
[Anonymous], THESIS STANFORD U
[5]  
[Anonymous], 1980, Computer Security Threat Monitoring and Surveillance
[6]  
[Anonymous], 1999, KDD CUP 99 INTR DET
[7]  
[Anonymous], 2005, P 21 C UNC ART INT
[8]  
[Anonymous], 2014, C4. 5: programs for machine learning
[9]  
[Anonymous], P CAN ART INT C
[10]  
[Anonymous], 1996, An introduction to Bayesian networks