Comparison of Anomaly Detection Accuracy of Host-based Intrusion Detection Systems based on Different Machine Learning Algorithms

被引:0
作者
Shin, Yukyung [1 ]
Kim, Kangseok [1 ,2 ]
机构
[1] Ajou Univ, Dept Data Sci, Grad Sch, Suwon, South Korea
[2] Ajou Univ, Dept Cyber Secur, Suwon, South Korea
基金
新加坡国家研究基金会;
关键词
Anomaly detection; host based intrusion detection system; system calls; cyber security; machine learning; simulation; MODEL;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Among the different host-based intrusion detection systems, an anomaly-based intrusion detection system detects attacks based on deviations from normal behavior; however, such a system has a low detection rate. Therefore, several studies have been conducted to increase the accurate detection rate of anomaly-based intrusion detection systems; recently, some of these studies involved the development of intrusion detection models using machine learning algorithms to overcome the limitations of existing anomaly-based intrusion detection methodologies as well as signature-based intrusion detection methodologies. In a similar vein, in this study, we propose a method for improving the intrusion detection accuracy of anomaly-based intrusion detection systems by applying various machine learning algorithms for classification of normal and attack data. To verify the effectiveness of the proposed intrusion detection models, we use the ADFA Linux Dataset which consists of system call traces for attacks on the latest operating systems. Further, for verification, we develop models and perform simulations for host-based intrusion detection systems based on machine learning algorithms to detect and classify anomalies using the Arena simulation tool.
引用
收藏
页码:252 / 259
页数:8
相关论文
共 29 条
  • [1] Aghaei E., 2017, THESIS
  • [2] [Anonymous], 2014, THESIS U NEW S WALES
  • [3] Berger H., 2006, P ACM S APPL COMP DI
  • [4] Bhavsar Y.B, 2013, International Journal of Emerging Technology andAdvanced Engineering, V3, P581
  • [5] Borisaniya B., 2015, Journal of Information Security, V6, P250
  • [6] A model for evaluating IT security investments
    Cavusoglu, H
    Mishra, B
    Raghunathan, S
    [J]. COMMUNICATIONS OF THE ACM, 2004, 47 (07) : 87 - 92
  • [7] SMOTE: Synthetic minority over-sampling technique
    Chawla, Nitesh V.
    Bowyer, Kevin W.
    Hall, Lawrence O.
    Kegelmeyer, W. Philip
    [J]. 2002, American Association for Artificial Intelligence (16)
  • [8] A Semantic Approach to Host-Based Intrusion Detection Systems Using Contiguous and Discontiguous System Call Patterns
    Creech, Gideon
    Hu, Jiankun
    [J]. IEEE TRANSACTIONS ON COMPUTERS, 2014, 63 (04) : 807 - 819
  • [9] Creech G, 2013, 2013 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC), P4487
  • [10] An intelligent intrusion detection system (IDS) for anomaly and misuse detection in computer networks
    Depren, O
    Topallar, M
    Anarim, E
    Ciliz, MK
    [J]. EXPERT SYSTEMS WITH APPLICATIONS, 2005, 29 (04) : 713 - 722