Intrusion detection model of host system call sequence based on neighbor algorithm

被引:0
作者
Wang, Z [1 ]
Peng, XG [1 ]
机构
[1] Taiyuan Univ Technol, Dept Comp Sci & Technol, Taiyuan 030024, Peoples R China
来源
ISTM/2005: 6TH INTERNATIONAL SYMPOSIUM ON TEST AND MEASUREMENT, VOLS 1-9, CONFERENCE PROCEEDINGS | 2005年
关键词
relationship of neighbor; intrusion detection; paltry sequence; symbol sequence;
D O I
暂无
中图分类号
TH7 [仪器、仪表];
学科分类号
0804 ; 080401 ; 081102 ;
摘要
The Enumerating Sequences Model, one of the intrusion detection model based on host system call sequences, strictly separated the short sequence data to be detected into normal and abnormal classes. Without considering the impurity and incompletion of the training data set for constructing model, the model before did not care of the instability of the sequences appearing in normal training data set with low frequency. In order to avoid the influence of the blemish data in normal training data set on the intrusion detection model, this paper separate the training data set into three classes as the normal abnormal and paltry data, which is based on the analysis of the host system call short sequence data set. The, perturbation of the sequence is redefined, and a model mixed anomaly detection and misuse detection system is constructed. The relationship among short sequences listed by time was studied to enhance the ability of model detection and neighbor algorithm was provided to decide the property of the user's behavior with the granularity of labeled sequences. The experiment of Enumerating Sequences Model and Data Mining Model were repeated, and, as the result showing, the mixed model can enhance the ability of intrusion detection efficiently on the same training data set. The character of abnormal behavior is more prominence. The abnormal degrees of knowing and unknowing attacking are all having a better performance, and the generalization ability of the model is improved.
引用
收藏
页码:519 / 522
页数:4
相关论文
共 4 条
[1]   A sense of self for unix processes [J].
Forrest, S ;
Hofmeyr, SA ;
Somayaji, A ;
Longstaff, TA .
1996 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 1996, :120-128
[2]  
Lee W, 1998, PROCEEDINGS OF THE SEVENTH USENIX SECURITY SYMPOSIUM, P79
[3]   A data mining framework for building intrusion detection models [J].
Lee, W ;
Stolfo, SJ ;
Mok, KW .
PROCEEDINGS OF THE 1999 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, 1999, :120-132
[4]   Detecting intrusions using system calls: Alternative data models [J].
Warrender, C ;
Forrest, S ;
Pearlmutter, B .
PROCEEDINGS OF THE 1999 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, 1999, :133-145