Intrusion detection applying machine learning to Solaris audit data

被引:47
作者
Endler, D [1 ]
机构
[1] Tulane Univ, Dept Elect Engn & Comp Sci, New Orleans, LA 70118 USA
来源
14TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS | 1998年
关键词
D O I
10.1109/CSAC.1998.738647
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
An intrusion Detection System (IDS) seeks to identify unauthorized access to computer systems' resources and data. The most common analysis tool that these modern systems apply is the operating system audit trail that provides a fingerprint of system events over time. In this research, the Basic Security Module auditing tool of Sun's Solaris operating environment was used in both an anomoly and misuse detection approach. The anomoly detector consisted of the statistical likelihood analysis of system calls, while the misuse detector was built with a neural network trained on groupings of system calls. This research demonstrates the potential benefits of combining both aspects of detection in future IDS's to decrease false positive and false negative errors.
引用
收藏
页码:268 / 279
页数:12
相关论文
共 22 条
[1]  
[Anonymous], 1996, PATTERN CLASSIFICATI
[2]  
[Anonymous], 1998, P 7 USENIX SEC S SAN
[3]  
DIETTERICH TG, 1986, MACHINE LEARNING ART
[4]  
FARMER D, 1996, SHALL WE DUST MOSCOW
[5]   A sense of self for unix processes [J].
Forrest, S ;
Hofmeyr, SA ;
Somayaji, A ;
Longstaff, TA .
1996 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 1996, :120-128
[6]  
FOX KL, 1990, P 13 NAT COMP SEC C, P125
[7]  
FRANK J, 1994, ARTIFICIAL INTELLIGE
[8]  
Hart P.E., 1973, Pattern recognition and scene analysis
[9]  
HEBERLIEN T, 1991, HAYSTACKS ANAL BRIEF
[10]  
HIRSH H, P 12 NAT C ART INT S, P639