An empirical study of two approaches to sequence learning for anomaly detection

被引:70
作者
Lane, T [1 ]
Brodley, CE
机构
[1] Univ New Mexico, Dept Comp Sci, Albuquerque, NM 87131 USA
[2] Purdue Univ, Sch Elect & Comp Engn, W Lafayette, IN 47907 USA
关键词
anomaly detection; application; instance-based learning; hidden Markov models; computer security;
D O I
10.1023/A:1021830128811
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This paper introduces the computer security domain of anomaly detection and formulates it as a machine learning task on temporal sequence data. In this domain, the goal is to develop a model or profile of the normal working state of a system user and to detect anomalous conditions as long-term deviations from the expected behavior patterns. We introduce two approaches to this problem: one employing instance-based learning (IBL) and the other using hidden Markov models (HMMs). Though not suitable for a comprehensive security solution, both approaches achieve anomaly identification performance sufficient for a low-level "focus of attention" detector in a multitier security system. Further, we evaluate model scaling techniques for the two approaches: two clustering techniques for the IBL approach and variation of the number of hidden states for the HMM approach. We find that over both model classes and a wide range of model scales, there is no significant difference in performance at recognizing the profiled user. We take this invariance as evidence that, in this security domain, limited memory models (e.g., fixed-length instances or low-order Markov models) can learn only part of the user identity information in which we're interested and that substantially different models will be necessary if dramatic improvements in user-based anomaly detection are to be achieved.
引用
收藏
页码:73 / 107
页数:35
相关论文
共 67 条
[1]   INSTANCE-BASED LEARNING ALGORITHMS [J].
AHA, DW ;
KIBLER, D ;
ALBERT, MK .
MACHINE LEARNING, 1991, 6 (01) :37-66
[2]  
Anderson J.P., 1980, Computer security threat monitoring and surveillance
[3]  
[Anonymous], P 1996 IEEE S SEC PR
[4]  
[Anonymous], P IJCAI 99 WORKSH LE
[5]  
[Anonymous], 1994, CSDTR94013 PURD U
[6]  
[Anonymous], ACM Trans. Inf. Syst. Secur, DOI DOI 10.1145/322510.322526
[7]  
[Anonymous], P 20 NAT INF SYST SE
[8]  
Aslam J. A., 1990, Proceedings of the Third Annual Workshop on Computational Learning Theory, P359
[9]  
BALASUBRAMANIYA.JS, 1998, 9805 COAST TR PURD U
[10]  
BOLLOBAS B, 1997, 13 ANN ACM S COMP GE