Fast intrusion detection based on a non-negative matrix factorization model

被引:34
作者
Guan, Xiaohong [1 ,2 ,3 ]
Wang, Wei [1 ,2 ]
Zhang, Xiangliang [1 ,2 ]
机构
[1] Xi An Jiao Tong Univ, MOE Key Lab Intelligent Networks & Network Secur, Xian 710049, Peoples R China
[2] Xi An Jiao Tong Univ, SKLMS, Xian 710049, Peoples R China
[3] Tsinghua Univ, TNLIST Lab, Ctr Intelligent & Networked Syst, Beijing 100084, Peoples R China
关键词
Computer security; Intrusion detection system; Anomaly detection; Non-negative matrix factorization; AUDIT DATA; MASQUERADES;
D O I
10.1016/j.jnca.2008.04.006
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we present an efficient fast anomaly intrusion detection model incorporating a large amount of data from various data sources. A novel method based on non-negative matrix factorization (NMF) is presented to profile program and user behaviors of a computer system. A large amount of high-dimensional data is collected in our experiments and divided into smaller data blocks by a specific scheme. The system call data is divided into blocks by processes, while command data is divided into consecutive blocks with a fixed length. The frequencies of individual elements in each block of data are computed and placed column by column as data vectors to construct a matrix representation. NMF is employed to reduce the high-dimensional data vectors and anomaly detection can be realized as a very simple classifier in low dimensions. Experimental results show that the model presented in this paper is promising in terms of detection accuracy, computation efficiency and implementation for fast intrusion detection. (C) 2008 Elsevier Ltd. All rights reserved.
引用
收藏
页码:31 / 44
页数:14
相关论文
共 31 条
[1]  
[Anonymous], 1995, SRICSL9507
[2]  
[Anonymous], 1996, MATRIX COMPUTATION
[3]   A rough set theory based method for anomaly intrusion detection in computer network systems [J].
Cai, ZM ;
Guan, XH ;
Shao, P ;
Peng, QK ;
Sun, GJ .
EXPERT SYSTEMS, 2003, 20 (05) :251-259
[4]  
*CERT, CERT ADV CA 2001 07
[5]   Efficient anomaly detection by modeling privilege flows using hidden Markov model [J].
Cho, SB ;
Park, HJ .
COMPUTERS & SECURITY, 2003, 22 (01) :45-55
[6]   AN INTRUSION-DETECTION MODEL [J].
DENNING, DE .
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 1987, 13 (02) :222-232
[7]  
Duda RO., 2004, Pattern Classification, V2nd
[8]   Predicting the intrusion intentions by observing system call sequences [J].
Feng, L ;
Guan, XH ;
Guo, SG ;
Gao, Y ;
Liu, PN .
COMPUTERS & SECURITY, 2004, 23 (03) :241-252
[9]   A sense of self for unix processes [J].
Forrest, S ;
Hofmeyr, SA ;
Somayaji, A ;
Longstaff, TA .
1996 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 1996, :120-128
[10]  
HU WJ, 2003, P 2003 INT C MACH LE