期刊文献+

Classification Model with High Deviation for Intrusion Detection on System Call Traces

Classification Model with High Deviation for Intrusion Detection on System Call Traces
下载PDF
导出
摘要 A new classification model for host intrusion detection based on the unidentified short sequences and RIPPER algorithm is proposed. The concepts of different short sequences on the system call traces are strictly defined on the basis of in-depth analysis of completeness and correctness of pattern databases. Labels of short sequences are predicted by learned RIPPER rule set and the nature of the unidentified short sequences is confirmed by statistical method. Experiment results indicate that the classification model increases clearly the deviation between the attack and the normal traces and improves detection capability against known and unknown attacks. A new classification model for host intrusion detection based on the unidentified short sequences and RIPPER algorithm is proposed. The concepts of different short sequences on the system call traces are strictly defined on the basis of in-depth analysis of completeness and correctness of pattern databases. Labels of short sequences are predicted by learned RIPPER rule set and the nature of the unidentified short sequences is confirmed by statistical method. Experiment results indicate that the classification model increases clearly the deviation between the attack and the normal traces and improves detection capability against known and unknown attacks.
出处 《Journal of Beijing Institute of Technology》 EI CAS 2005年第3期260-263,共4页 北京理工大学学报(英文版)
关键词 network security intrusion detection system calls unidentified sequences classification model network security intrusion detection system calls unidentified sequences classification model
  • 相关文献

参考文献4

二级参考文献24

  • 1[1]Crosbie M, Spafford E. Defending a computer system using autonomous agents. In: Proceedings of the 18th National Information Systems Security Conference,Baltiore,MD, 1995. 549~558
  • 2[2]Lee W, Stolfo S J. Data mining approaches for intrusion detection. In: Proceedings of the 7th USENIX Security Symposium, Berkeley, 1998.26~29
  • 3[3]Frank J. Artificial intelligence and intrusion detection: Current and future directions. In: Proceedings of the 17th National Computer Security Conference, Washington, DC, 1994. 23~33
  • 4[4]Sobirey M, Richter B, Konig H. The intrusion detection system AID-architecture and experiences in automated audit analysis. In: Proceedings of IFIP TC6/TC11 International Conference on Communications and Multimedia Security at Essen,Germany, 1996. 278~290
  • 5[5]King R L, Russ S H, Lambert A B et al. An artificial immune system model for intelligent agents. Future Generation Computer Systems, 2001,17:335~343
  • 6[6]Dasgupta D, Forrest S. Artificial immune systems in industrial applications. In: Proceedings of the 2nd International Conference on Intelligent Processing and Manufacturing of Materials (IPMM), Honolulu, 1999. http://www. cs. unm. edu/~forrest/publications/dasgupta. pdf
  • 7[7]Oprea M, Forrest S. How the immune system generates diversity: Pathogen space coverage with random and evolved antibody libraries. In: Proceedings of 1999 Genetic and Evolutionary Computation Conference, Orlando, FL, 1999. 1651~1656
  • 8[8]Forrest S et al. Computer immunology. Communications of the ACM, 1997, 40(10):88~96
  • 9[9]Hofmeyr S A, Forrest S. Immunity by design: An artificial immune system. In: Proceedings of 1999 GECCO Conference, San Francisco, 1999. 1289~1296
  • 10[10]Percus J K, Percus O E, Perelson A S. Predicting the size of the antibody-combining region from consideration of efficient self/nonself discrimination. In: Proceedings of the National Academy of Science 90, Washington,DC, 1993. 1691~1695

共引文献162

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部