期刊文献+

基于系统调用的混合HMM/MLP异常检测模型 被引量:1

A Hybrid HMM/MLP Anomaly Detection Model Based on System Calls
下载PDF
导出
摘要 首先描述了基于隐马尔可夫模型(HMM)的异常检测方法并指出其缺点.然后提出了一种将多层感知机(MLP)用作HMM的概率估计器的方法,以克服HMM方法的不足.最后建立了一个基于系统调用的混合HMM/MLP异常检测模型,并给出了该模型的训练和检测算法.实验结果表明,该混合系统的漏报率和误报率都低于HMM方法. First,the anomaly detection method based on hidden Markov model(HMM) is described and its drawbacks are pointed out.Then,a method,which uses multilayer perceptron(MLP) as the probability estimator of hidden Markov model,is proposed to overcome the drawbacks of the HMM-based method.Finally,a new hybrid HMM/MLP anomaly detection model based on system calls is established,and its training and detection algorithms are presented.Experimental results show that the false negative rate and the false positive rate of the hybrid system are both lower than those of the HMM-based method.
出处 《信息与控制》 CSCD 北大核心 2008年第2期214-218,共5页 Information and Control
基金 北京市教育委员会科技发展计划资助项目(KM200610016012)
关键词 入侵检测 异常检测 隐马尔可夫模型(HMM) 神经网络 系统调用 多层感知机(MLP) intrusion detection anomaly detection hidden Markov model(HMM) neural network system call multilayer perceptron
  • 相关文献

参考文献10

  • 1Warrender C,Forrest S,Pearlmuter B.Detecting intrusions using system calls:Alternative data model[A].Proceedings of the 1999 IEEE Symposium on Security and Privary[C].Piscataway,NJ,USA:IEEE,1999.133-145.
  • 2Forrest S,Holmeyr S A,Somayaji A,et al.A seuse of sell for Unix processes[A].Proceedings of the 1996 IEEE Symposium on Security and Privary[C].Piscataway,NJ,USA:IEEE,1996.120-128.
  • 3Rabiner L R.A tutorial on biddeo Markov models and selected applications in speech recognition[J].Proceedings of the IEEE,1989, 77(2) : 257 -286.
  • 4Rabiner L R, Juang B H. An introduction to hidden Markov models [J]. IEEE ASSP Magazine, 1986, 3(1): 4-16.
  • 5Cho S B,Park H J.Efficient anomaly detection by modeling privilege flows using hidden Markov model[J].Computers and Security,2003,22(1):45-55.
  • 6Qiao Y,Xin X W,Bin Y,et al.Anomaly intrusion detection method based on HMM[J].Electronics Letters,2002,38(13):663-664.
  • 7谭小彬,王卫平,奚宏生,殷保群.计算机系统入侵检测的隐马尔可夫模型[J].计算机研究与发展,2003,40(2):245-250. 被引量:46
  • 8Bourlard H, Wellekens C J. Links between Markov models and multilayer perceptrons [ J ]. IEEE Transactions on Pattern Analysis and Machine Intelligence, 1990, 12(12) : 1167 - 1178.
  • 9Renals S, Morgan N, Burland H, et al. Connectionist probability estimators in HMM speech recognition [ J]. IEEE Transactions on Speech and Audio Processing, 1994, 2( 1 ) : 161 - 174.
  • 10Bose N K. Liang P. Neural Network Fundamentals with Graphs, Algorithms and Applications [ M]. Hightstown, NJ, USA: McGraw-Hill, 1995.

二级参考文献9

  • 1D E Denning. An intrusion detection model. IEEE Trans on Software Engineering, 1987, 13(2): 222~232
  • 2N Ye. A Markov chain model of temporal behavior for anomal detection. The 2000 IEEE Systems, Man, and Cybernetics Information Assurance and Security Workshop, West Point, NY, 2000
  • 3S Jha, K Tan, R Maxion. Markov chains, classifiers, and intrusion detection A. Computer Security Foundations Workshop, the 14th IEEE, Cape Breton, Novia Scotia, Canada, 2001
  • 4E Eskin, L Wenke, S J Stolfo. Modeling system calls for intrusion detection with dynamic window sizes. DARPA Information Survivability Conf & Exposition Ⅱ, Anaheim, California, 2001
  • 5C Warrender, S Forrest, B Pearlmutter. Detecting intrusion using system calls: Alternative data models. In: Proc of the 1999 IEEE Symposium on Security and Privacy. Oakland, California: IEEE Computer Society, 1999. 133~145
  • 6Y Qiao, X W Xin, Y Bin et al. Anomaly intrusion detection method based on HMM. Electronics Letters, 2002, 38(13): 663~664
  • 7L R Rabiner. A tutorial on hidden Markov models and selected applications in speech recognition. Proceedings of the IEEE, 1989, 77(2): 257~286
  • 8T F Lunt, A Tamaru, F Gilham, et al. IDES: A progress report. In: Proc of Annual Computer Security Applications Conf. Tuscon, Arizona: IEEE Computer Society Press, 1990. 273~285
  • 9S Forrest, S A Hofmeyr, A Somayaji et al. A sense of self for Unix processes. In: Proc of the 1996 IEEE Symp on Security and Privacy. Orkland California: IEEE Computer Society Press, 1996. 120~128

共引文献45

同被引文献10

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部