期刊文献+

Intrusion detection based on system calls and homogeneous Markov chains 被引量:8

Intrusion detection based on system calls and homogeneous Markov chains
下载PDF
导出
摘要 A novel method for detecting anomalous program behavior is presented, which is applicable to hostbased intrusion detection systems that monitor system call activities. The method constructs a homogeneous Markov chain model to characterize the normal behavior of a privileged program, and associates the states of the Markov chain with the unique system calls in the training data. At the detection stage, the probabilities that the Markov chain model supports the system call sequences generated by the program are computed. A low probability indicates an anomalous sequence that may result from intrusive activities. Then a decision rule based on the number of anomalous sequences in a locality frame is adopted to classify the program's behavior. The method gives attention to both computational efficiency and detection accuracy, and is especially suitable for on-line detection. It has been applied to practical host-based intrusion detection systems. A novel method for detecting anomalous program behavior is presented, which is applicable to hostbased intrusion detection systems that monitor system call activities. The method constructs a homogeneous Markov chain model to characterize the normal behavior of a privileged program, and associates the states of the Markov chain with the unique system calls in the training data. At the detection stage, the probabilities that the Markov chain model supports the system call sequences generated by the program are computed. A low probability indicates an anomalous sequence that may result from intrusive activities. Then a decision rule based on the number of anomalous sequences in a locality frame is adopted to classify the program's behavior. The method gives attention to both computational efficiency and detection accuracy, and is especially suitable for on-line detection. It has been applied to practical host-based intrusion detection systems.
出处 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2008年第3期598-605,共8页 系统工程与电子技术(英文版)
基金 the National Grand Fundamental Research "973" Program of China (2004CB318109) the High-Technology Research and Development Plan of China (863-307-7-5) the National Information Security 242 Program ofChina (2005C39).
关键词 intrusion detection Markov chain anomaly detection system call. intrusion detection, Markov chain, anomaly detection, system call.
  • 相关文献

参考文献16

  • 1Yan Q, Xie W X, Yang B. An anomaly intrusion detection method based on HMM. Electronics Letters, 2002, 38 (13): 663-664.
  • 2Lane T, Carla E B. An empirical study of two approaches to sequence learning for anomaly detection. Machine Learning, 2003, 51(1): 73-107.
  • 3Lane T. Machine learning techniques for the computer security domain of anomaly detection. Purdue University, 2000.
  • 4Mukkamala S, Sung A H, Abraham A. Intrusion detection using an ensemble of intelligent paradigms. Journal of Network and Computer Application, 2005, 28(2):167-182.
  • 5Hofmeyr S A, Forrest S, Somayaji A. Intrusion detection using sequences of system calls. Journal of Computer Security, 1998(6):151-180.
  • 6Maxion R A, Townsend T N. Masquerade detection using truncated command lines. Prec. of International Conference on Dependable Systems and Networks, Washington, DC, USA, 2002: 219-228.
  • 7Sehonlau M, DuMouchel W. Computer intrusion: detecting masquerades. Statistical Science, 2001, 16(1):58-74.
  • 8Warrender C, Forrest S, Pearlmutter B. Detecting intrusions using system calls: alternative data models. Proc.of the IEEE Symposium on Security and Privacy, Berkely, USA: IEEE Computer Society, 1999: 133-145.
  • 9Oh S H, Lee W. A clustering-based anomaly intrusion detection for a host computer. IEICE Trans. on Information and Systems, 2004, 87(8):2086-2094.
  • 10Verwoerd T, Hunt R. Intrusion detection techniques and approaches.Computer Communication, 2002, 25(15):1356- 1365.

同被引文献75

引证文献8

二级引证文献33

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部