Welcome to Journal of Beijing Institute of Technology
Volume 14Issue 3
.
Turn off MathJax
Article Contents
PENG Xin-guang, LIU Yu-shu, WU Yu-shu, YANG Yong. Classification Model with High Deviation for Intrusion Detection on System Call Traces[J]. JOURNAL OF BEIJING INSTITUTE OF TECHNOLOGY, 2005, 14(3): 260-263.
Citation: PENG Xin-guang, LIU Yu-shu, WU Yu-shu, YANG Yong. Classification Model with High Deviation for Intrusion Detection on System Call Traces[J].JOURNAL OF BEIJING INSTITUTE OF TECHNOLOGY, 2005, 14(3): 260-263.

Classification Model with High Deviation for Intrusion Detection on System Call Traces

  • Received Date:2004-01-08
  • A new classification model for host intrusion detection based on the unidentified short sequences and RIPPER algorithm is proposed. The concepts of different short sequences on the system call traces are strictly defined on the basis of in-depth analysis of completeness and correctness of pattern databases. Labels of short sequences are predicted by learned RIPPER rule set and the nature of the unidentified short sequences is confirmed by statistical method. Experiment results indicate that the classification model increases clearly the deviation between the attack and the normal traces and improves detection capability against known and unknown attacks.
  • loading
  • [1]
    Warrender C,For rest S,Pearlmutter B.Detecting intr usio ns using system calls:A lternativ e data models[A] .G ong L,R eiter M K.Proceedings of the 1999 I EEESymposium on Security and Privacy[C] .Oakland,CA:IEEE Computer Society Pr ess,1999.133-145.
    [2]
    L ee W,Stolfo S,M ok K W.Data mining framework forbuilding intrusio n detect ion model[A] .G ong L,ReiterM K.Pr oceedings o f the 2001 IEEE Symposium on Security and Pr ivacy[C] .Oakland,CA:IEEE ComputerSociety Press,1999.120-132.
    [3]
    Peng Xinguang,M i Wentao,L iu Yushu,et al.Detection engine based on host system calls for distr ibuted intrusion detection system[A] .W en T D.Proceedings oft he 5t h Internatio nal Symposium on T est and M easurement[C] .Shenzhen:I nternat ional Academic Publisher,2003.4858-4861.(in Chinese)
    [4]
    Zhang Ku,Xu M anwu,Zhang Hong,et al.An intrusiondetection method(RHDID)based on relative hammingdistance[J] .Journal of Computers,2003,26(1):65-70.(in Chinese)
    [5]
    R ao Xian,Dong Chunx i,Yang Shaoquan.An intrusiondetection system based on support vecto r machine[J] .Journal of Softw ar e,2003,14(4):798-803.(in Chinese)
    [6]
    Y e N ong,Emr an Sy ed M asum,Cheng Q iang,et al.M ultivariate statistical analysis of audit trails fo r hostbased intr usion detection[J] .IEEE T r ansactions onComputers,2002,51(7):810-819.
    [7]
    L i X iaojian,Huang Yong,Huang Houkuan.A n computing immune model based on po isson pr ocedure and roughinclusion[J] .Journal of Computers,2003,26(1):71-76.(in Chinese)
    [8]
    Su Purui,L i Dequan,F eng Dengg uo.A host basedanomaly intrusion detect ion model based on genetic progr amming[J] .Journal of Softw are,2003,14(6):1120-1126.(in Chinese)
  • 加载中

Catalog

    通讯作者:陈斌, bchen63@163.com
    • 1.

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (185) PDF downloads(0) Cited by()
    Proportional views
    Related

    /

      Return
      Return
        Baidu
        map