Neural network techniques for host anomaly intrusion detection using fixed pattern transformation

作者: ByungRae Cha , KyungWoo Park , JaeHyun Seo

DOI: 10.1007/11424826_27

关键词:

摘要: The weak foundation of the computing environment caused information leakage and hacking to be uncontrollable. Therefore, dynamic control security threats real-time reaction identical or similar types accidents after intrusion are considered important. As one solutions solve problem, studies on detection systems actively being conducted. To improve anomaly system using calls, this study focuses techniques neural networks fuzzy membership function Soundex algorithm which is designed change feature selection variable length data into a fixed learning pattern. That is, by changing sequential call behavior pattern algorithm, conducted back-propagation function. proposed method N-gram technique applied for calls Sendmail UNM demonstrate its performance.

参考文章(9)
J. Marin, D. Ragsdale, J. Sirdu, A hybrid approach to the profile creation and intrusion detection darpa information survivability conference and exposition. ,vol. 1, pp. 69- 76 ,(2001) , 10.1109/DISCEX.2001.932193
Christopher M. Bishop, Neural networks for pattern recognition ,(1995)
Steven A. Hofmeyr, Stephanie Forrest, Anil Somayaji, Intrusion detection using sequences of system calls Journal of Computer Security. ,vol. 6, pp. 151- 180 ,(1998) , 10.3233/JCS-980109
Matthew V. Mahoney, Philip K. Chan, Learning nonstationary models of normal network traffic for detecting novel attacks Proceedings of the eighth ACM SIGKDD international conference on Knowledge discovery and data mining - KDD '02. pp. 376- 385 ,(2002) , 10.1145/775047.775102
C. Warrender, S. Forrest, B. Pearlmutter, Detecting intrusions using system calls: alternative data models ieee symposium on security and privacy. pp. 133- 145 ,(1999) , 10.1109/SECPRI.1999.766910
Andreas Wespi, Marc Dacier, Hervé Debar, Intrusion Detection Using Variable-Length Audit Trail Patterns recent advances in intrusion detection. pp. 110- 129 ,(2000) , 10.1007/3-540-39945-3_8
Wenke Lee, S.J. Stolfo, P.K. Chan, E. Eskin, Wei Fan, M. Miller, S. Hershkop, Junxin Zhang, Real time data mining-based intrusion detection darpa information survivability conference and exposition. ,vol. 1, pp. 89- 100 ,(2001) , 10.1109/DISCEX.2001.932195
S. Forrest, S.A. Hofmeyr, A. Somayaji, T.A. Longstaff, A Sense of Self for Unix Processes Scientific Programming. ,(1996) , 10.1109/SECPRI.1996.502675