The feature selection and intrusion detection problems

作者: Andrew H. Sung , Srinivas Mukkamala

DOI: 10.1007/978-3-540-30502-6_34

关键词:

摘要: Cyber security is a serious global concern. The potential of cyber terrorism has posed threat to national security; meanwhile the increasing prevalence malware and incidents attacks hinder utilization Internet its greatest benefit incur significant economic losses individuals, enterprises, public organizations. This paper presents some recent advances in intrusion detection, feature selection, detection. In stealthy low profile that include only few carefully crafted packets over an extended period time delude firewalls detection system (IDS) have been difficult detect. In protection against (trojans, worms, viruses, etc.), how detect polymorphic metamorphic versions recognized using static scanners great challenge. We present this agent based IDS architecture capable detecting probe at originating host denial service (DoS) boundary controllers. We investigate compare performance different classifiers implemented for purposes. Further, we study real-time probes DoS attacks, with respect data collected on real operating network includes variety simulated attacks. Feature selection as important it many other modeling problems. several techniques their application. It demonstrated that, appropriately chosen features, both can be detected or near controllers. We also briefly encouraging results advanced static, signature-based scanning techniques.

参考文章(20)
Andrew H. Sung, Srinivas Mukkamala, Identifying Significant Features for Network Forensic Analysis Using Artificial Intelligence Techniques. International Journal of Digital Evidence. ,vol. 1, ,(2003)
Seth E. Webster, The development and analysis of intrusion detection algorithms Massachusetts Institute of Technology. ,(1998)
A.H. Sung, J. Xu, P. Chavez, S. Mukkamala, Static analyzer of vicious executables (SAVE) annual computer security applications conference. pp. 326- 334 ,(2004) , 10.1109/CSAC.2004.37
Srinivas Mukkamala, Andrew H Sung, Ajith Abraham, None, Distributed multi-intelligent agent framework for detection of stealthy probes hybrid intelligent systems. pp. 779- 788 ,(2003)
Thorsten Joachims, Making large scale SVM learning practical Technical reports. ,(1999) , 10.17877/DE290R-14262
Nello Cristianini, J Shawe-Taylor, An introduction to Support Vector Machines Cambridge University Press (2000). ,(2000)
Stuart Staniford, James A. Hoagland, Joseph M. McAlerney, Practical automated detection of stealthy portscans Journal of Computer Security. ,vol. 10, pp. 105- 136 ,(2002) , 10.3233/JCS-2002-101-205
Sandeep Kumar, Eugene H Spafford, None, An Application of Pattern Matching in Intrusion Detection ,(1994)