A Fast Host-Based Intrusion Detection System Using Rough Set Theory

作者: Sanjay Rawat , V. P. Gulati , Arun K. Pujari

DOI: 10.1007/11574798_8

关键词:

摘要: Intrusion Detection system has become the main research focus in area of information security. Last few years have witnessed a large variety technique and model to provide increasingly efficient intrusion detection solutions. We advocate here that intrusive behavior process is highly localized characteristics process. There are certain smaller episodes make an otherwise normal stream. As result it unnecessary most often misleading consider whole totality attempt characterize its abnormal features. In present work we establish subsequences reasonably small length sequence calls would suffice identify abnormality use rough set theory demonstrate this concept. Rough also facilitates identifying rules for detection. The contributions paper following- (a) It established very subsequence call sufficient with high accuracy. our using DARPA'98 BSM data; (b) A based developed can extract detection; (c) An algorithm presented determine status as either or on-line.

参考文章(36)
Eugene H. Spafford, Sandeep Kumar, A pattern-matching model for intrusion detection ,(1994)
Jan G. Bazan, Hung Son Nguyen, Sinh Hoa Nguyen, Piotr Synak, Jakub Wróblewski, Rough set algorithms in classification problem Rough set methods and applications. pp. 49- 88 ,(2000) , 10.1007/978-3-7908-1840-6_3
Phil Porras, STAT -- A State Transition Analysis Tool For Intrusion Detection University of California at Santa Barbara. ,(1993)
Jan G. Bazan, Marcin S. Szczuka, Jakub Wróblewski, A New Version of Rough Set Exploration System Lecture Notes in Computer Science. ,vol. 2475, pp. 397- 404 ,(2002) , 10.1007/3-540-45813-1_52
Wenke Lee, Salvatore J. Stolfo, Data mining approaches for intrusion detection usenix security symposium. pp. 6- 6 ,(1998) , 10.21236/ADA401496
Jason Gagnon, Sushil Jajodia, Ravi Mukkamala, Integrating Data Mining Techniques with Intrusion Detection Methods Proceedings of the IFIP WG 11.3 Thirteenth International Conference on Database Security: Research Advances in Database and Information Systems Security. pp. 33- 46 ,(1999) , 10.1007/978-0-387-35508-5_3
Richard A. Kemmerer, NSTAT: A Model-based Real-time Network Intrusion Detection System University of California at Santa Barbara. ,(1998)