A Multi-Order Markov Chain Based Scheme for Anomaly Detection

被引:11
|
作者
Sha, Wenyao [1 ]
Zhu, Yongxin [1 ]
Huang, Tian [1 ]
Qiu, Meikang [2 ]
Zhu, Yan [1 ]
Zhang, Qiannan [1 ]
机构
[1] Shanghai Jiao Tong Univ, Sch Microelect, Shanghai 200030, Peoples R China
[2] Univ Kentucky, Dept Elect & Comp Engn, Lexington, KY 40506 USA
关键词
Markov chain; Kth-order Markov chain; multivariate time series; anomaly detection; COMPUTER AUDIT DATA; INTRUSION-DETECTION; MODEL;
D O I
10.1109/COMPSACW.2013.12
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
This paper presents a feasible multi-order Markov chain based scheme for anomaly detection in server systems. In our approach, both the high-order Markov chain and multivariate time series are taken into account, along with the detailed design of training and testing algorithms. To evaluate its effectiveness, the Defense Advanced Research Projects Agency (DARPA) Intrusion Detection Evaluation Data Set is used as stimuli to our model, by which system calls and the corresponding return values form a two-dimensional input set. The calculation result shows that this approach is able to produce several effective indicators of anomalies. In addition to the absolute values given by an individual single-order model, we also notice a novelty unprecedented before, i.e., the changes in ranking positions of outputs from different-order ones also correlate closely with abnormal behaviours. Moreover, the analysis and application proves our approach's efficiency in consuming reasonable cost of time and storage.
引用
收藏
页码:83 / 88
页数:6
相关论文
共 50 条
  • [31] A Simple and Efficient Hidden Markov Model Scheme for Host-Based Anomaly Intrusion Detection
    Hu, Jiankun
    Yu, Xinghuo
    Qiu, D.
    Chen, Hsiao-Hwa
    IEEE NETWORK, 2009, 23 (01): : 42 - 47
  • [32] Anomaly subspace detection based on a multi-scale Markov random field model
    Goldman, A
    Cohen, I
    2004 23RD IEEE CONVENTION OF ELECTRICAL AND ELECTRONICS ENGINEERS IN ISRAEL, PROCEEDINGS, 2004, : 444 - 447
  • [33] Anomaly subspace detection based on a multi-scale Markov random field model
    Goldman, A
    Cohen, I
    SIGNAL PROCESSING, 2005, 85 (03) : 463 - 479
  • [34] Voice spoofing detection corpus for single and multi-order audio replays
    Baumann, Roland
    Malik, Khalid Mahmood
    Javed, Ali
    Ball, Andersen
    Kujawa, Brandon
    Malik, Hafiz
    COMPUTER SPEECH AND LANGUAGE, 2021, 65
  • [35] A Multi-Module Anomaly Detection Scheme based on System Call Prediction
    Xu, Zhenghua
    Yu, Xinghuo
    Feng, Yong
    Hu, Jiankun
    Tari, Zahir
    Han, Fengling
    PROCEEDINGS OF THE 2013 IEEE 8TH CONFERENCE ON INDUSTRIAL ELECTRONICS AND APPLICATIONS (ICIEA), 2013, : 1376 - 1381
  • [36] Multi-order feature interaction-aware intrusion detection scheme for ensuring cyber security of intelligent connected vehicles
    Gong W.
    Yang S.
    Guang H.
    Ma B.
    Zheng B.
    Shi Y.
    Li B.
    Cao Y.
    Engineering Applications of Artificial Intelligence, 2024, 135
  • [37] Markov Chain based anomaly detection for Wireless Ad Hoc Distribution Power Communication Networks
    Jiang, Hai
    Wang, Hankang
    IPEC: 2005 INTERNATIONAL POWER ENGINEERING CONFERENCE, VOLS 1 AND 2, 2005, : 246 - 249
  • [38] Fault detection using multi-order conditional probability density distribution
    Kumagai, S
    Takayama, J
    Ohyama, S
    Kobayashi, A
    SICE 2002: PROCEEDINGS OF THE 41ST SICE ANNUAL CONFERENCE, VOLS 1-5, 2002, : 2116 - 2119
  • [39] Image Quality Assessment Based on Multi-Order Visual Comparison
    Zhou, Fei
    Sun, Wen
    Liao, Qingmin
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2014, E97D (05): : 1379 - 1381
  • [40] Multi-view subspace clustering based on multi-order neighbor diffusion
    Long, Yin
    Xu, Hongbin
    Xiang, Yang
    Du, Xiyu
    Yang, Yanying
    Zhao, Xujian
    COMPLEX & INTELLIGENT SYSTEMS, 2024, 10 (05) : 7143 - 7161