A new Intrusion Detection method based on process profiling

被引:11
|
作者
Okazaki, Y [1 ]
Sato, I [1 ]
Goto, S [1 ]
机构
[1] Waseda Univ, Sch Sci & Engn, Shinjuku Ku, Tokyo 1698555, Japan
关键词
Intrusion Detection; IDS; AID; MID; profile; DP matching;
D O I
10.1109/SAINT.2002.994455
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
There have been two well-known models for intrusion detection. They are called Anomaly Intrusion Detection (AID) model and Misuse Intrusion Detection (MID) model. The former model analyzes user behavior and the statistics of a process in normal situation, and it checks whether the system is being used in a different manner. The latter model maintains database of known intrusion technique and detects intrusion by comparing a behavior against the database. An intrusion detection method based on an AID model can detect a new intrusion method. however it needs to update. the data describing users behavior and the statistics in normal usage, We call these information profiles, There are several problems in AID to be addressed. The profiles are tend to be large. Detecting intrusion needs a large amount of system resource, like CPU time and memory and disk space. An AND model requires less amount of system resource to detect intrusion. However it cannot detect new. unknown intrusion methods. Our method solves these problems by recording system calls from daemon processes and setuid programs. We improved detection accuracy by adopting a DP matching scheme.
引用
收藏
页码:82 / 90
页数:9
相关论文
共 50 条
  • [21] A new intrusion detection feature extraction method based on complex network theory
    Wu Heyi
    Hu Aiqun
    Song Yubo
    Bu Ning
    Jia Xuefei
    2012 FOURTH INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY (MINES 2012), 2012, : 852 - 856
  • [22] Anomaly intrusion detection method based on HMM
    Qiao, Y
    Xin, XW
    Bin, Y
    Ge, S
    ELECTRONICS LETTERS, 2002, 38 (13) : 663 - 664
  • [23] An intrusion detection method based on graph theory
    Bao, Zhen
    He, Di
    Shanghai Jiaotong Daxue Xuebao/Journal of Shanghai Jiaotong University, 2010, 44 (09): : 1176 - 1180
  • [24] An intrusion detection method based on SVM and KPCA
    Li, Yuan-Cheng
    Wang, Zhong-Qiang
    2007 INTERNATIONAL CONFERENCE ON WAVELET ANALYSIS AND PATTERN RECOGNITION, VOLS 1-4, PROCEEDINGS, 2007, : 1462 - 1466
  • [25] AN INTRUSION DETECTION METHOD BASED ON KICA AND SVM
    Li, Yuancheng
    Wang, Zhongqiang
    Ma, Yinglong
    2008 7TH WORLD CONGRESS ON INTELLIGENT CONTROL AND AUTOMATION, VOLS 1-23, 2008, : 2141 - 2144
  • [26] Intrusion Detection Method based on Frequent Pattern
    Yu, Jie
    Yao, GuoXiang
    Zhang, WeiWei
    ADVANCED RESEARCH ON INDUSTRY, INFORMATION SYSTEMS AND MATERIAL ENGINEERING, PTS 1-7, 2011, 204-210 : 1751 - 1754
  • [27] An intrusion detection method based on granular autoencoders
    Lin, Sihong
    Zhang, Kunbin
    Guan, Dun
    He, Linjie
    Chen, Yumin
    JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2023, 44 (05) : 8413 - 8424
  • [28] A Dynamic Resampling Based Intrusion Detection Method
    Zhao, Yaochi
    Yu, Dongyang
    Hu, Zhuhua
    ADVANCED INTELLIGENT COMPUTING TECHNOLOGY AND APPLICATIONS, ICIC 2023, PT I, 2023, 14086 : 454 - 465
  • [29] Method of Intrusion Detection System Based on SVM
    Jia, Yanru
    Peng, Jian
    PROGRESS IN INTELLIGENCE COMPUTATION AND APPLICATIONS, 2008, : 341 - 344
  • [30] Intrusion Detection Method based on Deep Learning
    Wu, Zhijun
    Liang, Cheng
    Li, Yuqi
    19TH IEEE INTERNATIONAL SYMPOSIUM ON PARALLEL AND DISTRIBUTED PROCESSING WITH APPLICATIONS (ISPA/BDCLOUD/SOCIALCOM/SUSTAINCOM 2021), 2021, : 445 - 452