A new Intrusion Detection method based on process profiling

被引:11
|
作者
Okazaki, Y [1 ]
Sato, I [1 ]
Goto, S [1 ]
机构
[1] Waseda Univ, Sch Sci & Engn, Shinjuku Ku, Tokyo 1698555, Japan
关键词
Intrusion Detection; IDS; AID; MID; profile; DP matching;
D O I
10.1109/SAINT.2002.994455
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
There have been two well-known models for intrusion detection. They are called Anomaly Intrusion Detection (AID) model and Misuse Intrusion Detection (MID) model. The former model analyzes user behavior and the statistics of a process in normal situation, and it checks whether the system is being used in a different manner. The latter model maintains database of known intrusion technique and detects intrusion by comparing a behavior against the database. An intrusion detection method based on an AID model can detect a new intrusion method. however it needs to update. the data describing users behavior and the statistics in normal usage, We call these information profiles, There are several problems in AID to be addressed. The profiles are tend to be large. Detecting intrusion needs a large amount of system resource, like CPU time and memory and disk space. An AND model requires less amount of system resource to detect intrusion. However it cannot detect new. unknown intrusion methods. Our method solves these problems by recording system calls from daemon processes and setuid programs. We improved detection accuracy by adopting a DP matching scheme.
引用
收藏
页码:82 / 90
页数:9
相关论文
共 50 条
  • [41] A new intrusion detection method based on SVM with minimum within-class scatter
    An, Wenjuan
    Liang, Mangui
    SECURITY AND COMMUNICATION NETWORKS, 2013, 6 (09) : 1064 - 1074
  • [42] A NEW INTRUSION DETECTION METHOD BASED ON FSM AND CACHE MEMORY IN AD HOC NETWORKS
    Jalali, Dina Sadat
    Shahrbanoonezhad, Alireza
    2011 IEEE INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND INTELLIGENCE SYSTEMS, 2011, : 413 - 417
  • [43] An intrusion detection method based on clustering multidimensional sets
    Zhong, Yong
    Qin, Xiao-Lin
    Lin, Dong-Mei
    PROCEEDINGS OF 2006 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2006, : 2799 - +
  • [44] Research on intrusion detection based on graph partitioning method
    Zhu, C. (cuiling_zhu@163.com), 1600, Binary Information Press, P.O. Box 162, Bethel, CT 06801-0162, United States (09):
  • [45] An Automata Based Intrusion Detection Method for Internet of Things
    Fu, Yulong
    Yan, Zheng
    Cao, Jin
    Kone, Ousmane
    Cao, Xuefei
    MOBILE INFORMATION SYSTEMS, 2017, 2017
  • [46] Intrusion detection method based on KFDA-SVM
    Wei, Yu-Xin
    Wu, Mu-Qing
    Beijing Youdian Daxue Xuebao/Journal of Beijing University of Posts and Telecommunications, 2007, 30 (SUPPL. 1): : 27 - 31
  • [47] Distributed intrusion detection method based on the diversity of immunity
    School of Electronics and Information Engineering, Xi'an Jiaotong University, Xi'an 710049, China
    不详
    不详
    Hsi An Chiao Tung Ta Hsueh, 2006, 10 (1052-1055):
  • [48] An Improved CNN for Intrusion Detection Method Based on ResNet
    Cai, Zengyu
    Li, Pengrong
    Zhang, Jianwei
    Si, Yajie
    Feng, Yuan
    International Journal of Network Security, 2024, 26 (04) : 694 - 702
  • [49] Intrusion detection method based on nonlinear correlation measure
    Ambusaidi, Mohammed A.
    Tan, Zhiyuan
    He, Xiangjian
    Nanda, Priyadarsi
    Lu, Liang Fu
    Jamdagni, Aruna
    INTERNATIONAL JOURNAL OF INTERNET PROTOCOL TECHNOLOGY, 2014, 8 (2-3) : 77 - 86
  • [50] Research on Intrusion Detection Method Based On Neural Network
    Xu Chi
    Chen Jin
    MEMS, NANO AND SMART SYSTEMS, PTS 1-6, 2012, 403-408 : 1479 - +