A fast host-based intrusion detection system using rough set theory

被引:0
|
作者
Rawat, S [1 ]
Gulati, VP
Pujari, AK
机构
[1] Univ Hyderabad, AI Lab, Dept Comp & Informat Sci, Hyderabad 500046, Andhra Pradesh, India
[2] IDRBT, Hyderabad 500057, Andhra Pradesh, India
来源
关键词
data mining; decision table; rough set; intrusion detection; anomaly; misuse;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Intrusion Detection system has become the main research focus in the area of information security. Last few years have witnessed a large variety of technique and model to provide increasingly efficient intrusion detection solutions. We advocate here that the intrusive behavior of a process is highly localized characteristics of the process. There are certain smaller episodes in a process that make the process intrusive in an otherwise normal stream. As a result it is unnecessary and most often misleading to consider the whole process in totality and to attempt to characterize its abnormal features. In the present work we establish that subsequences of reasonably small length of sequence of system calls would suffice to identify abnormality in a process. We make use of rough set theory to demonstrate this concept. Rough set theory also facilitates identifying rules for intrusion detection. The main contributions of the paper are the following- (a) It is established that very small subsequence of system call is sufficient to identify intrusive behavior with high accuracy. We demonstrate our result using DARPA'98 BSM data; (b) A rough set based system is developed that can extract rules for intrusion detection; (c) An algorithm is presented that can determine the status of a process as either normal or abnormal on-line.
引用
下载
收藏
页码:144 / 161
页数:18
相关论文
共 50 条
  • [1] Host-based intrusion detection system using optimal representation
    Jung, YS
    Choi, YJ
    Park, N
    Kim, WN
    Hong, MP
    7TH WORLD MULTICONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL XIII, PROCEEDINGS: SYSTEMICS, CYBERNETICS AND INFORMATICS: TECHNOLOGIES AND APPLICATIONS, 2003, : 143 - 147
  • [2] AN INTRUSION DETECTION SYSTEM BASED ON EVIDENCE THEORY AND ROUGH SET THEORY
    Ye Qing Wu Xiaoping Zhang Changhong (College of Electronic Engineering
    Journal of Electronics(China), 2009, 26 (06) : 777 - 781
  • [3] A Novel Mechanism for Host-Based Intrusion Detection System
    Harshitha, Ch Gayathri
    Rao, M. Kameswara
    Kumar, P. Neelesh
    FIRST INTERNATIONAL CONFERENCE ON SUSTAINABLE TECHNOLOGIES FOR COMPUTATIONAL INTELLIGENCE, 2020, 1045 : 527 - 536
  • [4] The Design and Implementation of Host-based Intrusion Detection System
    Lin Ying
    Zhang Yan
    Ou Yang-Jia
    2010 THIRD INTERNATIONAL SYMPOSIUM ON INTELLIGENT INFORMATION TECHNOLOGY AND SECURITY INFORMATICS (IITSI 2010), 2010, : 595 - 598
  • [5] Host-Based Intrusion Detection Using Statistical Approaches
    Gautam, Sunil Kumar
    Om, Hari
    PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON FRONTIERS IN INTELLIGENT COMPUTING: THEORY AND APPLICATIONS (FICTA) 2015, 2016, 404 : 481 - 493
  • [6] Using Graph Representation in Host-Based Intrusion Detection
    Hu, Zhichao
    Liu, Likun
    Yu, Haining
    Yu, Xiangzhan
    SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [7] Application of rough set theory to intrusion detection system
    Wang, Xuren
    He, Famei
    Liu, Lizhen
    GRC: 2007 IEEE INTERNATIONAL CONFERENCE ON GRANULAR COMPUTING, PROCEEDINGS, 2007, : 562 - +
  • [8] Host-Based Intrusion Detection System for IoT using Convolutional Neural Networks
    Lightbody, Dominic
    Duc-Minh Ngo
    Temko, Andriy
    Murphy, Colin
    Popovici, Emanuel
    2022 33RD IRISH SIGNALS AND SYSTEMS CONFERENCE (ISSC), 2022,
  • [9] Host-based intrusion detection system: Model and design features
    Zegzhda, Pyotr
    Kort, Sernyon
    COMPUTER NETWORK SECURITY, PROCEEDINGS, 2007, 1 : 340 - +
  • [10] Implementation of a Host-based Intrusion Detection System for Avionic Applications
    Damien, Alienor
    Marcourt, Michael
    Nicomette, Vincent
    Alata, Eric
    Kaaniche, Mohamed
    2019 IEEE 24TH PACIFIC RIM INTERNATIONAL SYMPOSIUM ON DEPENDABLE COMPUTING (PRDC 2019), 2019, : 178 - 187