A fast host-based intrusion detection system using rough set theory

被引:0
|
作者
Rawat, S [1 ]
Gulati, VP
Pujari, AK
机构
[1] Univ Hyderabad, AI Lab, Dept Comp & Informat Sci, Hyderabad 500046, Andhra Pradesh, India
[2] IDRBT, Hyderabad 500057, Andhra Pradesh, India
来源
关键词
data mining; decision table; rough set; intrusion detection; anomaly; misuse;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Intrusion Detection system has become the main research focus in the area of information security. Last few years have witnessed a large variety of technique and model to provide increasingly efficient intrusion detection solutions. We advocate here that the intrusive behavior of a process is highly localized characteristics of the process. There are certain smaller episodes in a process that make the process intrusive in an otherwise normal stream. As a result it is unnecessary and most often misleading to consider the whole process in totality and to attempt to characterize its abnormal features. In the present work we establish that subsequences of reasonably small length of sequence of system calls would suffice to identify abnormality in a process. We make use of rough set theory to demonstrate this concept. Rough set theory also facilitates identifying rules for intrusion detection. The main contributions of the paper are the following- (a) It is established that very small subsequence of system call is sufficient to identify intrusive behavior with high accuracy. We demonstrate our result using DARPA'98 BSM data; (b) A rough set based system is developed that can extract rules for intrusion detection; (c) An algorithm is presented that can determine the status of a process as either normal or abnormal on-line.
引用
收藏
页码:144 / 161
页数:18
相关论文
共 50 条
  • [21] An Autonomous Host-Based Intrusion Detection System for Android Mobile Devices
    José Ribeiro
    Firooz B. Saghezchi
    Georgios Mantas
    Jonathan Rodriguez
    Simon J. Shepherd
    Raed A. Abd-Alhameed
    Mobile Networks and Applications, 2020, 25 : 164 - 172
  • [22] A new framework for intrusion detection based on rough set theory
    Li, ZJ
    Wu, Y
    Wang, GY
    Hai, YJ
    He, YP
    DATA MINING AND KNOWLEDGE DISCOVERY: THEORY, TOOLS, AND TECHNOLOGY VI, 2004, 5433 : 122 - 130
  • [23] ANOMALY INTRUSION DETECTION METHOD BASED ON ROUGH SET THEORY
    Li, Yong-Zhong
    Zhao, Bo
    Xu, Jing
    Yang, Ge
    PROCEEDINGS OF 2008 INTERNATIONAL CONFERENCE ON WAVELET ANALYSIS AND PATTERN RECOGNITION, VOLS 1 AND 2, 2008, : 764 - 770
  • [24] Host-based intrusion detection using self-organizing maps
    Lichodzijewski, P
    Zincir-Heywood, AN
    Heywood, MI
    PROCEEDING OF THE 2002 INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS, VOLS 1-3, 2002, : 1714 - 1719
  • [25] Host-based intrusion detection using dynamic and static behavioral models
    Yeung, DY
    Ding, YX
    PATTERN RECOGNITION, 2003, 36 (01) : 229 - 243
  • [26] A Unified Host-based Intrusion Detection Framework using Spark in Cloud
    Liu, Ming
    Xue, Zhi
    He, Xiangjian
    2020 IEEE 19TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2020), 2020, : 97 - 103
  • [27] DAHID: Domain Adaptive Host-based Intrusion Detection
    Ajayi, Oluwagbemiga
    Gangopadhyay, Aryya
    PROCEEDINGS OF THE 2021 IEEE INTERNATIONAL CONFERENCE ON CYBER SECURITY AND RESILIENCE (IEEE CSR), 2021, : 467 - 472
  • [28] Methods for Host-based Intrusion Detection with Deep Learning
    Ring J.H.
    Van Oort C.M.
    Durst S.
    White V.
    Near J.P.
    Skalka C.
    Digital Threats: Research and Practice, 2021, 2 (04):
  • [29] Multi-level host-based intrusion detection system for Internet of things
    Robin Gassais
    Naser Ezzati-Jivan
    Jose M. Fernandez
    Daniel Aloise
    Michel R. Dagenais
    Journal of Cloud Computing, 9
  • [30] A Behavioral Graph Model for Host-Based Intrusion Detection
    Cao, Zechun
    Huang, Shou-Hsuan Stephen
    JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2023, 18 (02): : 48 - 57