A fast host-based intrusion detection system using rough set theory

被引:0
|
作者
Rawat, S [1 ]
Gulati, VP
Pujari, AK
机构
[1] Univ Hyderabad, AI Lab, Dept Comp & Informat Sci, Hyderabad 500046, Andhra Pradesh, India
[2] IDRBT, Hyderabad 500057, Andhra Pradesh, India
来源
关键词
data mining; decision table; rough set; intrusion detection; anomaly; misuse;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Intrusion Detection system has become the main research focus in the area of information security. Last few years have witnessed a large variety of technique and model to provide increasingly efficient intrusion detection solutions. We advocate here that the intrusive behavior of a process is highly localized characteristics of the process. There are certain smaller episodes in a process that make the process intrusive in an otherwise normal stream. As a result it is unnecessary and most often misleading to consider the whole process in totality and to attempt to characterize its abnormal features. In the present work we establish that subsequences of reasonably small length of sequence of system calls would suffice to identify abnormality in a process. We make use of rough set theory to demonstrate this concept. Rough set theory also facilitates identifying rules for intrusion detection. The main contributions of the paper are the following- (a) It is established that very small subsequence of system call is sufficient to identify intrusive behavior with high accuracy. We demonstrate our result using DARPA'98 BSM data; (b) A rough set based system is developed that can extract rules for intrusion detection; (c) An algorithm is presented that can determine the status of a process as either normal or abnormal on-line.
引用
收藏
页码:144 / 161
页数:18
相关论文
共 50 条
  • [31] Feature Selection for Flow-based Intrusion Detection Using Rough Set Theory
    Beer, Frank
    Buehler, Ulrich
    PROCEEDINGS OF THE 2017 IEEE 14TH INTERNATIONAL CONFERENCE ON NETWORKING, SENSING AND CONTROL (ICNSC 2017), 2017, : 617 - 624
  • [32] Trust Management for Host-Based Collaborative Intrusion Detection
    Fung, Carol J.
    Baysal, Olga
    Zhang, Jie
    Aib, Issarn
    Boutaba, Raouf
    MANAGING LARGE-SCALE SERVICE DEPLOYMENT, PROCEEDINGS, 2008, 5273 : 109 - 122
  • [33] Sequence Covering for Efficient Host-Based Intrusion Detection
    Martea, Pierre-Francois
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2019, 14 (04) : 994 - 1006
  • [34] Host-based intrusion detection for advanced mobile devices
    Miettinen, Markus
    Halonen, Perttu
    Hatonen, Kimmo
    20TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOL 2, PROCEEDINGS, 2006, : 72 - 76
  • [35] Adaptive critic designs for host-based intrusion detection
    Draelos, T
    Duggan, D
    Collins, M
    Wunsch, D
    PROCEEDING OF THE 2002 INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS, VOLS 1-3, 2002, : 1720 - 1725
  • [36] Mobile host-based intrusion detection and attack identification
    Jacoby, Grant A.
    Davis, Nathaniel J., IV
    IEEE WIRELESS COMMUNICATIONS, 2007, 14 (04) : 53 - 60
  • [37] Motif-oriented representation of sequences for a host-based intrusion detection system
    Tandon, G
    Mitra, D
    Chan, PK
    INNOVATIONS IN APPLIED ARTIFICIAL INTELLIGENCE, 2004, 3029 : 605 - 615
  • [38] Host-based intrusion detection system for secure human-centric computing
    Daesung Moon
    Sung Bum Pan
    Ikkyun Kim
    The Journal of Supercomputing, 2016, 72 : 2520 - 2536
  • [39] Host-based intrusion detection system for secure human-centric computing
    Moon, Daesung
    Pan, Sung Bum
    Kim, Ikkyun
    JOURNAL OF SUPERCOMPUTING, 2016, 72 (07): : 2520 - 2536
  • [40] SEHIDS: Self Evolving Host-Based Intrusion Detection System for IoT Networks
    Baz, Mohammed
    SENSORS, 2022, 22 (17)