A fast host-based intrusion detection system using rough set theory

被引:0
|
作者
Rawat, S [1 ]
Gulati, VP
Pujari, AK
机构
[1] Univ Hyderabad, AI Lab, Dept Comp & Informat Sci, Hyderabad 500046, Andhra Pradesh, India
[2] IDRBT, Hyderabad 500057, Andhra Pradesh, India
来源
关键词
data mining; decision table; rough set; intrusion detection; anomaly; misuse;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Intrusion Detection system has become the main research focus in the area of information security. Last few years have witnessed a large variety of technique and model to provide increasingly efficient intrusion detection solutions. We advocate here that the intrusive behavior of a process is highly localized characteristics of the process. There are certain smaller episodes in a process that make the process intrusive in an otherwise normal stream. As a result it is unnecessary and most often misleading to consider the whole process in totality and to attempt to characterize its abnormal features. In the present work we establish that subsequences of reasonably small length of sequence of system calls would suffice to identify abnormality in a process. We make use of rough set theory to demonstrate this concept. Rough set theory also facilitates identifying rules for intrusion detection. The main contributions of the paper are the following- (a) It is established that very small subsequence of system call is sufficient to identify intrusive behavior with high accuracy. We demonstrate our result using DARPA'98 BSM data; (b) A rough set based system is developed that can extract rules for intrusion detection; (c) An algorithm is presented that can determine the status of a process as either normal or abnormal on-line.
引用
收藏
页码:144 / 161
页数:18
相关论文
共 50 条
  • [41] HIDROID: Prototyping a Behavioral Host-Based Intrusion Detection and Prevention System for Android
    Ribeiro, Jose
    Saghezchi, Firooz B.
    Mantas, Georgios
    Rodriguez, Jonathan
    Abd-Alhameed, Raed A.
    IEEE ACCESS, 2020, 8 : 23154 - 23168
  • [42] Multi-level host-based intrusion detection system for Internet of things
    Gassais, Robin
    Ezzati-Jivan, Naser
    Fernandez, Jose M.
    Aloise, Daniel
    Dagenais, Michel R.
    JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS, 2020, 9 (01):
  • [43] Rough Set Theory based Hybrid Method for Network Intrusion Detection
    Jiao, Na
    MECHATRONICS, ROBOTICS AND AUTOMATION, PTS 1-3, 2013, 373-375 : 815 - 818
  • [44] A Modern Implementation of System Call Sequence Based Host-based Intrusion Detection Systems
    Byrnes, Jeffrey
    Hoang, Thomas
    Mehta, Nihal Nitin
    Cheng, Yuan
    2020 SECOND IEEE INTERNATIONAL CONFERENCE ON TRUST, PRIVACY AND SECURITY IN INTELLIGENT SYSTEMS AND APPLICATIONS (TPS-ISA 2020), 2020, : 218 - 225
  • [45] Anomaly Generation Using Generative Adversarial Networks in Host-Based Intrusion Detection
    Salem, Milad
    Taheri, Shayan
    Yuan, Jiann Shiun
    2018 9TH IEEE ANNUAL UBIQUITOUS COMPUTING, ELECTRONICS & MOBILE COMMUNICATION CONFERENCE (UEMCON), 2018, : 683 - 687
  • [46] A Semantic Approach to Host-Based Intrusion Detection Systems Using Contiguous and Discontiguous System Call Patterns
    Creech, Gideon
    Hu, Jiankun
    IEEE TRANSACTIONS ON COMPUTERS, 2014, 63 (04) : 807 - 819
  • [47] A Systematic Literature Review on Host-Based Intrusion Detection Systems
    Satilmis, Hami
    Akleylek, Sedat
    Tok, Zaliha Yuce
    IEEE ACCESS, 2024, 12 : 27237 - 27266
  • [48] Intrusion detection using rough set classification
    Zhang L.-H.
    Zhang G.-H.
    Yu L.
    Zhang J.
    Bai Y.-C.
    Journal of Zhejiang University-SCIENCE A, 2004, 5 (9): : 1076 - 1086
  • [49] Intrusion detection using rough set classification
    张连华
    张冠华
    郁郎
    张洁
    白英彩
    Journal of Zhejiang University-Science A(Applied Physics & Engineering), 2004, (09) : 70 - 80
  • [50] The architecture of host-based intrusion detection model generation system for the frequency per system call
    Paek, Seung-Hyun
    Oh, Yoon-Keun
    Yun, JooBeom
    Lee, Do-Hoon
    2006 INTERNATIONAL CONFERENCE ON HYBRID INFORMATION TECHNOLOGY, VOL 2, PROCEEDINGS, 2006, : 277 - 283