An anomaly intrusion detection Based on Hidden Markov model System Call Sequenc

被引:0
|
作者
Wang, Dongliang [1 ]
Wang, Zhigang [2 ]
机构
[1] Beijing Univ Civil Engn & Architecture, Network Ctr, Beijing, Peoples R China
[2] CNPC Beijing Richfit Informat Technol Co, Beijing, Peoples R China
关键词
Intrusion detection; Hidden Markov model; BW; system call;
D O I
10.4028/www.scientific.net/AMR.225-226.609
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
To improve detection accuracy, Utilizing HMM (Hidden Markov model) and BW to building model, the detection accuracy improves greatly. First, the research progress of intrusion detection is recalled, then the model based on Markov and BW is presented. An example of using system call trace data which is used in intrusion detection, is given to illustrate the performance of this model. Finally, comparison of detection ability between the above detection method and others is given. It is found that the IDS based on HMM System Call sequence has improve the accuracy greatly.
引用
收藏
页码:609 / +
页数:2
相关论文
共 50 条
  • [21] A Hidden Markov Model Combined With Markov Games for Intrusion Detection in Cloud
    Narwal, Priti
    Kumar, Deepak
    Singh, Shailendra N.
    [J]. JOURNAL OF CASES ON INFORMATION TECHNOLOGY, 2019, 21 (04) : 14 - 26
  • [22] Anomaly Based Host Intrusion Detection System Using Semantic Based System Call Patterns
    Anandapriya, M.
    Lakshmanan, B.
    [J]. PROCEEDINGS OF 2015 IEEE 9TH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS AND CONTROL (ISCO), 2015,
  • [23] Hidden Markov Anomaly Detection
    Goerntiz, Nico
    Braun, Mikio
    Kloft, Marius
    [J]. INTERNATIONAL CONFERENCE ON MACHINE LEARNING, VOL 37, 2015, 37 : 1833 - 1842
  • [24] Hidden semi-Markov model for anomaly detection
    Tan, Xiaobin
    Xi, Hongsheng
    [J]. APPLIED MATHEMATICS AND COMPUTATION, 2008, 205 (02) : 562 - 567
  • [25] ADAPTIVE ANOMALY DETECTION USING A HIDDEN MARKOV MODEL
    Lee, Seungchul
    Li, Lin
    Ni, Jun
    [J]. PROCEEDINGS OF THE ASME INTERNATIONAL MANUFACTURING SCIENCE AND ENGINEERING CONFERENCE 2010, VOL 2, 2011, : 599 - 606
  • [26] Efficacy of Hidden Markov Models over neural networks in anomaly intrusion detection
    Al-Subaie, Mohammad
    Zulkernine, Mohammad
    [J]. 30TH ANNUAL INTERNATIONAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE, VOL 1, REGULAR PAPERS/PANELS, PROCEEDINGS, 2006, : 325 - +
  • [27] A Hidden Markov Model-Based Method for Virtual Machine Anomaly Detection
    Shi, Chaochen
    Yu, Jiangshan
    [J]. PROVABLE SECURITY, PROVSEC 2019, 2019, 11821 : 372 - 380
  • [28] Multi-stage intrusion detection system using Hidden Markov Model algorithm
    Lee, Do-hyeon
    Kim, Doo-young
    Jung, Jae-il
    [J]. ICISS 2008: INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND SECURITY, PROCEEDINGS, 2008, : 72 - 77
  • [29] An Intrusion Detection Based on Markov Model
    Li, Haisheng
    [J]. COMPUTATIONAL MATERIALS SCIENCE, PTS 1-3, 2011, 268-270 : 988 - 993
  • [30] A model for intrusion detection system using hidden Markov and variational Bayesian model for IoT based wireless sensor network
    Kalnoor G.
    Gowrishankar S.
    [J]. International Journal of Information Technology, 2022, 14 (4) : 2021 - 2033