Comparison of Anomaly Detection Accuracy of Host-based Intrusion Detection Systems based on Different Machine Learning Algorithms

被引:0
|
作者
Shin, Yukyung [1 ]
Kim, Kangseok [1 ,2 ]
机构
[1] Ajou Univ, Dept Data Sci, Grad Sch, Suwon, South Korea
[2] Ajou Univ, Dept Cyber Secur, Suwon, South Korea
基金
新加坡国家研究基金会;
关键词
Anomaly detection; host based intrusion detection system; system calls; cyber security; machine learning; simulation; MODEL;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Among the different host-based intrusion detection systems, an anomaly-based intrusion detection system detects attacks based on deviations from normal behavior; however, such a system has a low detection rate. Therefore, several studies have been conducted to increase the accurate detection rate of anomaly-based intrusion detection systems; recently, some of these studies involved the development of intrusion detection models using machine learning algorithms to overcome the limitations of existing anomaly-based intrusion detection methodologies as well as signature-based intrusion detection methodologies. In a similar vein, in this study, we propose a method for improving the intrusion detection accuracy of anomaly-based intrusion detection systems by applying various machine learning algorithms for classification of normal and attack data. To verify the effectiveness of the proposed intrusion detection models, we use the ADFA Linux Dataset which consists of system call traces for attacks on the latest operating systems. Further, for verification, we develop models and perform simulations for host-based intrusion detection systems based on machine learning algorithms to detect and classify anomalies using the Arena simulation tool.
引用
收藏
页码:252 / 259
页数:8
相关论文
共 50 条
  • [1] Comparison of anomaly detection accuracy of host-based intrusion detection systems based on different machine learning algorithms
    Shin Y.
    Kim K.
    International Journal of Advanced Computer Science and Applications, 2020, (02): : 252 - 259
  • [2] Methods for Host-based Intrusion Detection with Deep Learning
    Ring J.H.
    Van Oort C.M.
    Durst S.
    White V.
    Near J.P.
    Skalka C.
    Digital Threats: Research and Practice, 2021, 2 (04):
  • [3] Host-based Anomaly Detection Using Learning Techniques
    Mustafa, Ahmad
    Solaimani, Mohiuddin
    Khan, Latifur
    Chiang, Ken
    Ingram, Joe
    2013 IEEE 13TH INTERNATIONAL CONFERENCE ON DATA MINING WORKSHOPS (ICDMW), 2013, : 1153 - 1160
  • [4] Enhancing the accuracy of network-based intrusion detection with host-based context
    Dreger, H
    Kreibich, C
    Paxson, V
    Sommer, R
    DETECTION OF INTRUSIONS AND MALWARE, AND VULNERABILITY ASSESSMENT, PROCEEDINGS, 2005, 3548 : 206 - 221
  • [5] A Systematic Literature Review on Host-Based Intrusion Detection Systems
    Satilmis, Hami
    Akleylek, Sedat
    Tok, Zaliha Yuce
    IEEE ACCESS, 2024, 12 : 27237 - 27266
  • [6] On the learning of system call attributes for host-based anomaly detection
    Tandon, Gaurav
    Chan, Philip K.
    INTERNATIONAL JOURNAL ON ARTIFICIAL INTELLIGENCE TOOLS, 2006, 15 (06) : 875 - 892
  • [7] Into the Unknown: Unsupervised Machine Learning Algorithms for Anomaly-Based Intrusion Detection
    Zoppi, Tommaso
    Ceccarelli, Andrea
    Bondavalli, Andrea
    2020 50TH ANNUAL IEEE-IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS-SUPPLEMENTAL VOLUME (DSN-S), 2020, : 81 - 81
  • [8] Anomaly Generation Using Generative Adversarial Networks in Host-Based Intrusion Detection
    Salem, Milad
    Taheri, Shayan
    Yuan, Jiann Shiun
    2018 9TH IEEE ANNUAL UBIQUITOUS COMPUTING, ELECTRONICS & MOBILE COMMUNICATION CONFERENCE (UEMCON), 2018, : 683 - 687
  • [9] Anomaly Based Intrusion Detection for IoT with Machine Learning
    Shaver, Addison
    Liu, Zhipeng
    Thapa, Niraj
    Roy, Kaushik
    Gokaraju, Balakrishna
    Yuan, Xiaohon
    2020 IEEE APPLIED IMAGERY PATTERN RECOGNITION WORKSHOP (AIPR): TRUSTED COMPUTING, PRIVACY, AND SECURING MULTIMEDIA, 2020,
  • [10] Host-based intrusion detection with multi-datasource and deep learning
    Hwang, Ren-Hung
    Lee, Chieh-Lun
    Lin, Ying-Dar
    Lin, Po-Chin
    Wu, Hsiao-Kuang
    Lai, Yuan-Cheng
    Chen, C. K.
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2023, 78