Comparison of Anomaly Detection Accuracy of Host-based Intrusion Detection Systems based on Different Machine Learning Algorithms

被引:0
|
作者
Shin, Yukyung [1 ]
Kim, Kangseok [1 ,2 ]
机构
[1] Ajou Univ, Dept Data Sci, Grad Sch, Suwon, South Korea
[2] Ajou Univ, Dept Cyber Secur, Suwon, South Korea
基金
新加坡国家研究基金会;
关键词
Anomaly detection; host based intrusion detection system; system calls; cyber security; machine learning; simulation; MODEL;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Among the different host-based intrusion detection systems, an anomaly-based intrusion detection system detects attacks based on deviations from normal behavior; however, such a system has a low detection rate. Therefore, several studies have been conducted to increase the accurate detection rate of anomaly-based intrusion detection systems; recently, some of these studies involved the development of intrusion detection models using machine learning algorithms to overcome the limitations of existing anomaly-based intrusion detection methodologies as well as signature-based intrusion detection methodologies. In a similar vein, in this study, we propose a method for improving the intrusion detection accuracy of anomaly-based intrusion detection systems by applying various machine learning algorithms for classification of normal and attack data. To verify the effectiveness of the proposed intrusion detection models, we use the ADFA Linux Dataset which consists of system call traces for attacks on the latest operating systems. Further, for verification, we develop models and perform simulations for host-based intrusion detection systems based on machine learning algorithms to detect and classify anomalies using the Arena simulation tool.
引用
收藏
页码:252 / 259
页数:8
相关论文
共 50 条
  • [21] Sequence Covering for Efficient Host-Based Intrusion Detection
    Martea, Pierre-Francois
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2019, 14 (04) : 994 - 1006
  • [22] Using Graph Representation in Host-Based Intrusion Detection
    Hu, Zhichao
    Liu, Likun
    Yu, Haining
    Yu, Xiangzhan
    SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [23] Host-based intrusion detection for advanced mobile devices
    Miettinen, Markus
    Halonen, Perttu
    Hatonen, Kimmo
    20TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOL 2, PROCEEDINGS, 2006, : 72 - 76
  • [24] Trust Management for Host-Based Collaborative Intrusion Detection
    Fung, Carol J.
    Baysal, Olga
    Zhang, Jie
    Aib, Issarn
    Boutaba, Raouf
    MANAGING LARGE-SCALE SERVICE DEPLOYMENT, PROCEEDINGS, 2008, 5273 : 109 - 122
  • [25] Adaptive critic designs for host-based intrusion detection
    Draelos, T
    Duggan, D
    Collins, M
    Wunsch, D
    PROCEEDING OF THE 2002 INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS, VOLS 1-3, 2002, : 1720 - 1725
  • [26] Mobile host-based intrusion detection and attack identification
    Jacoby, Grant A.
    Davis, Nathaniel J., IV
    IEEE WIRELESS COMMUNICATIONS, 2007, 14 (04) : 53 - 60
  • [27] A Modern Implementation of System Call Sequence Based Host-based Intrusion Detection Systems
    Byrnes, Jeffrey
    Hoang, Thomas
    Mehta, Nihal Nitin
    Cheng, Yuan
    2020 SECOND IEEE INTERNATIONAL CONFERENCE ON TRUST, PRIVACY AND SECURITY IN INTELLIGENT SYSTEMS AND APPLICATIONS (TPS-ISA 2020), 2020, : 218 - 225
  • [28] An unsupervised host-based anomaly intrusion detection technique based on non-negative matrix factorization
    Sun, Wei
    Ke, Yongzhen
    Liu, Wenju
    Wang, Ze
    IMECS 2007: INTERNATIONAL MULTICONFERENCE OF ENGINEERS AND COMPUTER SCIENTISTS, VOLS I AND II, 2007, : 238 - +
  • [29] A Trace Abstraction Approach for Host-based Anomaly Detection
    Murtaza, Syed Shariyar
    Khreich, Wael
    Hamou-Lhadj, Abdelwahab
    Gagnon, Stephane
    2015 IEEE SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE FOR SECURITY AND DEFENSE APPLICATIONS (CISDA), 2015, : 170 - 177
  • [30] A Host-based Intrusion Detection Model Based on OS Diversity for SCADA
    Bulle, Bruno B.
    Santin, Altair O.
    Viegas, Eduardo K.
    dos Santos, Roger R.
    IECON 2020: THE 46TH ANNUAL CONFERENCE OF THE IEEE INDUSTRIAL ELECTRONICS SOCIETY, 2020, : 691 - 696