Comparison of Anomaly Detection Accuracy of Host-based Intrusion Detection Systems based on Different Machine Learning Algorithms

被引:0
|
作者
Shin, Yukyung [1 ]
Kim, Kangseok [1 ,2 ]
机构
[1] Ajou Univ, Dept Data Sci, Grad Sch, Suwon, South Korea
[2] Ajou Univ, Dept Cyber Secur, Suwon, South Korea
基金
新加坡国家研究基金会;
关键词
Anomaly detection; host based intrusion detection system; system calls; cyber security; machine learning; simulation; MODEL;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Among the different host-based intrusion detection systems, an anomaly-based intrusion detection system detects attacks based on deviations from normal behavior; however, such a system has a low detection rate. Therefore, several studies have been conducted to increase the accurate detection rate of anomaly-based intrusion detection systems; recently, some of these studies involved the development of intrusion detection models using machine learning algorithms to overcome the limitations of existing anomaly-based intrusion detection methodologies as well as signature-based intrusion detection methodologies. In a similar vein, in this study, we propose a method for improving the intrusion detection accuracy of anomaly-based intrusion detection systems by applying various machine learning algorithms for classification of normal and attack data. To verify the effectiveness of the proposed intrusion detection models, we use the ADFA Linux Dataset which consists of system call traces for attacks on the latest operating systems. Further, for verification, we develop models and perform simulations for host-based intrusion detection systems based on machine learning algorithms to detect and classify anomalies using the Arena simulation tool.
引用
收藏
页码:252 / 259
页数:8
相关论文
共 50 条
  • [31] A Lightweight Host-Based Intrusion Detection based on Process Generation Patterns
    Tsuda, Yu
    Nakazato, Junji
    Takagi, Yaichiro
    Inoue, Daisuke
    Nakao, Koji
    Terada, Kenjiro
    2018 13TH ASIA JOINT CONFERENCE ON INFORMATION SECURITY (ASIAJCIS 2018), 2018, : 102 - 108
  • [32] Host-based intrusion detection based on real time keystroke sequences
    Gao, Yan
    Guan, Xiao-Hong
    Sun, Guo-Ji
    Feng, Li
    Jisuanji Xuebao/Chinese Journal of Computers, 2004, 27 (03): : 396 - 401
  • [33] Host-based intrusion detection systems adapted from agent-based artificial immune systems
    Ou, Chung-Ming
    NEUROCOMPUTING, 2012, 88 : 78 - 86
  • [34] Intrusion Detection System Based on Machine Learning Algorithms: A Review
    Amanoul, Sandy Victor
    Abdulazeez, Adnan Mohsin
    2022 IEEE 18TH INTERNATIONAL COLLOQUIUM ON SIGNAL PROCESSING & APPLICATIONS (CSPA 2022), 2022, : 79 - 84
  • [35] Intrusion Detection in Computer Networks based on Machine Learning Algorithms
    Osareh, Alireza
    Shadgar, Bita
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2008, 8 (11): : 15 - 23
  • [36] Host-Based Intrusion Detection for VANETs: A Statistical Approach to Rogue Node Detection
    Zaidi, Kamran
    Milojevic, Milos B.
    Rakocevic, Veselin
    Nallanathan, Arumugam
    Rajarajan, Muttukrishnan
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2016, 65 (08) : 6703 - 6714
  • [37] Host-based intrusion detection system: Model and design features
    Zegzhda, Pyotr
    Kort, Sernyon
    COMPUTER NETWORK SECURITY, PROCEEDINGS, 2007, 1 : 340 - +
  • [38] Implementation of a Host-based Intrusion Detection System for Avionic Applications
    Damien, Alienor
    Marcourt, Michael
    Nicomette, Vincent
    Alata, Eric
    Kaaniche, Mohamed
    2019 IEEE 24TH PACIFIC RIM INTERNATIONAL SYMPOSIUM ON DEPENDABLE COMPUTING (PRDC 2019), 2019, : 178 - 187
  • [39] Developing Cross-Domain Host-Based Intrusion Detection
    Ajayi, Oluwagbemiga
    Gangopadhyay, Aryya
    Erbacher, Robert F.
    Bursat, Carl
    ELECTRONICS, 2022, 11 (21)
  • [40] Host-based intrusion detection system using optimal representation
    Jung, YS
    Choi, YJ
    Park, N
    Kim, WN
    Hong, MP
    7TH WORLD MULTICONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL XIII, PROCEEDINGS: SYSTEMICS, CYBERNETICS AND INFORMATICS: TECHNOLOGIES AND APPLICATIONS, 2003, : 143 - 147