Bayesian event classification for intrusion detection

被引:126
|
作者
Kruegel, C [1 ]
Mutz, D [1 ]
Robertson, W [1 ]
Valeur, F [1 ]
机构
[1] Univ Calif Santa Barbara, Reliable Software Grp, Santa Barbara, CA 93106 USA
关键词
D O I
10.1109/CSAC.2003.1254306
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Intrusion detection systems (IDSs) attempt to identify attacks by comparing collected data to predefined signatures known to be malicious (misuse-based IDSs) or to a model of legal behavior (anomaly-based IDSs). Anomaly-based approaches have the advantage of being able to detect previously unknown attacks, but they suffer from the difficulty of building robust models of acceptable behavior which may 11 result in a large number of false alarms. Almost all current anomaly-based intrusion detection systems classify an input event as normal or anomalous by analyzing its features, utilizing a number of different models. A decision for all input event is made by aggregating the results of all employed models. We have identified two reasons for the large number of false alarms, caused by incorrect classification of events in current systems. One is the simplistic aggregation of model Outputs in the decision phase. Often, only the sum of the model results is calculated and compared to a threshold. The other reason is the lack of integration of additional information into the decision process. This additional information can be related to the models, such as the confidence in a model's output, or can be extracted from external sources. To mitigate these shortcomings, we propose an event classification scheme that is based oil Bayesian networks. Bayesian networks improve the aggregation of different model outputs and allow one to seamlessly incorporate additional information. Experimental results show that the accuracy of the event classification process is significantly improved using our proposed approach.
引用
收藏
页码:14 / 23
页数:10
相关论文
共 50 条
  • [1] Event Detection and Classification for Fiber Optic Perimeter Intrusion Detection System
    Gu, Xiaohua
    Wang, Tian
    Peng, Jun
    Wang, Hongjin
    Xia, Qinfeng
    Zhang, Du
    [J]. INTERNATIONAL JOURNAL OF COGNITIVE INFORMATICS AND NATURAL INTELLIGENCE, 2019, 13 (04) : 39 - 55
  • [2] A meta-heuristic Bayesian network classification for intrusion detection
    Prasath, Mahesh Kumar
    Perumal, Balasubramani
    [J]. INTERNATIONAL JOURNAL OF NETWORK MANAGEMENT, 2019, 29 (03)
  • [3] A Bayesian classification model for real-time intrusion detection
    Puttini, RS
    Marrakchi, Z
    Mé, L
    [J]. BAYESIAN INFERENCE AND MAXIMUM ENTROPY METHODS IN SCIENCE AND ENGINEERING, 2003, 659 : 150 - 162
  • [4] A Bayesian Classification Intrusion Detection Method Based on the Fusion of PCA and LDA
    Shen, Zhidong
    Zhang, Yuhao
    Chen, Weiying
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2019, 2019
  • [5] A Bayesian Intrusion Detection Framework
    Fu, Shuai
    Bouguila, Nizar
    [J]. 2018 INTERNATIONAL CONFERENCE ON CYBER SECURITY AND PROTECTION OF DIGITAL SERVICES (CYBER SECURITY), 2018,
  • [6] Intrusion Detection Classification Model on an Improved k-Dependence Bayesian Network
    Yin, Hongsheng
    Xue, Mengyang
    Xiao, Yuteng
    Xia, Kaijian
    Yu, Guofang
    [J]. IEEE ACCESS, 2019, 7 : 157555 - 157563
  • [7] Bayesian based intrusion detection system
    Altwaijry, Hesham
    Algarny, Saeed
    [J]. JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2012, 24 (01) : 1 - 6
  • [8] Bayesian Classifiers in Intrusion Detection Systems
    Johan, Mardini-Bovea
    Emiro, De-La-Hoz-Franco
    Diego, Molina-Estren
    Ariza-Colpas, Paola
    Andres, Ortiz
    Julio, Ortega
    Cardenas, Cesar A. R.
    Collazos-Morales, Carlos
    [J]. MACHINE LEARNING FOR NETWORKING (MLN 2019), 2020, 12081 : 379 - 391
  • [9] Bayesian Networks for Source Intrusion Detection
    Perelman, Lina
    Ostfeld, Avi
    [J]. JOURNAL OF WATER RESOURCES PLANNING AND MANAGEMENT, 2013, 139 (04) : 426 - 432
  • [10] Event Correlation for Intrusion Detection Systems
    Dwivedi, Neelam
    Tripathi, Aprna
    [J]. 2015 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMMUNICATION TECHNOLOGY CICT 2015, 2015, : 133 - 139