Bayesian event classification for intrusion detection

被引:126
|
作者
Kruegel, C [1 ]
Mutz, D [1 ]
Robertson, W [1 ]
Valeur, F [1 ]
机构
[1] Univ Calif Santa Barbara, Reliable Software Grp, Santa Barbara, CA 93106 USA
关键词
D O I
10.1109/CSAC.2003.1254306
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Intrusion detection systems (IDSs) attempt to identify attacks by comparing collected data to predefined signatures known to be malicious (misuse-based IDSs) or to a model of legal behavior (anomaly-based IDSs). Anomaly-based approaches have the advantage of being able to detect previously unknown attacks, but they suffer from the difficulty of building robust models of acceptable behavior which may 11 result in a large number of false alarms. Almost all current anomaly-based intrusion detection systems classify an input event as normal or anomalous by analyzing its features, utilizing a number of different models. A decision for all input event is made by aggregating the results of all employed models. We have identified two reasons for the large number of false alarms, caused by incorrect classification of events in current systems. One is the simplistic aggregation of model Outputs in the decision phase. Often, only the sum of the model results is calculated and compared to a threshold. The other reason is the lack of integration of additional information into the decision process. This additional information can be related to the models, such as the confidence in a model's output, or can be extracted from external sources. To mitigate these shortcomings, we propose an event classification scheme that is based oil Bayesian networks. Bayesian networks improve the aggregation of different model outputs and allow one to seamlessly incorporate additional information. Experimental results show that the accuracy of the event classification process is significantly improved using our proposed approach.
引用
收藏
页码:14 / 23
页数:10
相关论文
共 50 条
  • [11] Bayesian Model Averaging of Bayesian Network Classifiers for Intrusion Detection
    Xiao, Liyuan
    Chen, Yetian
    Chang, Carl K.
    2014 38TH ANNUAL IEEE INTERNATIONAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE WORKSHOPS (COMPSACW 2014), 2014, : 128 - 133
  • [12] Intelligent Bayesian classifiers in network intrusion detection
    Bosin, A
    Dessì, N
    Pes, B
    INNOVATIONS IN APPLIED ARTIFICIAL INTELLIGENCE, 2005, 3533 : 445 - 447
  • [13] A Bayesian paradigm for designing intrusion detection systems
    Scott, SL
    COMPUTATIONAL STATISTICS & DATA ANALYSIS, 2004, 45 (01) : 69 - 83
  • [14] Classification-oriented structure learning in Bayesian networks for multimodal event detection in videos
    Gravier, Guillaume
    Demarty, Claire-Helene
    Baghdadi, Siwar
    Gros, Patrick
    MULTIMEDIA TOOLS AND APPLICATIONS, 2014, 70 (03) : 1421 - 1437
  • [15] Classification-oriented structure learning in Bayesian networks for multimodal event detection in videos
    Guillaume Gravier
    Claire-Hélène Demarty
    Siwar Baghdadi
    Patrick Gros
    Multimedia Tools and Applications, 2014, 70 : 1421 - 1437
  • [16] Intrusion detection in controlled discrete event systems
    Thorsley, David
    Teneketzis, Demosthenis
    PROCEEDINGS OF THE 45TH IEEE CONFERENCE ON DECISION AND CONTROL, VOLS 1-14, 2006, : 6049 - +
  • [17] URL Classification with Intrusion Detection System
    Uppara, Veeresh
    Iqbal, Akif
    Vishal, P.
    Vinay, M. V.
    Sarasvathi, V.
    INTELLIGENT SYSTEMS AND APPLICATIONS, VOL 1, INTELLISYS 2023, 2024, 822 : 284 - 300
  • [18] Intrusion Detection System: Classification and Techniques
    Soniya, S. Sobin
    Vigila, S. Maria Celestin
    PROCEEDINGS OF IEEE INTERNATIONAL CONFERENCE ON CIRCUIT, POWER AND COMPUTING TECHNOLOGIES (ICCPCT 2016), 2016,
  • [19] Intrusion Detection System Based on Classification
    Gong Shang-fu
    Zhao Chun-lan
    2012 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENT CONTROL, AUTOMATIC DETECTION AND HIGH-END EQUIPMENT (ICADE), 2012, : 78 - 83
  • [20] Dealing with Interleaved Event Inputs for Intrusion Detection
    Pao, Hsing-Kuo
    Lee, Fong-Ruei
    Lee, Yuh-Jye
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2019, 35 (01) : 223 - 242