Host Based Intrusion Detection System Using Frequency Analysis of N-Gram Terms

被引:0
|
作者
Subba, Basant [1 ]
Biswas, Santosh [1 ]
Karmakar, Sushata [1 ]
机构
[1] Indian Inst Technol Guwahati, Dept Comp Sci & Engn, Gauhati 781039, India
关键词
Host based Intrusion Detection System (HIDS); Australian Defense Force Academy Linux Dataset (ADFA-LD); System call trace; Support Vector Machine (SVM); Multilayer Perceptron (MLP); Naive Bayes; C4.5 Decision Tree;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Host based Intrusion Detection Systems (HIDSs) analyze the sequence of system calls in the trace and audit log files to identify intrusive system processes. HIDSs use the frequency analysis of n-gram terms in the system call traces to identify intrusive processes. However, they are computation and resource intensive as they need to analyze a large number of n-gram input features to differentiate between normal and intrusive system processes. This put a severe limitation on their real time application while analyzing voluminous system call traces. To address this issue, we propose a computation efficient HIDS framework that initially transforms the system call traces to n-gram vector representational model and then uses a dimensionality reduction process to reduce the size of the input feature vectors. The dimensionality reduced n-gram feature vectors are finally analyzed by various machine learning based classifier models to identify intrusive processes. Performance evaluation of the proposed HIDS framework on the benchmark Australian Defense Force Academy Linux Dataset (ADFA-LD) shows that it effectively detects intrusive system processes with high accuracy and low false positive rate, while at the same time incur a minimum computational overhead.
引用
收藏
页码:2006 / 2011
页数:6
相关论文
共 50 条
  • [1] Network intrusion detection based on n-gram frequency and time-aware transformer
    Han, Xueying
    Cui, Susu
    Liu, Song
    Zhang, Chen
    Jiang, Bo
    Lu, Zhigang
    [J]. COMPUTERS & SECURITY, 2023, 128
  • [2] Ab-HIDS: An anomaly-based host intrusion detection system using frequency of N-gram system call features and ensemble learning for containerized environment
    Joraviya, Nidhi
    Gohil, Bhavesh N.
    Rao, Udai Pratap
    [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2024, 36 (23):
  • [3] Exploiting n-gram location for intrusion detection
    Angiulli, Fabrizio
    Argento, Luciano
    Furfaro, Angelo
    [J]. 2015 IEEE 27TH INTERNATIONAL CONFERENCE ON TOOLS WITH ARTIFICIAL INTELLIGENCE (ICTAI 2015), 2015, : 1093 - 1098
  • [4] Host anomaly detection performance analysis based on system call of NeuroFuzzy using Soundex algorithm and N-gram technique
    Cha, BR
    [J]. 2005 Systems Communications, Proceedings: ICW 2005, WIRELESS TECHNOLOGIES; ICHSN 2005, HIGH SPEED NETWORKS; ICMCS 2005, MULTIMEDIA COMMUNICATIONS SYSTEMS; SENET 2005, SENSOR NETWORKS, 2005, : 116 - 121
  • [5] SIDiLDNG: A similarity-based intrusion detection system using improved Levenshtein Distance and N-gram for CAN
    Song, Jiaru
    Qin, Guihe
    Liang, Yanhua
    Yan, Jie
    Sun, Minghui
    [J]. COMPUTERS & SECURITY, 2024, 142
  • [6] HTTP attack detection using n-gram analysis
    Oza, Aditya
    Ross, Kevin
    Low, Richard M.
    Stamp, Mark
    [J]. COMPUTERS & SECURITY, 2014, 45 : 242 - 254
  • [7] Using N-Gram Variations in Static Analysis for Malware Detection
    Radovancovici, Marco
    Galis, Darius
    Pungila, Ciprian
    [J]. 2022 24TH INTERNATIONAL SYMPOSIUM ON SYMBOLIC AND NUMERIC ALGORITHMS FOR SCIENTIFIC COMPUTING, SYNASC, 2022, : 195 - 199
  • [8] Association Analysis and N-Gram Based Detection of Incorrect Arguments
    Li, Chao
    Liu, Hui
    [J]. Ruan Jian Xue Bao/Journal of Software, 2018, 29 (08): : 2243 - 2257
  • [9] N-gram analysis for computer virus detection
    Reddy, D. Krishna Sandeep
    Pujari, Arun K.
    [J]. JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2006, 2 (03): : 231 - 239
  • [10] N-gram Density based Malware Detection
    O'Kane, Philip
    Sezer, Sakir
    McLaughlin, Kieran
    [J]. 2014 WORLD SYMPOSIUM ON COMPUTER APPLICATIONS & RESEARCH (WSCAR), 2014,