A model for anomaly classification in intrusion detection systems

被引:1
|
作者
Ferreira, V. O. [1 ]
Galhardi, V. V. [1 ]
Goncalves, L. B. L. [1 ]
Silva, R. C. [1 ]
Cansian, A. M. [1 ]
机构
[1] Salo Paulo State Univ UNESP, Dept Comp Sci & Stat DCCE, Salo Jose Do Rio Preto, Brazil
关键词
D O I
10.1088/1742-6596/633/1/012124
中图分类号
O1 [数学];
学科分类号
0701 ; 070101 ;
摘要
Intrusion Detection Systems (IDS) are traditionally divided into two types according to the detection methods they employ, namely (i) misuse detection and (ii) anomaly detection. Anomaly detection has been widely used and its main advantage is the ability to detect new attacks. However, the analysis of anomalies generated can become expensive, since they often have no clear information about the malicious events they represent. In this context, this paper presents a model for automated classification of alerts generated by an anomaly based IDS. The main goal is either the classification of the detected anomalies in well-defined taxonomies of attacks or to identify whether it is a false positive misclassified by the IDS. Some common attacks to computer networks were considered and we achieved important results that can equip security analysts with best resources for their analyses.
引用
收藏
页数:4
相关论文
共 50 条
  • [31] An Anomaly Intrusion Detection Model Based on Limited Labeled Instances
    Guo, Shan-Qing
    Zhao, Zhong-Hua
    PROCEEDINGS OF THE INTERNATIONAL SYMPOSIUM ON ELECTRONIC COMMERCE AND SECURITY, 2008, : 283 - 287
  • [32] ANOMALY NETWORK INTRUSION DETECTION USING HIDDEN MARKOV MODEL
    Chen, Chia-Mei
    Guan, Dah-Jyh
    Huang, Yu-Zhi
    Ou, Ya-Hui
    INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2016, 12 (02): : 569 - 580
  • [33] Anomaly Based Intrusion Detection System Using Hierarchical Classification and Clustering Techniques
    Bahjat, Hala
    Mohammed, Suhaila N.
    Ahmed, Wafaa
    Hamad, Sumaya
    Mohammed, Shayma
    2020 13TH INTERNATIONAL CONFERENCE ON DEVELOPMENTS IN ESYSTEMS ENGINEERING (DESE 2020), 2020, : 257 - 262
  • [34] A Hybrid Anomaly Based Intrusion Detection Methodology Using IWD for LSTM Classification
    Madanan, Mukesh
    Venugopal, Anita
    Velayudhan, Nitha C.
    2020 IEEE INTERNATIONAL CONFERENCE ON ADVANCED NETWORKS AND TELECOMMUNICATIONS SYSTEMS (IEEE ANTS), 2020,
  • [35] A Review and Classification of Various VANET Intrusion Detection Systems
    Erritali, Mohammed
    El Ouahidi, Bouabid
    2013 NATIONAL SECURITY DAYS (JNS3), 2013,
  • [36] A multimedia traffic classification scheme for intrusion detection systems
    Marques, O
    Baillargeon, P
    Third International Conference on Information Technology and Applications, Vol 2, Proceedings, 2005, : 496 - 501
  • [37] A Genetic Clustering Technique for Anomaly-Based Intrusion Detection Systems
    Aissa, Naila Belhadj
    Guerroumi, Mohamed
    2015 16TH IEEE/ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING AND PARALLEL/DISTRIBUTED COMPUTING (SNPD), 2015, : 87 - 92
  • [38] Anomaly-based network intrusion detection: Techniques, systems and challenges
    Garcia-Teodoro, P.
    Diaz-Verdejo, J.
    Macia-Fernandez, G.
    Vazquez, E.
    COMPUTERS & SECURITY, 2009, 28 (1-2) : 18 - 28
  • [39] Applications of Clustering Methods to Anomaly-Based Intrusion Detection Systems
    Nikolova, Evgeniya
    Jecheva, Veselina
    2015 8TH INTERNATIONAL CONFERENCE ON DATABASE THEORY AND APPLICATION (DTA), 2015, : 37 - 41
  • [40] Anomaly-based Intrusion Detection using Distributed intelligent systems
    Morel, Benoit
    CRISIS: 2008 THIRD INTERNATIONAL CONFERENCE ON RISKS AND SECURITY OF INTERNET AND SYSTEMS, PROCEEDINGS, 2008, : 37 - 44