Fuzzy Intrusion Detection System via Data Mining Technique With Sequences of System Calls

被引:5
|
作者
Sekeh, Mohammad Akbarpour [1 ]
Bin Maarof, Mohd. Aizaini [1 ]
机构
[1] UTM, Fac Comp Sci & Informat, Dept Comp Syst & Commun, Skudai, Malaysia
关键词
Process-based Intrusion Detection; Data mining; Fuzzy; Operating system; system calls; kernel;
D O I
10.1109/IAS.2009.32
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
There are two main approaches for implementing IDS; host based and network based. While the former is implemented in the form of software deployed on a host, the latter, usually is built as a hardware product with its own hardware platform (IDS applianced. lit this paper. it host based intrusion detection system, that uses the idea of tracing system calls, is introduced. As a program runs, it uses the Services of the underlying, operating system to do sonic system calls. This system does not exactly need to know the program codes of each process. Normal and intrusive behaviors are collected with gathering the sequences of system calls for each process. Analysis of data is done via data mining and fuzzy techniques. Data mining is used to extract the normal behavior. The proposed system is shown to improve the performance, and decrease size of database, time complexity. and the rate of false alarms.
引用
收藏
页码:154 / 157
页数:4
相关论文
共 50 条
  • [1] Applying mining fuzzy association rules to intrusion detection based on sequences of system calls
    Zhang, GL
    [J]. NETWORKING AND MOBILE COMPUTING, PROCEEDINGS, 2005, 3619 : 826 - 835
  • [2] Intrusion Detection System using Fuzzy Logic and Data Mining Technique
    Chapke, Prajkta P.
    Deshmukh, Rupali R.
    [J]. ICARCSET'15: PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON ADVANCED RESEARCH IN COMPUTER SCIENCE ENGINEERING & TECHNOLOGY (ICARCSET - 2015), 2015,
  • [3] Network intrusion detection based on system calls and data mining
    Tian, Xinguang
    Cheng, Xueqi
    Duan, Miyi
    Liao, Rui
    Chen, Hong
    Chen, Xiaojuan
    [J]. FRONTIERS OF COMPUTER SCIENCE IN CHINA, 2010, 4 (04): : 522 - 528
  • [4] Network intrusion detection based on system calls and data mining
    Xinguang Tian
    Xueqi Cheng
    Miyi Duan
    Rui Liao
    Hong Chen
    Xiaojuan Chen
    [J]. Frontiers of Computer Science in China, 2010, 4 : 522 - 528
  • [5] Applying fuzzy neural network to intrusion detection based on sequences of system calls
    Zhang, GL
    Sun, JH
    [J]. ADVANCED DATA MINING AND APPLICATIONS, PROCEEDINGS, 2005, 3584 : 483 - 490
  • [6] Intrusion Detection System by Using Hybrid Algorithm of Data Mining Technique
    Foroushani, Zohreh Abtahi
    Li, Yue
    [J]. PROCEEDINGS OF 2018 7TH INTERNATIONAL CONFERENCE ON SOFTWARE AND COMPUTER APPLICATIONS (ICSCA 2018), 2018, : 119 - 123
  • [7] Intrusion detection system based on data mining
    Zhang, Jishan
    Gan, Yong
    Bian, Zhiwei
    [J]. Fifth Wuhan International Conference on E-Business, Vols 1-3: INTEGRATION AND INNOVATION THROUGH MEASUREMENT AND MANAGEMENT, 2006, : 1214 - 1218
  • [8] Intrusion detection system based on data mining
    Zhan Jinhua
    [J]. FIRST INTERNATIONAL WORKSHOP ON KNOWLEDGE DISCOVERY AND DATA MINING, PROCEEDINGS, 2007, : 402 - 405
  • [9] Integrating Intrusion Detection System and Data Mining
    Yusufovna, Sattarova Feruza
    [J]. INTERNATIONAL SYMPOSIUM ON UBIQUITOUS MULTIMEDIA COMPUTING, PROCEEDINGS, 2008, : 256 - 259
  • [10] A Low-cost Method to Intrusion Detection System using Sequences of System Calls
    Geng, Li-zhong
    Jia, Hui-bo
    [J]. ICIC 2009: SECOND INTERNATIONAL CONFERENCE ON INFORMATION AND COMPUTING SCIENCE, VOL 1, PROCEEDINGS: COMPUTING SCIENCE AND ITS APPLICATION, 2009, : 143 - +