Research on hidden Markov model for system call anomaly detection

被引:0
|
作者
Qian, Quan [1 ]
Xin, Mingjun [1 ]
机构
[1] Shanghai Univ, Sch Engn & Comp Sci, Shanghai 200072, Peoples R China
来源
关键词
Hidden Markov Model; host system calls; anomaly detection;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Intrusion detection, especially anomaly detection, requires sufficient security background knowledge. It is very significant to recognize system anomaly behavior under the condition of poor domain knowledge. In this paper, the general methods for system calls anomaly detection are summarized and HMM used for anomaly detection is deeply discussed from detection theory, system framework and detection methods. Moreover, combining with experiments, the detection efficiency and real-time performance of HMM with all-states transition and part-states transition are analyzed in detail in the paper.
引用
收藏
页码:152 / +
页数:2
相关论文
共 50 条
  • [1] Research on Markov chain model for system call anomaly detection
    Qian, Q
    Wang, XF
    [J]. PROCEEDINGS OF THE 8TH JOINT CONFERENCE ON INFORMATION SCIENCES, VOLS 1-3, 2005, : 328 - 333
  • [2] An anomaly intrusion detection Based on Hidden Markov model System Call Sequenc
    Wang, Dongliang
    Wang, Zhigang
    [J]. ADVANCED RESEARCH ON AUTOMATION, COMMUNICATION, ARCHITECTONICS AND MATERIALS, PTS 1 AND 2, 2011, 225-226 (1-2): : 609 - +
  • [3] Workload hidden Markov model for anomaly detection
    Garcia, Juan Manuel
    Navarrete, Tomas
    Orozco, Carlos
    [J]. SECRYPT 2006: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2006, : 56 - +
  • [4] Hidden Markov Anomaly Detection
    Goerntiz, Nico
    Braun, Mikio
    Kloft, Marius
    [J]. INTERNATIONAL CONFERENCE ON MACHINE LEARNING, VOL 37, 2015, 37 : 1833 - 1842
  • [5] Hidden semi-Markov model for anomaly detection
    Tan, Xiaobin
    Xi, Hongsheng
    [J]. APPLIED MATHEMATICS AND COMPUTATION, 2008, 205 (02) : 562 - 567
  • [6] Hidden Markov Model Based Anomaly Intrusion Detection
    Jain, Ruchi
    Abouzakhar, Nasser S.
    [J]. 2012 INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS, 2012, : 528 - 533
  • [7] ADAPTIVE ANOMALY DETECTION USING A HIDDEN MARKOV MODEL
    Lee, Seungchul
    Li, Lin
    Ni, Jun
    [J]. PROCEEDINGS OF THE ASME INTERNATIONAL MANUFACTURING SCIENCE AND ENGINEERING CONFERENCE 2010, VOL 2, 2011, : 599 - 606
  • [8] ANOMALY NETWORK INTRUSION DETECTION USING HIDDEN MARKOV MODEL
    Chen, Chia-Mei
    Guan, Dah-Jyh
    Huang, Yu-Zhi
    Ou, Ya-Hui
    [J]. INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2016, 12 (02): : 569 - 580
  • [9] Research of IOT Intrusion Detection System Based on Hidden Markov Model
    Jiang, Xuesong
    Wei, Xiumei
    Wang, Xingang
    [J]. 2011 INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND APPLICATIONS, 2011, : 151 - 155
  • [10] Research of IOT Intrusion Detection System Based on Hidden Markov Model
    Wei, Xiumei
    Jiang, Xuesong
    Wang, Xingang
    [J]. INFORMATION TECHNOLOGY APPLICATIONS IN INDUSTRY, PTS 1-4, 2013, 263-266 : 2949 - 2952