Host-based intrusion detection system for secure human-centric computing

被引:0
|
作者
Daesung Moon
Sung Bum Pan
Ikkyun Kim
机构
[1] Electronics and Telecommunications Research Institute,Network Security Research Team
[2] Korea University of Science and Technology (UST),Department of Information Secuirty Engineering
[3] Chosun University,Department of Electronics Engineering
来源
关键词
Advanced Persistent Threat attack; HIDS; Intrusion detection system; Secure human-centric computing;
D O I
暂无
中图分类号
学科分类号
摘要
With the advancement of information communication technology, people can access many useful services for human-centric computing. Although this advancement increases work efficiency and provides greater convenience to people, advanced security threats such as the Advanced Persistent Threat (APT) attack have been continuously increasing. Technical measures for protecting against an APT attack are desperately needed because APT attacks, such as the 3.20 Cyber Terror and SK Communications hacking incident, have occurred repeatedly and cause considerable damage, socially and economically. Moreover, there are limitations of the existing security devices designed to cope with APT attacks that continue persistently using zero-day malware. For this reason, we propose a malware detection method based on the behavior information of a process on the host PC. Our proposal overcomes the limitations of the existing signature-based intrusion detection systems. First, we defined 39 characteristics for demarcating malware from benign programs and collected 8.7 million characteristic parameter events when malware and benign programs were executed in a virtual-machine environment. Further, when an executable program is running on a host PC, we present the behavior information as an 83-dimensional vector by reconstructing the frequency of each characteristic parameter’s occurrence according to the process ID for the collected characteristic parameter data. It is possible to present more accurate behavior information by including the frequency of characteristic parameter events occurring in child processes. We use a C4.5 decision tree algorithm to detect malware in the database. The results of our proposed method show a 2.0 % false-negative detection rate and a 5.8 % false-positive detection rate.
引用
收藏
页码:2520 / 2536
页数:16
相关论文
共 50 条
  • [1] Host-based intrusion detection system for secure human-centric computing
    Moon, Daesung
    Pan, Sung Bum
    Kim, Ikkyun
    [J]. JOURNAL OF SUPERCOMPUTING, 2016, 72 (07): : 2520 - 2536
  • [2] A Novel Mechanism for Host-Based Intrusion Detection System
    Harshitha, Ch Gayathri
    Rao, M. Kameswara
    Kumar, P. Neelesh
    [J]. FIRST INTERNATIONAL CONFERENCE ON SUSTAINABLE TECHNOLOGIES FOR COMPUTATIONAL INTELLIGENCE, 2020, 1045 : 527 - 536
  • [3] The Design and Implementation of Host-based Intrusion Detection System
    Lin Ying
    Zhang Yan
    Ou Yang-Jia
    [J]. 2010 THIRD INTERNATIONAL SYMPOSIUM ON INTELLIGENT INFORMATION TECHNOLOGY AND SECURITY INFORMATICS (IITSI 2010), 2010, : 595 - 598
  • [4] Host-based intrusion detection system: Model and design features
    Zegzhda, Pyotr
    Kort, Sernyon
    [J]. COMPUTER NETWORK SECURITY, PROCEEDINGS, 2007, 1 : 340 - +
  • [5] Host-based intrusion detection system using optimal representation
    Jung, YS
    Choi, YJ
    Park, N
    Kim, WN
    Hong, MP
    [J]. 7TH WORLD MULTICONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL XIII, PROCEEDINGS: SYSTEMICS, CYBERNETICS AND INFORMATICS: TECHNOLOGIES AND APPLICATIONS, 2003, : 143 - 147
  • [6] Implementation of a Host-based Intrusion Detection System for Avionic Applications
    Damien, Alienor
    Marcourt, Michael
    Nicomette, Vincent
    Alata, Eric
    Kaaniche, Mohamed
    [J]. 2019 IEEE 24TH PACIFIC RIM INTERNATIONAL SYMPOSIUM ON DEPENDABLE COMPUTING (PRDC 2019), 2019, : 178 - 187
  • [7] Application of Sequence Embedding in Host-based Intrusion Detection System
    Lu, Yijun
    Teng, Shaohua
    [J]. PROCEEDINGS OF THE 2021 IEEE 24TH INTERNATIONAL CONFERENCE ON COMPUTER SUPPORTED COOPERATIVE WORK IN DESIGN (CSCWD), 2021, : 434 - 439
  • [8] Human-Centric Computing
    Rabaey, Jan M.
    [J]. IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, 2020, 28 (01) : 3 - 11
  • [9] Human-Centric Computing
    Rabaey, Jan M.
    [J]. 2021 IEEE INTERNATIONAL ELECTRON DEVICES MEETING (IEDM), 2021,
  • [10] Towards a better similarity algorithm for host-based intrusion detection system
    Ouarda, Lounis
    Malika, Bourenane
    Brahim, Bouderah
    [J]. JOURNAL OF INTELLIGENT SYSTEMS, 2023, 32 (01)