Host-based intrusion detection system for secure human-centric computing

被引:0
|
作者
Daesung Moon
Sung Bum Pan
Ikkyun Kim
机构
[1] Electronics and Telecommunications Research Institute,Network Security Research Team
[2] Korea University of Science and Technology (UST),Department of Information Secuirty Engineering
[3] Chosun University,Department of Electronics Engineering
来源
关键词
Advanced Persistent Threat attack; HIDS; Intrusion detection system; Secure human-centric computing;
D O I
暂无
中图分类号
学科分类号
摘要
With the advancement of information communication technology, people can access many useful services for human-centric computing. Although this advancement increases work efficiency and provides greater convenience to people, advanced security threats such as the Advanced Persistent Threat (APT) attack have been continuously increasing. Technical measures for protecting against an APT attack are desperately needed because APT attacks, such as the 3.20 Cyber Terror and SK Communications hacking incident, have occurred repeatedly and cause considerable damage, socially and economically. Moreover, there are limitations of the existing security devices designed to cope with APT attacks that continue persistently using zero-day malware. For this reason, we propose a malware detection method based on the behavior information of a process on the host PC. Our proposal overcomes the limitations of the existing signature-based intrusion detection systems. First, we defined 39 characteristics for demarcating malware from benign programs and collected 8.7 million characteristic parameter events when malware and benign programs were executed in a virtual-machine environment. Further, when an executable program is running on a host PC, we present the behavior information as an 83-dimensional vector by reconstructing the frequency of each characteristic parameter’s occurrence according to the process ID for the collected characteristic parameter data. It is possible to present more accurate behavior information by including the frequency of characteristic parameter events occurring in child processes. We use a C4.5 decision tree algorithm to detect malware in the database. The results of our proposed method show a 2.0 % false-negative detection rate and a 5.8 % false-positive detection rate.
引用
收藏
页码:2520 / 2536
页数:16
相关论文
共 50 条
  • [41] Host-Based Intrusion Detection Model Using Siamese Network
    Park, Daekyeong
    Kim, Sangsoo
    Kwon, Hyukjin
    Shin, Dongil
    Shin, Dongkyoo
    [J]. IEEE ACCESS, 2021, 9 : 76614 - 76623
  • [42] On Effective Sampling Techniques for Host-based Intrusion Detection in MANET
    Ge, Linqiang
    Zhang, Difan
    Hardy, Rommie
    Liu, Hui
    Yu, Wei
    Reschly, Robert
    [J]. 2012 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM 2012), 2012,
  • [43] A Host-based Intrusion Detection Model Based on OS Diversity for SCADA
    Bulle, Bruno B.
    Santin, Altair O.
    Viegas, Eduardo K.
    dos Santos, Roger R.
    [J]. IECON 2020: THE 46TH ANNUAL CONFERENCE OF THE IEEE INDUSTRIAL ELECTRONICS SOCIETY, 2020, : 691 - 696
  • [44] A Lightweight Host-Based Intrusion Detection based on Process Generation Patterns
    Tsuda, Yu
    Nakazato, Junji
    Takagi, Yaichiro
    Inoue, Daisuke
    Nakao, Koji
    Terada, Kenjiro
    [J]. 2018 13TH ASIA JOINT CONFERENCE ON INFORMATION SECURITY (ASIAJCIS 2018), 2018, : 102 - 108
  • [45] Developing Cross-Domain Host-Based Intrusion Detection
    Ajayi, Oluwagbemiga
    Gangopadhyay, Aryya
    Erbacher, Robert F.
    Bursat, Carl
    [J]. ELECTRONICS, 2022, 11 (21)
  • [46] An Approach for Host-Based Intrusion Detection System Design Using Convolutional Neural Network
    Nam Nhat Tran
    Sarker, Ruhul
    Hu, Jiankun
    [J]. MOBILE NETWORKS AND MANAGEMENT (MONAMI 2017), 2018, 235 : 116 - 126
  • [47] Host-based intrusion detection based on real time keystroke sequences
    Gao, Yan
    Guan, Xiao-Hong
    Sun, Guo-Ji
    Feng, Li
    [J]. Jisuanji Xuebao/Chinese Journal of Computers, 2004, 27 (03): : 396 - 401
  • [48] A reinforcement learning approach for host-based intrusion detection using sequences of system calls
    Xu, X
    Xie, T
    [J]. ADVANCES IN INTELLIGENT COMPUTING, PT 1, PROCEEDINGS, 2005, 3644 : 995 - 1003
  • [49] Local privacy protection classification based on human-centric computing
    Yin, Chunyong
    Zhou, Biao
    Yin, Zhichao
    Wang, Jin
    [J]. HUMAN-CENTRIC COMPUTING AND INFORMATION SCIENCES, 2019, 9 (01)
  • [50] On Effective Data Aggregation Techniques In Host-based Intrusion Detection in MANET
    Zhang, Difan
    Ge, Linqiang
    Hardy, Rommie
    Yu, Wei
    Zhang, Hanlin
    Reschly, Robert
    [J]. 2013 IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE (CCNC), 2013, : 85 - 90