首页 | 本学科首页   官方微博 | 高级检索  
     检索      


Detecting network intrusions by data mining and variable-length sequence pattern matching
Authors:Tian Xinguang  Duan Miyi  Sun Chunlai  Liu Xin
Institution:Inst. of Computing Technology, Chinese Academy of Sciences, Beijing 100190, P. R. China;Inst. of Computing Technology, Beijing Jiaotong Univ., Beijing 100029, P. R. China
Abstract:Anomaly detection has been an active research topic in the field of network intrusion detection for many years. A novel method is presented for anomaly detection based on system calls into the kernels of Unix or Linux systems. The method uses the data mining technique to model the normal behavior of a privileged program and uses a variable-length pattern matching algorithm to perform the comparison of the current behavior and historic normal behavior, which is more suitable for this problem than the fixed-length pattern matching algorithm proposed by Forrest et al. At the detection stage, the particularity of the audit data is taken into account, and two alternative schemes could be used to distinguish between normalities and intrusions. The method gives attention to both computational efficiency and detection accuracy and is especially applicable for on-line detection. The performance of the method is evaluated using the typical testing data set, and the results show that it is significantly better than the anomaly detection method based on hidden Markov models proposed by Yan et al. and the method based on fixed-length patterns proposed by Forrest and Hofmeyr. The novel method has been applied to practical hosted-based intrusion detection systems and achieved high detection performance.
Keywords:intrusion detection  anomaly detection  system call  data mining  variable-length pattern
本文献已被 维普 万方数据 等数据库收录!
点击此处可从《系统工程与电子技术(英文版)》浏览原始摘要信息
点击此处可从《系统工程与电子技术(英文版)》下载免费的PDF全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号