A Compound Intrusion Detection Model

Size: px
Start display at page:

Download "A Compound Intrusion Detection Model"

Transcription

1 A Compound Intrusion Detection Model Jianhua Sun, Hai Jin, Hao Chen, Qian Zhang and Zongfen Han Internet and Cluster Computing Center Huazhong University of Science and Technology, Wuhan, , China {jhsun, Abstract. Intrusion detection systems (IDSs) have become a critical part of security systems. The goal of an intrusion detection system is to identify intrusion effectively and accurately. However, the performance of misuse intrusion detection system (MIDS) or anomaly intrusion detection system (AIDS) is not satisfying. In this paper, we study the issue of building a compound intrusion detection model, which has the merits of MIDS and AIDS. To build this compound model, we propose an improved Bayesian decision theorem. The improved Bayesian decision theorem brings some profits to this model: to eliminate the flaws of a narrow definition for intrusion patterns, to extend the known intrusions patterns to novel intrusions patterns, to reduce risks that detecting intrusion brings to system and to offer a method to build a compound intrusion detection model that integrates MIDS with AIDS. 1 Introduction Security of network systems is becoming increasingly important, and intrusion detection system (IDS) is a critical technology to help protect systems. There are two well-known kinds of intrusion detection systems: misuse intrusion detection system (MIDS) and anomaly intrusion detection system (AIDS). MIDS is efficient and accurate in detecting known intrusions, but cannot detect novel intrusions without unknown signature patterns. AIDS can detect both novel and known attacks, but false alarm rate is high. Hence, MIDS and AIDS are often used together to complement each other. Compound intrusion detection system (CIDS) comprises models of both the normal behavior of the system and the intrusive behavior of the intruder. This kind of model gives us an improved indication of the quality of the alarm, and thus in some sense the most advanced detectors [1]. Early research [7] and [21] suggested that the two main systems ought to be combined to provide a complete intrusion detection system capable of detecting a wide array of different computer security violations [2]. In this paper, we study a compound intrusion detection model. Unlike single MIDS or AIDS, we use CIDS to achieve higher detection rate and lower false alarm rate. Using one simple similarity measure, MIDS and AIDS can work well independently. By applying an improved Bayesian decision theorem to our This paper is supported by Key Nature Science Foundation of Hubei Province under grant 2001ABA001

2 model, the combination of MIDS and AIDS is achieved. Furthermore, by applying this improved theorem, the model is sensitive to various kinds of false alarms and minimizes the risks incurred by these false decisions. The main contributions of this paper are as follows. We propose a novel compound intrusion detection model that integrates MIDS with AIDS. We improve the Bayesian decision theorem that suits real security environment to minimize the risks incurred by false decisions. The rest of this paper is organized as follows. In section 2, we discuss some research background. Section 3 explains the reasons to improve Bayesian decision theorem, and show how to build this compound intrusion detection model. In section 4, we evaluate our intrusion detection model using sequences databases. Section 5 ends with a conclusion and some discussion. 2 Research Background Warrender et al. gives us a comparison of anomaly detection techniques and draws a conclusion that the short sequences of system calls are more important than the particular method of analysis [25]. Stephanie Forrest presents an approach for modeling normal sequences using look ahead pairs [5] and contiguous sequences [14]. Lane examines unlabeled data for anomaly detection by comparing the sequences of users actions during an intrusion to the users normal profile [16][17][18]. In Linux operating system, a program consists of a number of system calls, and different processes have different system calls sequences. Because the diversities of processes coding, there are difference in the order and the frequency of invocation of system calls [22]. So the speciality in the order and the frequency of system calls provides clear separation between different kinds of processes. Experiments in [5] show that short sequences of system calls of processes generate a stable signature for normal behaviors and the short range ordering of system calls appears to be remarkably consistent. This suggests a simple model of normal behaviors. 3 Intrusion Detection Based on Improved Bayesian Decision Theorem The goal of an IDS is to detect and respond to an intrusion when it happens, and is able to keep security from being disturbed by the false alarms. False negative means that when an intrusion really happens, but IDS does not catch it. A false positive is a situation where an abnormity defined by the IDS happens, but it does not turn out to be a real intrusion. Hence low false negatives and low false positives are the goal of an IDS. General IDSs often ignore the risks of false negatives and false positives. To minimize the risks, we build an intrusion detection model based on an improved Bayesian decision theorem.

3 3.1 Related Work Decision-making is needed in many domains, which has relationship with misclassification cost and class membership probability. In order to make an optimal decision, misclassification cost and class membership probability should be estimated first. In recent years, there is a substantial amount of research on cost-sensitive issue. Gaffney et al. [6] provide an expected cost metric and demonstrate that, contrary to common device, the value of an intrusion detection system and the optimal operation of that system depend not only on the system s ROC (Receiver Operating Characteristic) curve, but also on cost metrics and the probability of hostility of operating. MetaCost offers a general method for cost-sensitive learning [4], which is based on the assumption that costs are known in advance and are the same for all examples. Certainly previous research has been based on the assumption that misclassification costs are the same for all examples and known in advance, but in general these costs are example-dependent and different. For example, different mistakes in diagnosis can cause distinct risks. In medical treatment, false positives and false negatives also occur in physical examination. A positive test for AIDS or cancer, when the person is disease free, is a false positive. The person suffers psychally from the outcome that he has a disease when he actually does not. A false negative is when there actually is a disease but the results come back as negative. A finding of no cancer, when there actually is cancer, is a false negative. The patient will be devastated because he does not get the timely treatment that he needs. Obviously, the results produced by these two wrong diagnostic decisions lead to apparently different harm. These false results cannot be completely eliminated, but they can be reduced. Meanwhile, class membership probabilities need to be estimated. Class membership probabilities are example-specific and not known in advance [26]. Direct cost-sensitive decision-making is made on the assumption that any learned classifier can provide conditional probability estimates for training examples and can also provide conditional probability estimates for test examples [26]. Axelsson offers a set of data, that in diagnosis even though the test is 90% certain, the chance of actual having the disease is only 1/100, because the population of health people is much larger than the population with the disease [2]. It is the same with security field that the number of normal actions is much larger than that of intrusion actions, and the chances of a real intrusion are small, even if an intrusion decision is made. Hence, it is important to make an optimal decision to minimize the risks incurred by wrong decisions. Bayesian decision theorem is an alternative method. Traditional Bayesian decision method is applied to many fields of real life, for example, market decision to reduce management risk and to make a larger profit. This method considers the action that produces the highest expected utility or lowest expected risk to be the most appropriate [24]. However, in order to calculate the expected utilities or risk, the probability of class membership must be calculated first. This method takes into account not only the risk incurred by the actions, but also the probability of class membership which is not suit for the requirements

4 of intrusion detection. There are some intrusions that occur rarely but cause large damage. So we remove the function of probability and get the improved Bayesian decision theorem to satisfy the requirement of security problem. We choose Internet Information Service (IIS) [11] as the attack target service, and believe that experiment on other services can have the similar result. We first construct two databases (details about construction can be found in section 4.1). One is called NSCS database that contains normal system calls sequences, and the other is called ISCS database that contains intrusion system calls sequences. Several kinds of intrusion were estimated to attack the IIS, and during the intrusive process system calls sequences were recorded by Strace for NT [8]. Tables 1-4 list the experiment results. We take Table 1 as example to illustrate these tables. In Table 1, the 11 fields form a system call sequence of length 11 in ISCS database, and the sequence is NtWaitForMultipleObjects NtWaitForSingleOb ject NtWaitForMultipleObjects NtWaitForSingleObject NtWaitForSingleO bject NtWaitForSingleObject NtWaitForSingleObject NtWaitForMultipleO bjects NtWaitForSingleObject NtWaitForSingleObject NtWaitForSingleOb ject. The number in the first line in Table 1 is the total number of this sequence occurs in the experiment. In these four tables, the numbers range from to 12. Maybe some intrusions occur incidentally, but if signatures of these intrusions are matched, intrusion decision should be made. So to determine whether an intrusion occurs or not, we should remove the function of its probability. In order to meet with the special requirement of security, we improve Bayesian decision theorem, apply it to our model to consider the different losses caused by various kinds mistakes, and offer an outcome that minimizes losses and risks. 3.2 Improved Bayesian Decision Theorem Decision is more commonly called action in decision-making domain. Particular actions is denoted by a, while a set of all possible actions under consideration is denoted by Φ. Φ is defined as: Φ = {a 1, a 2,..., a c } (1) Each element in Φ incurs some loss, which is often the function of decision and state of nature. The decision table is used to denote the relationship. Table 5 is the general form of a decision table. In Table 5, w i is the ith state of nature, α j is the jth action, and λ (α j, w i ) is a risk function related to α j and w i. The quantity w, which affects the decision process, is commonly called the state of nature. In making decision it is important to consider what the possible state of nature is. The symbol Ω is used to denote the set of all possible states of nature. Then Ω = {w 1, w 2,..., w c }. (2)

5 Table 1 Seqence Sample One Number field 1 NtWaitForMultipleObjects field 2 NtWaitForSingleObject field 3 NtWaitForMultipleObjects field 4 NtWaitForSingleObject field 5 NtWaitForSingleObject field 6 NtWaitForSingleObject field 7 NtWaitForSingleObject field 8 NtWaitForMultipleObjects field 9 NtWaitForSingleObject field 10 NtWaitForSingleObject field 11 NtWaitForSingleObject Table 3 Seqence Sample Three Number 139 field 1 NtQueryInformationToken field 2 NtSetInformationThread field 3 NtOpenKey field 4 NtOpenKey field 5 NtWaitForSingleObject field 6 NtReleaseSemaphore field 7 NtPulseEvent field 8 NtQueryInformationToken field 9 NtSetInformationThread field 10 NtFsControlFile field 11 NtCreateFile Table 2 Seqence Sample Two Number field 1 NtQueryDefaultLocale field 2 NtAllocateVirtualMemory field 3 NtQueryVirtualMemory field 4 NtAllocateVirtualMemory field 5 NtQueryVirtualMemory field 6 NtFreeVirtualMemory field 7 NtDeviceIoControlFile field 8 NtRemoveIoCompletion field 9 NtDeviceIoControlFile field 10 NtDeviceIoControlFile field 11 NtDeviceIoControlFile Table 4 Seqence Sample Four Number 12 field 1 NtQueryAttributesFile field 2 NtCreateFile field 3 NtQueryVolumeInformationFile field 4 NtQueryInformationFile field 5 NtSetInformationThread field 6 NtQueryInformationToken field 7 NtSetInformationThread field 8 NtCreateFile field 9 NtSetInformationThread field 10 NtQueryInformationToken field 11 NtSetInformationThread Table 5 General Form of a Decision Table w 1 w 2... w j... w c α 1 λ (α 1, w 1 ) λ (α 1, w 2 )... λ (α 1, w j )... λ (α 1, w c ) α 2 λ (α 2, w 1 ) λ (α 2, w 2 )... λ (α 2, w j )... λ (α 2, w c ) α i λ (α i, w 1 ) λ (α i, w 2 )... λ (α i, w j )... λ (α i, w c ) α c λ (α c, w 1 ) λ (α c, w 2 )... λ (α c, w j )... λ (α c, w c ) In this model, c equals 2, w 1 denotes normal, and w 2 denotes intrusion. Accordingly a 1 means that the sequence is normal and can be passed over, and a 2 means that a signal of intrusion is emitted and that an action responds to the signal. A random variable is denoted by X, and a particular realization of X is denoted by x. x = x 1, x 2,..., x n (x i system calls) and x 1, x 2,..., x n means a sequence of system calls like x 1 x 2... x n, such as fstat64 mmap2 read... close munmap rt sigprocmask. Each x is classified into a normal sequences set or an intrusion sequences set.

6 In decision theory, a key element is the risk function. If a particular action a i is taken and w j (i, j = 1, 2,..., c) turns out to be the true state of nature, then a risk λ (α i, w j ) is incurred. λ (α 1, w 2 ) means the risk because that the sequence is ignored while it turns out to be an intrusion; λ (α 2, w 1 ) means the risk because that a signal of intrusion is emitted while the sequence turns out to be normal. λ (α 1, w 2 ) is normally larger greatly than λ (α 2, w 1 ). The traditional expected conditional risk R (α i x) can be obtained from the following formula: R (α i x) = E [λ (α i, w j )] = c j=1 λ (α i, w j ) P (w j x), i = 1, 2,..., c (3) where P (w j x) is the conditional probability of w j for a given x and can be got through Bayesian theorem: P (w i x) = p(x w i )P (w i ) c j=1 p(x w, i = 1,..., c (4) j)p (w j ) where prior probabilities P (w i ) are assumed known. Instead we replace P (w j x) in (3) by a similarity measure to get the improved Bayesian decision theorem. The similarity measure we used is similar to [16]. It differs in that we make a comparison between system calls sequences while [16] makes a comparison between command sequences. The set of normal system calls sequences is denoted by Ψ 1, and the set of intrusion system calls sequences is denoted by Ψ 2. Once Ψ 1 and Ψ 2 are formed, we compare an incoming sequence to sequences in Ψ 1 and Ψ 2 to calculate the similarity values between the observed sequence and each sequence of the two sets. If the two similarity values have wide gap, we directly classify this sequence to Ψ 1 or Ψ 2. For example, if an observed sequence x owns a similarity value 0.8 with Ψ 1 and 0.2 with Ψ 2, x is then classified into Ψ 1. Otherwise, if the two similarity values have little difference, we use Bayesian decision theorem to make a decision that this sequence is normal or not. The similarity measure simply assigns a score equal to the number of identical tokens found in the same location of the two sequences and assigns a higher score to adjacent identical token than to separated identical tokens. We define the similarity of an observed sequence x to a set of sequence, Ψ i, as: Sim(x, Ψ i ) = max Seq Ψ i {Sim(x, seq)}, i = 1,..., c (5) And sequence y is most similar to x in Ψ i. Sim(x, y) = max Seq Ψ i {Sim(x, seq)}, i = 1,..., c (6) The improved expected conditional risk R (α i x) can be obtained in (7) R (α i x) = E [λ (α i, w j )] = c j=1 λ (α i, w j ) Sim(x, Ψ i ), i = 1, 2,..., c (7)

7 Intrusions belonging to the same intrusion category have identical or similar attack principles and intrusion techniques. Therefore they have identical or similar system calls sequences and are significantly different from normal system calls sequences. Most novel attacks are variants of known attacks and the signature of known attacks can be sufficient to catch novel variants [9]. In experiment, it is easy to obtain full normal traces. However, due to the limited knowledge of known intrusions, we can only obtain the known intrusion traces. In order to detect novel intrusions, we use this similarity measure to extend the known intrusions traces to novel intrusions traces. Among these R (α 1 x), R (α 2 x),..., R (α c x), the optimal decision is a k, which is got from the following: R (α k x) = min R (α i x) (8) i=1,...,c In our model we just make a comparison between R (α 1 x) and R (α 2 x), and choose the action that bring less risk to the system. That is the improved Bayesian view of optimal decision making. We build two profile databases respectively. One is called NSCS database and the other ISCS database. Misuse intrusion detection can be achieved on the base of ISCS database, and felling back on NSCS database anomaly intrusion detection can be realized. These two kinds of detection sub-models can work independently. Through the improved Bayesian decision theorem, misuse intrusion detection and anomaly intrusion detection are combined. This improved Bayesian decision theorem brings four profits to this model. It eliminates the flaws of a narrow definition for normal patterns and intrusion patterns; extends the known intrusions patterns to novel intrusions patterns; reduces risks that detecting intrusion brings to system; and offers a method to build a compound intrusion detection model that integrates MIDS with AIDS. 4 Experiment We have this experiment on the privileged process Sendmail. Sendmail provides various services that owns relatively more leaks and tends to be controlled easily. Sendmail, which is running with root privilege, has access to more parts of the system. Therefore hackers aim at Sendmail to gain the root privilege. Obviously privileged processes need paying more attentions, and we conduct this experiment on Sendmail. Sendmail is running on a cluster with the Linux operation system in Internet and Cluster Computing Center (ICCC) at Huazhong University of Science and Technology (HUST), and Strace 4.0 for Linux [10] is used to trace processes. 4.1 Sequences Databases Construction NSCS database and ISCS database are constructed in this experiment. The implementation of NSCS database follows the method described in [5].

8 The procedure of constructing these two databases can be found in our previous work [15]. We trace Sendmail running for two months and obtain traces of a total of 5.5 million system calls sequences through selecting typical data. Table 6 lists total numbers of unique system calls sequences given different sequences length. From the table we see that the longer sequences length, the more unique system calls sequences. Table 7, 8 and 9 list some sequence samples, and the total numbers of each sequence with different sequences length. It is obvious that the longer sequences length, the smaller the total number of each sequence. Table 6 Total Numbers of Unique System Calls Sequences given Different Sequences Length total number of unique system calls sequences sequences length Table 7 Total Numbers of Sequences Samples with Length 6 sequences samples total number of each fcntl64 fcntl64 fcntl64 fcntl64 fcntl64 fcntl flock fstat64 flock flock fstat64 flock time getpid getpid stat64 lstat64 geteuid Table 8 Total Numbers of Sequences Samples with Length 9 sequences samples total number of each fcntl64 fcntl64 fcntl64 fcntl64 fcntl64 fcntl64 fcntl64 fcntl64 fcntl flock fstat64 flock flock fstat64 flock flock fstat64 flock time getpid getpid stat64 lstat64 geteuid32 lstat64 geteuid32 open Table 9 Total Numbers of Sequences Samples with Length 12 sequences samples total number of each fcntl64 fcntl64 fcntl64 fcntl64 fcntl64 fcntl64 fcntl64 fcntl64 fcntl64 fcntl64 fcntl64 fcntl flock fstat64 flock flock fstat64 flock flock fstat64 flock flock fstat64 flock time getpid getpid stat64 lstat64 geteuid32 lstat64 geteuid32 open fstat64 flock open Whereafter, we construct the ISCS database. We generate traces of three types of intrusions behaviors, which attack Sendmail effectively. The three types of intrusions include U2R (User to Root), buffer overflow and forwarding loop. The sunsendmailcp script delegating U2R uses a special command line option to cause Sendmail to append an message to a file. By using this script, a

9 local user might obtain root access. The syslog attack delegating buffer overflow uses the syslog interface to overflow a buffer in Sendmail and leaves one port for later intrusion. Forwarding loop writes special addresses and forward files to form a logical circle and to send letters from machine to machine [5]. During intrusion, intrusion system calls sequences are attained. Strace runs on Sendmail for two months to trace intrusion traces. The total intrusion system calls turns out to be 300K and the number of unique intrusion system calls sequences is about 342 with the length 6, about 420 with the length 9, and about 513 with the length Detect Known and Novel Intrusions To determine whether a system calls sequence x is normal or not, we compare x with the sequences in ISCS database and NSCS database. If Sim(x, ISCS) is not less than λ I, x is an intrusion system calls sequence; in the same way, if Sim(x, NSCS) is not less than λ N, x is a normal system calls sequence. λ N is a threshold value, above which a behavior is regarded as normal, and λ I is also a threshold value, above which it is deemed intrusion. Using similarity measure, misuse intrusion detection based on ISCS database and anomaly intrusion detection based on NSCS database can work well independently. Otherwise, we use the improved Bayesian decision theorem to make a decision. Table 10 compares the detection rates for old intrusions and new intrusions with sequences of length 12 and with different cost ratio C. Here new intrusions refer to those that do not have corresponding instances in the training data. From the table we see that detection rates of old intrusions have nothing to do with C. Because the system calls sequences of these old intrusions have been stored in ISCS database, it is easy to detect old intrusions. Whereas detection rates of news intrusions are relevant to C, and a high detection rates can be got for C between 20 and 30. Table 10 Detection Rates with Different Cost Ratio C C Category old new old new old new old new U2R Buffer Overflow Forwarding Loop Experiment on IIS Additional experiment is carried on Internet Information Service (IIS) [11]. IIS is running on a cluster with the Windows operation system and Strace for NT [8] is used to trace processes. We trace IIS running for four months free intrusions, and finally there are about unique system calls sequences in NSCS database given the sequences length 11. In order to collect raw data, Strace for NT [8] is used to record system calls sequences of IIS process, and WinDump [12] and WinPcap [13] are used to collect

10 network packets. During collecting data, several kinds of intrusion are estimated to attack the IIS: Ihttp delegating U2R attack, Iiscrash, a kind of buffer overflow attack; and others kinds of intrusions, such as DDOS and Fluxay47. Three packages, numbered 1, 2 and 3, are collected for two weeks. Each package includes traces of IIS. These three packages are used as raw data, and experiment results are shown in Table 11. The figures in Table 11 show that time consumed for detection is acceptable. Table 11 Time Consumed for Detection Size of Package Time consumed Package 1 123M 5ms Package 2 123M 6ms Package 3 203M 8ms At the first two weeks we train this model, the size of NSCS database is 5.19k, and the false alarm rata is high; three months later, the size increases to 132k, and the false alarm rata is always below 10%. It shows that the richness of NSCS database (ISCS database) has effect on the performance of this model. 5 Conclusions and Discussion In this paper, we propose a compound intrusion detection model based on improved Bayesian decision theorem to reduce false alarm rate and minimize the risks of false negatives and false positives. To achieve the goal of detection, NSCS database and ISCS database should be established first. Using similarity measure, misuse intrusion detection based on ISCS database and anomaly intrusion detection based on NSCS database can work well independently. By applying improved Bayesian decision theorem to our model, the combination of misuse intrusion detection and anomaly intrusion detection is achieved. Through the improved Bayesian decision theorem, we define the risk model to formulate the expected risk of an intrusion detection decision, and present risk sensitive machine learning techniques that can produce detection model to minimize the risks of false negatives and false positives Empirical experiments show that our model and deployment techniques are effective in reducing the overall intrusion detection risk. The results show that detection rates of new intrusions are relevant to cost ratio C, and a high detection rates can be obtained for a given C between 20 and 30. Whether NSCS database or ISCS database is rich enough influences performance of this model. As long as these databases are kept rich enough, intrusion can be checked effectively. In order to collect normal system calls sequences as many as possible, we need to trace Sendmail service long enough, keep the service out of attacks or intrusions, and require as many kinds of services of Sendmail as possible. Contrary to NSCS database, ISCS database is easier to build. Sequences that are considerably different from those in NSCS database will be

11 inserted into ISCS database. In order to deal with novel intrusions effectively, ISCS database should be maintained frequently. Although some problems exist in our model, it provides us an alternative approach to intrusion detection. We will attempt to apply other theories and techniques to intrusion detection field. References 1. S. Axelsson, Intrusion Detection Systems: A Taxonomy and Survey, Technical Report No 99-15, Dept. of Computer Engineering, Chalmers University of Technology, Sweden, March S. Axelsson, The Base-Rate Fallacy and its Implications for the Difficulty of Intrusion Detection, Proc. of the 6th ACM Conference on Computer and Communications Security, Kent Ridge Digital Labs, Singapore, November 1-4, 1999, pp G. Casella and R. Berger, Statistical Inference, Wadsworth & Brooks/Cole, Belmont, California, 1990, pp P. Domingos, Metacost: A General Method for Making Classifiers Cost-sensitive, Proc. of 5th Int. Conf. on Knowledge Discovery and Data Mining KDD, 1999, pp S. Forrest, S. A. Hofmeyr, A. Somayaji, and T. A. Longsta., A Sense of Self for Unix Processes, Proc. IEEE Symposium on Security and Privacy, Los Alamitos, CA, 1996, pp J. E. Gaffney and J. W. Ulvila, Evaluation of Intrusion Detectors: A Decision Theory Approach, Proc. of IEEE Symposium on Security and Privacy, 2001, pp L. Halme and B. Kahn, Building a Security Monitor with Adaptive User Work Profiles, Proc. of the 11th National Computer Security Conference, Washington DC, Oct, 1988, pp readme.html wichert/strace S. A. Hofmeyr, S. Forrest, and A. Somayaji, Intrusion Detection using Sequences of System Calls, Journal of Computer Security, 6, 1998, pp H. Jin, J. Sun, H. Chen, and Z. Han, A Risk-sensitive Intrusion Detection Model, Proc. of International Conference on Information Security and Cryptography (ICISC 02 ), LNCS 2587, Spinger-Verlag, 2003, pp T. Lane and C. E. Brodley, Sequence Matching and Learning in Anomaly Detection for Computer Security, Proc. of the AAAI-97 Workshop on AI Approaches to Fraud Detection and Risk Management, Menlo Park, CA: AAAI Press. 1997, pp T. Lane and C. E. Brodley, Temporal Sequence Learning and Data Reduction for Anomaly Detection, Proc. of the Fifth ACM Conference on Computer and Communications Security, 1998, pp T. Lane and C. E. Brodley, Temporal Sequence Learning and Data Reduction for Anomaly Detection, ACM Trans. on Information and System Security, 2, 1999, pp

12 19. J. Lin, X. Wang, and S. Jajodia, Abstraction-based Misuse Detection: High-level Specifications and Adaptable Strategies, Proc. of IEEE Computer Security Foundations Workshop, Rockport, MA, June 1998, pp R. P. Lippman, D. J. Fried, I. Graf, J. W. Haines, K. R. Kendall, D. McCllung, D. Weber, S. E. Webster, D. Wyschogrod, R. K. Cunningham, and M. A. Zissman, Evaluating Intrusion Detection Systems: The 1998 DARPA Off-line Intrusion Detection Evaluation, Proc. of DARPA Information Survivability Conference and Exposition, Jan 25-27, 2000, vol.2, pp T. F. Lunt, Automated Audit Trail Analysis and Intrusion Detection: A survey, Proc. of the 11th National Computer Security Conference, Baltimore, Maryland, 1988, NIST, pp Y. Okazaki, I. Sato, and S. Goto, A New Intrusion Detection Method based on Process Profiling, Proc. of the 2002 Symposium on Applications and the Internet (SAINT 02 ), pp J. Sun, H. Jin, H. Chen, and Z. Han, A Data Mining Based Intrusion Detection Model, Proc of Fourth International Conference on Intelligent Data Engineering and Automated Learning (IDEAL 03), T. Terano, K. Asai, and M. Sugeno, Fuzzy Systems Theory and Its Applications, Boston Academic Press, 1992, pp C. Warrender, S. Forrest, and B. Pearlmutter, Detecting Intrusions using System Calls: Alternative Data Models, Proc. of IEEE Symposium on Security and Privacy, 1999, pp B. Zadrozny and C. Elkan, Learning and Making Decisions When Costs and Probabilities are Both Unknown, Proc. of the Seventh International Conference on Knowledge Discovery and Data Mining (KDD 01 ), pp

EVALUATIONS OF THE EFFECTIVENESS OF ANOMALY BASED INTRUSION DETECTION SYSTEMS BASED ON AN ADAPTIVE KNN ALGORITHM

EVALUATIONS OF THE EFFECTIVENESS OF ANOMALY BASED INTRUSION DETECTION SYSTEMS BASED ON AN ADAPTIVE KNN ALGORITHM EVALUATIONS OF THE EFFECTIVENESS OF ANOMALY BASED INTRUSION DETECTION SYSTEMS BASED ON AN ADAPTIVE KNN ALGORITHM Assosiate professor, PhD Evgeniya Nikolova, BFU Assosiate professor, PhD Veselina Jecheva,

More information

ROC in Assessing IDS Quality

ROC in Assessing IDS Quality ROC in Assessing IDS Quality Rune Hammersland {firstname.lastname}@hig.no Norwegian Information Security Lab, Gjøvik University College November 30, 2007 1 Terms For assessing the quality of IDS systems,

More information

CSE543 - Computer and Network Security Module: Intrusion Detection

CSE543 - Computer and Network Security Module: Intrusion Detection CSE543 - Computer and Network Security Module: Intrusion Detection Professor Trent Jaeger 1 Intrusion An authorized action... that exploits a vulnerability... that causes a compromise... and thus a successful

More information

Modeling System Calls for Intrusion Detection with Dynamic Window Sizes

Modeling System Calls for Intrusion Detection with Dynamic Window Sizes Modeling System Calls for Intrusion Detection with Dynamic Window Sizes Eleazar Eskin Computer Science Department Columbia University 5 West 2th Street, New York, NY 27 eeskin@cs.columbia.edu Salvatore

More information

CSE543 - Computer and Network Security Module: Intrusion Detection

CSE543 - Computer and Network Security Module: Intrusion Detection CSE543 - Computer and Network Security Module: Intrusion Detection Professor Trent Jaeger CMPSC443 - Introduction to Computer and Network Security 1 2 Intrusion An authorized action... that exploits a

More information

Modeling System Calls for Intrusion Detection with Dynamic Window Sizes

Modeling System Calls for Intrusion Detection with Dynamic Window Sizes Modeling System Calls for Intrusion Detection with Dynamic Window Sizes Eleazar Eskin Computer Science Department Columbia University 5 West 2th Street, New York, NY 27 eeskin@cs.columbia.edu Salvatore

More information

Outlier Detection Using Unsupervised and Semi-Supervised Technique on High Dimensional Data

Outlier Detection Using Unsupervised and Semi-Supervised Technique on High Dimensional Data Outlier Detection Using Unsupervised and Semi-Supervised Technique on High Dimensional Data Ms. Gayatri Attarde 1, Prof. Aarti Deshpande 2 M. E Student, Department of Computer Engineering, GHRCCEM, University

More information

I R TECHNICAL RESEARCH REPORT. Detection and Classification of Network Intrusions using Hidden Markov Models. by Svetlana Radosavac, John S.

I R TECHNICAL RESEARCH REPORT. Detection and Classification of Network Intrusions using Hidden Markov Models. by Svetlana Radosavac, John S. TECHNICAL RESEARCH REPORT Detection and Classification of Network Intrusions using Hidden Markov Models by Svetlana Radosavac, John S. Baras TR 2003-6 I R INSTITUTE FOR SYSTEMS RESEARCH ISR develops, applies

More information

Hybrid Feature Selection for Modeling Intrusion Detection Systems

Hybrid Feature Selection for Modeling Intrusion Detection Systems Hybrid Feature Selection for Modeling Intrusion Detection Systems Srilatha Chebrolu, Ajith Abraham and Johnson P Thomas Department of Computer Science, Oklahoma State University, USA ajith.abraham@ieee.org,

More information

Formulation of a Heuristic Rule for Misuse and Anomaly Detection for U2R Attacks in Solaris TM Operating System Environment

Formulation of a Heuristic Rule for Misuse and Anomaly Detection for U2R Attacks in Solaris TM Operating System Environment Formulation of a Heuristic Rule for Misuse and Anomaly Detection for U2R Attacks in Solaris TM Operating System Environment Maheshkumar Sabhnani EECS Dept, University of Toledo Toledo, Ohio 43606 USA Gursel

More information

Modeling Intrusion Detection Systems With Machine Learning And Selected Attributes

Modeling Intrusion Detection Systems With Machine Learning And Selected Attributes Modeling Intrusion Detection Systems With Machine Learning And Selected Attributes Thaksen J. Parvat USET G.G.S.Indratrastha University Dwarka, New Delhi 78 pthaksen.sit@sinhgad.edu Abstract Intrusion

More information

Measuring Intrusion Detection Capability: An Information- Theoretic Approach

Measuring Intrusion Detection Capability: An Information- Theoretic Approach Measuring Intrusion Detection Capability: An Information- Theoretic Approach Guofei Gu, Prahlad Fogla, David Dagon, Wenke Lee Georgia Tech Boris Skoric Philips Research Lab Outline Motivation Problem Why

More information

A Network Intrusion Detection System Architecture Based on Snort and. Computational Intelligence

A Network Intrusion Detection System Architecture Based on Snort and. Computational Intelligence 2nd International Conference on Electronics, Network and Computer Engineering (ICENCE 206) A Network Intrusion Detection System Architecture Based on Snort and Computational Intelligence Tao Liu, a, Da

More information

Statistical Analysis in Syslog Files in DNS and Spam SMTP Relay Servers

Statistical Analysis in Syslog Files in DNS and Spam SMTP Relay Servers Statistical Analysis in Syslog Files in DNS and Spam SMTP Relay Servers Ryuichi Matsuba, Yasuo Musashi, and Kenichi Sugitani Center for Multimedia and Information Technologies, Kumamoto University, Kurokami,

More information

Effective Intrusion Type Identification with Edit Distance for HMM-Based Anomaly Detection System

Effective Intrusion Type Identification with Edit Distance for HMM-Based Anomaly Detection System Effective Intrusion Type Identification with Edit Distance for HMM-Based Anomaly Detection System Ja-Min Koo and Sung-Bae Cho Dept. of Computer Science, Yonsei University, Shinchon-dong, Seodaemoon-ku,

More information

McPAD and HMM-Web: two different approaches for the detection of attacks against Web applications

McPAD and HMM-Web: two different approaches for the detection of attacks against Web applications McPAD and HMM-Web: two different approaches for the detection of attacks against Web applications Davide Ariu, Igino Corona, Giorgio Giacinto, Fabio Roli University of Cagliari, Dept. of Electrical and

More information

Means for Intrusion Detection. Intrusion Detection. INFO404 - Lecture 13. Content

Means for Intrusion Detection. Intrusion Detection. INFO404 - Lecture 13. Content Intrusion Detection INFO404 - Lecture 13 21.04.2009 nfoukia@infoscience.otago.ac.nz Content Definition Network vs. Host IDS Misuse vs. Behavior Based IDS Means for Intrusion Detection Definitions (1) Intrusion:

More information

Bayesian Learning Networks Approach to Cybercrime Detection

Bayesian Learning Networks Approach to Cybercrime Detection Bayesian Learning Networks Approach to Cybercrime Detection N S ABOUZAKHAR, A GANI and G MANSON The Centre for Mobile Communications Research (C4MCR), University of Sheffield, Sheffield Regent Court, 211

More information

Payoff Based IDS Evaluation

Payoff Based IDS Evaluation Payoff Based IDS Evaluation Michael Collins RedJack, LLC Abstract IDS are regularly evaluated by comparing their false positive and false negative rates on ROC curves. However, this mechanism generally

More information

The Comparative Study of Machine Learning Algorithms in Text Data Classification*

The Comparative Study of Machine Learning Algorithms in Text Data Classification* The Comparative Study of Machine Learning Algorithms in Text Data Classification* Wang Xin School of Science, Beijing Information Science and Technology University Beijing, China Abstract Classification

More information

A Hybrid Approach for Misbehavior Detection in Wireless Ad-Hoc Networks

A Hybrid Approach for Misbehavior Detection in Wireless Ad-Hoc Networks A Hybrid Approach for Misbehavior Detection in Wireless Ad-Hoc Networks S. Balachandran, D. Dasgupta, L. Wang Intelligent Security Systems Research Lab Department of Computer Science The University of

More information

International Journal of Scientific & Engineering Research, Volume 4, Issue 7, July-2013 ISSN

International Journal of Scientific & Engineering Research, Volume 4, Issue 7, July-2013 ISSN 1 Review: Boosting Classifiers For Intrusion Detection Richa Rawat, Anurag Jain ABSTRACT Network and host intrusion detection systems monitor malicious activities and the management station is a technique

More information

Review on Data Mining Techniques for Intrusion Detection System

Review on Data Mining Techniques for Intrusion Detection System Review on Data Mining Techniques for Intrusion Detection System Sandeep D 1, M. S. Chaudhari 2 Research Scholar, Dept. of Computer Science, P.B.C.E, Nagpur, India 1 HoD, Dept. of Computer Science, P.B.C.E,

More information

Lecture Notes on Critique of 1998 and 1999 DARPA IDS Evaluations

Lecture Notes on Critique of 1998 and 1999 DARPA IDS Evaluations Lecture Notes on Critique of 1998 and 1999 DARPA IDS Evaluations Prateek Saxena March 3 2008 1 The Problems Today s lecture is on the discussion of the critique on 1998 and 1999 DARPA IDS evaluations conducted

More information

Intrusion Detection Using Data Mining Technique (Classification)

Intrusion Detection Using Data Mining Technique (Classification) Intrusion Detection Using Data Mining Technique (Classification) Dr.D.Aruna Kumari Phd 1 N.Tejeswani 2 G.Sravani 3 R.Phani Krishna 4 1 Associative professor, K L University,Guntur(dt), 2 B.Tech(1V/1V),ECM,

More information

A Data Mining Approach for Intrusion Detection System Using Boosted Decision Tree Approach

A Data Mining Approach for Intrusion Detection System Using Boosted Decision Tree Approach A Data Mining Approach for Intrusion Detection System Using Boosted Decision Tree Approach 1 Priyanka B Bera, 2 Ishan K Rajani, 1 P.G. Student, 2 Professor, 1 Department of Computer Engineering, 1 D.I.E.T,

More information

Incompatibility Dimensions and Integration of Atomic Commit Protocols

Incompatibility Dimensions and Integration of Atomic Commit Protocols The International Arab Journal of Information Technology, Vol. 5, No. 4, October 2008 381 Incompatibility Dimensions and Integration of Atomic Commit Protocols Yousef Al-Houmaily Department of Computer

More information

Artificial Immune System against Viral Attack

Artificial Immune System against Viral Attack Artificial Immune System against Viral Attack Hyungjoon Lee 1, Wonil Kim 2*, and Manpyo Hong 1 1 Digital Vaccine Lab, G,raduated School of Information and Communication Ajou University, Suwon, Republic

More information

Handling Web and Database Requests Using Fuzzy Rules for Anomaly Intrusion Detection

Handling Web and Database Requests Using Fuzzy Rules for Anomaly Intrusion Detection Journal of Computer Science 7 (2): 255-261, 2011 ISSN 1549-3636 2011 Science Publications Handling Web and Database Requests Using Fuzzy Rules for Anomaly Intrusion Detection Selvamani Kadirvelu and Kannan

More information

Feature selection using closeness to centers for network intrusion detection

Feature selection using closeness to centers for network intrusion detection Feature selection using closeness to centers for network intrusion detection 1 S. Sethuramalingam, 2 Dr. E.R. Naganathan 1 Department of Computer Science, Aditanar College, Tiruchur, India 2 Department

More information

A Sense of Self for Unix Processes

A Sense of Self for Unix Processes A Sense of Self for Unix Processes Stepannie Forrest,Steven A. Hofmeyr, Anil Somayaji, Thomas A. Longstaff Presenter: Ge Ruan Overview This paper presents an intrusion detection algorithm which is learned

More information

DUE TO advances in information-communication technology,

DUE TO advances in information-communication technology, IEEE TRANSACTIONS ON SYSTEMS, MAN, AND CYBERNETICS PART B: CYBERNETICS, VOL. 36, NO. 3, JUNE 2006 559 Evolutionary Neural Networks for Anomaly Detection Based on the Behavior of a Program Sang-Jun Han

More information

Data Mining Based Online Intrusion Detection

Data Mining Based Online Intrusion Detection International Journal of Engineering Research and Development e-issn: 2278-067X, p-issn: 2278-800X, www.ijerd.com Volume 3, Issue 12 (September 2012), PP. 59-63 Data Mining Based Online Intrusion Detection

More information

DNS Query Access and Backscattering SMTP Distributed Denial-of-Service Attack

DNS Query Access and Backscattering SMTP Distributed Denial-of-Service Attack DNS Query Access and Backscattering SMTP Distributed Denial-of-Service Attack Yasuo Musashi, Ryuichi Matsuba, and Kenichi Sugitani Center for Multimedia and Information Technologies, Kumamoto University,

More information

An Agent based Intrusion Detection System for Wireless Sensor Networks Using Multilevel Classification

An Agent based Intrusion Detection System for Wireless Sensor Networks Using Multilevel Classification Vol.2, Issue.1, pp-055-059 ISSN: 2249-6645 An Agent based Intrusion Detection System for Wireless Sensor Networks Using Multilevel Classification K.Kulothungan 1, S.Ganapathy 2, P.Yogesh 3 and A.Kannan

More information

A STUDY OF ANOMALY INTRUSION DETECTION USING MACHINE LEARNING TECHNIQUES

A STUDY OF ANOMALY INTRUSION DETECTION USING MACHINE LEARNING TECHNIQUES A STUDY OF ANOMALY INTRUSION DETECTION USING MACHINE LEARNING TECHNIQUES Zakiya Malek, Dr. Bhushan Trivedi GLS Institute of Technology Abstract-In the era of information systems and internet there is more

More information

Emerging Measures in Preserving Privacy for Publishing The Data

Emerging Measures in Preserving Privacy for Publishing The Data Emerging Measures in Preserving Privacy for Publishing The Data K.SIVARAMAN 1 Assistant Professor, Dept. of Computer Science, BIST, Bharath University, Chennai -600073 1 ABSTRACT: The information in the

More information

Technical Aspects of Intrusion Detection Techniques

Technical Aspects of Intrusion Detection Techniques Technical Aspects of Intrusion Detection Techniques Final Year Project 2003-04 Project Plan Version 0.2 28th, November 2003 By Cheung Lee Man 2001572141 Computer Science and Information Systems Supervisor

More information

Introduction Challenges with using ML Guidelines for using ML Conclusions

Introduction Challenges with using ML Guidelines for using ML Conclusions Introduction Challenges with using ML Guidelines for using ML Conclusions Misuse detection Exact descriptions of known bad behavior Anomaly detection Deviations from profiles of normal behavior First proposed

More information

Query-Sensitive Similarity Measure for Content-Based Image Retrieval

Query-Sensitive Similarity Measure for Content-Based Image Retrieval Query-Sensitive Similarity Measure for Content-Based Image Retrieval Zhi-Hua Zhou Hong-Bin Dai National Laboratory for Novel Software Technology Nanjing University, Nanjing 2193, China {zhouzh, daihb}@lamda.nju.edu.cn

More information

Fault Identification from Web Log Files by Pattern Discovery

Fault Identification from Web Log Files by Pattern Discovery ABSTRACT International Journal of Scientific Research in Computer Science, Engineering and Information Technology 2017 IJSRCSEIT Volume 2 Issue 2 ISSN : 2456-3307 Fault Identification from Web Log Files

More information

Systematic Detection And Resolution Of Firewall Policy Anomalies

Systematic Detection And Resolution Of Firewall Policy Anomalies Systematic Detection And Resolution Of Firewall Policy Anomalies 1.M.Madhuri 2.Knvssk Rajesh Dept.of CSE, Kakinada institute of Engineering & Tech., Korangi, kakinada, E.g.dt, AP, India. Abstract: In this

More information

Rough Set Approaches to Rule Induction from Incomplete Data

Rough Set Approaches to Rule Induction from Incomplete Data Proceedings of the IPMU'2004, the 10th International Conference on Information Processing and Management of Uncertainty in Knowledge-Based Systems, Perugia, Italy, July 4 9, 2004, vol. 2, 923 930 Rough

More information

Polygraph: Automatically Generating Signatures for Polymorphic Worms

Polygraph: Automatically Generating Signatures for Polymorphic Worms Polygraph: Automatically Generating Signatures for Polymorphic Worms James Newsome Brad Karp Dawn Song Presented by: Jeffrey Kirby Overview Motivation Polygraph Signature Generation Algorithm Evaluation

More information

A Rough Set Approach for Generation and Validation of Rules for Missing Attribute Values of a Data Set

A Rough Set Approach for Generation and Validation of Rules for Missing Attribute Values of a Data Set A Rough Set Approach for Generation and Validation of Rules for Missing Attribute Values of a Data Set Renu Vashist School of Computer Science and Engineering Shri Mata Vaishno Devi University, Katra,

More information

The Evolution of System-call Monitoring

The Evolution of System-call Monitoring The Evolution of System-call Monitoring Stephanie Forrest Steven Hofmeyr Anil Somayaji December, 2008 Outline of Talk A sense of self for Unix processes (Review) Emphasize method rather than results Evolutionary

More information

Internet Threat Detection System Using Bayesian Estimation

Internet Threat Detection System Using Bayesian Estimation Internet Threat Detection System Using Bayesian Estimation Masaki Ishiguro 1 Hironobu Suzuki 2 Ichiro Murase 1 Hiroyuki Ohno 3 Abstract. We present an Internet security threat detection system 4 using

More information

Improved Classification of Known and Unknown Network Traffic Flows using Semi-Supervised Machine Learning

Improved Classification of Known and Unknown Network Traffic Flows using Semi-Supervised Machine Learning Improved Classification of Known and Unknown Network Traffic Flows using Semi-Supervised Machine Learning Timothy Glennan, Christopher Leckie, Sarah M. Erfani Department of Computing and Information Systems,

More information

A study on fuzzy intrusion detection

A study on fuzzy intrusion detection A study on fuzzy intrusion detection J.T. Yao S.L. Zhao L. V. Saxton Department of Computer Science University of Regina Regina, Saskatchewan, Canada S4S 0A2 E-mail: [jtyao,zhao200s,saxton]@cs.uregina.ca

More information

Learning Rules from System Call Arguments and Sequences for Anomaly Detection

Learning Rules from System Call Arguments and Sequences for Anomaly Detection Learning Rules from System Call Arguments and Sequences for Anomaly Detection Gaurav Tandon and Philip Chan Department of Computer Sciences Technical Report CS-2003-20 Florida Institute of Technology Melbourne,

More information

Combination of PCA with SMOTE Resampling to Boost the Prediction Rate in Lung Cancer Dataset

Combination of PCA with SMOTE Resampling to Boost the Prediction Rate in Lung Cancer Dataset International Journal of Computer Applications (0975 8887) Combination of PCA with SMOTE Resampling to Boost the Prediction Rate in Lung Cancer Dataset Mehdi Naseriparsa Islamic Azad University Tehran

More information

Anomaly Detection on Data Streams with High Dimensional Data Environment

Anomaly Detection on Data Streams with High Dimensional Data Environment Anomaly Detection on Data Streams with High Dimensional Data Environment Mr. D. Gokul Prasath 1, Dr. R. Sivaraj, M.E, Ph.D., 2 Department of CSE, Velalar College of Engineering & Technology, Erode 1 Assistant

More information

Intrusion Detection Issues and Technologies

Intrusion Detection Issues and Technologies Intrusion Detection Issues and Technologies Julie J.C.H. Ryan, D.Sc. Presented to the Department of Veteran Affairs InfoSec2002 New Orleans May 2002 Detecting Intrusions Detection is one phase of security

More information

Automated Information Retrieval System Using Correlation Based Multi- Document Summarization Method

Automated Information Retrieval System Using Correlation Based Multi- Document Summarization Method Automated Information Retrieval System Using Correlation Based Multi- Document Summarization Method Dr.K.P.Kaliyamurthie HOD, Department of CSE, Bharath University, Tamilnadu, India ABSTRACT: Automated

More information

Pseudonym Based Security Architecture for Wireless Mesh Network

Pseudonym Based Security Architecture for Wireless Mesh Network IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 16, Issue 4, Ver. VII (Jul Aug. 2014), PP 01-05 Pseudonym Based Security Architecture for Wireless Mesh Network

More information

An advanced data leakage detection system analyzing relations between data leak activity

An advanced data leakage detection system analyzing relations between data leak activity An advanced data leakage detection system analyzing relations between data leak activity Min-Ji Seo 1 Ph. D. Student, Software Convergence Department, Soongsil University, Seoul, 156-743, Korea. 1 Orcid

More information

ANALYSIS AND EVALUATION OF DISTRIBUTED DENIAL OF SERVICE ATTACKS IDENTIFICATION METHODS

ANALYSIS AND EVALUATION OF DISTRIBUTED DENIAL OF SERVICE ATTACKS IDENTIFICATION METHODS ANALYSIS AND EVALUATION OF DISTRIBUTED DENIAL OF SERVICE ATTACKS IDENTIFICATION METHODS Saulius Grusnys, Ingrida Lagzdinyte Kaunas University of Technology, Department of Computer Networks, Studentu 50,

More information

Intrusion Detection Systems (IDS)

Intrusion Detection Systems (IDS) Intrusion Detection Systems (IDS) Presented by Erland Jonsson Department of Computer Science and Engineering Intruders & Attacks Cyber criminals Activists State-sponsored organizations Advanced Persistent

More information

Detection and Deletion of Outliers from Large Datasets

Detection and Deletion of Outliers from Large Datasets Detection and Deletion of Outliers from Large Datasets Nithya.Jayaprakash 1, Ms. Caroline Mary 2 M. tech Student, Dept of Computer Science, Mohandas College of Engineering and Technology, India 1 Assistant

More information

Detection of Mass Mailing Worm-infected IP address by Analysis of Syslog for DNS server

Detection of Mass Mailing Worm-infected IP address by Analysis of Syslog for DNS server DNS syslog IP : - DNS syslog : (1) PC A MX DNS (2) UNIX PC spam A MX PTR DNS DNS PC Detection of Mass Mailing Worm-infected IP address by Analysis of Syslog for DNS server Ryuichi Matsuba, Yasuo Musashi,

More information

Intrusion Detection System using AI and Machine Learning Algorithm

Intrusion Detection System using AI and Machine Learning Algorithm Intrusion Detection System using AI and Machine Learning Algorithm Syam Akhil Repalle 1, Venkata Ratnam Kolluru 2 1 Student, Department of Electronics and Communication Engineering, Koneru Lakshmaiah Educational

More information

Iterative Removing Salt and Pepper Noise based on Neighbourhood Information

Iterative Removing Salt and Pepper Noise based on Neighbourhood Information Iterative Removing Salt and Pepper Noise based on Neighbourhood Information Liu Chun College of Computer Science and Information Technology Daqing Normal University Daqing, China Sun Bishen Twenty-seventh

More information

Identifying Stable File Access Patterns

Identifying Stable File Access Patterns Identifying Stable File Access Patterns Purvi Shah Jehan-François Pâris 1 Ahmed Amer 2 Darrell D. E. Long 3 University of Houston University of Houston University of Pittsburgh U. C. Santa Cruz purvi@cs.uh.edu

More information

A Linear Regression Model for Assessing the Ranking of Web Sites Based on Number of Visits

A Linear Regression Model for Assessing the Ranking of Web Sites Based on Number of Visits A Linear Regression Model for Assessing the Ranking of Web Sites Based on Number of Visits Dowming Yeh, Pei-Chen Sun, and Jia-Wen Lee National Kaoshiung Normal University Kaoshiung, Taiwan 802, Republic

More information

Web page recommendation using a stochastic process model

Web page recommendation using a stochastic process model Data Mining VII: Data, Text and Web Mining and their Business Applications 233 Web page recommendation using a stochastic process model B. J. Park 1, W. Choi 1 & S. H. Noh 2 1 Computer Science Department,

More information

A taxonomy of race. D. P. Helmbold, C. E. McDowell. September 28, University of California, Santa Cruz. Santa Cruz, CA

A taxonomy of race. D. P. Helmbold, C. E. McDowell. September 28, University of California, Santa Cruz. Santa Cruz, CA A taxonomy of race conditions. D. P. Helmbold, C. E. McDowell UCSC-CRL-94-34 September 28, 1994 Board of Studies in Computer and Information Sciences University of California, Santa Cruz Santa Cruz, CA

More information

Cell-to-switch assignment in. cellular networks. barebones particle swarm optimization

Cell-to-switch assignment in. cellular networks. barebones particle swarm optimization Cell-to-switch assignment in cellular networks using barebones particle swarm optimization Sotirios K. Goudos a), Konstantinos B. Baltzis, Christos Bachtsevanidis, and John N. Sahalos RadioCommunications

More information

Applying Bag of System Calls for Anomalous Behavior Detection of Applications in Linux Containers

Applying Bag of System Calls for Anomalous Behavior Detection of Applications in Linux Containers Applying Bag of System Calls for Anomalous Behavior Detection of Applications in Linux Containers arxiv:1611.03053v1 [cs.cr] 9 Nov 2016 Amr S. Abed Department of Electrical & Computer Engineering Virginia

More information

Online Intrusion Alert Based on Aggregation and Correlation

Online Intrusion Alert Based on Aggregation and Correlation Online Intrusion Alert Based on Aggregation and Correlation Kunchakarra Anusha 1, K.V.D.Sagar 2 1 Pursuing M.Tech(CSE), Nalanda Institute of Engineering & Technology,Siddharth Nagar, Sattenapalli, Guntur.,

More information

A New Technique to Optimize User s Browsing Session using Data Mining

A New Technique to Optimize User s Browsing Session using Data Mining Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 3, March 2015,

More information

Intrusion Detection Systems

Intrusion Detection Systems Intrusion Detection Systems Dr. Ahmad Almulhem Computer Engineering Department, KFUPM Spring 2008 Ahmad Almulhem - Network Security Engineering - 2008 1 / 15 Outline 1 Introduction Overview History 2 Types

More information

Model Generation for an Intrusion Detection System Using Genetic Algorithms

Model Generation for an Intrusion Detection System Using Genetic Algorithms Model Generation for an Intrusion Detection System Using Genetic Algorithms Adhitya Chittur November 27, 2001 Ossining High School Ossining, NY Summary As malicious intrusions (commonly termed hacks )

More information

A Survey on Postive and Unlabelled Learning

A Survey on Postive and Unlabelled Learning A Survey on Postive and Unlabelled Learning Gang Li Computer & Information Sciences University of Delaware ligang@udel.edu Abstract In this paper we survey the main algorithms used in positive and unlabeled

More information

THE BAYESIAN RECEIVER OPERATING CHARACTERISTIC CURVE AN EFFECTIVE APPROACH TO EVALUATE THE IDS PERFORMANCE

THE BAYESIAN RECEIVER OPERATING CHARACTERISTIC CURVE AN EFFECTIVE APPROACH TO EVALUATE THE IDS PERFORMANCE БСУ Международна конференция - 2 THE BAYESIAN RECEIVER OPERATING CHARACTERISTIC CURVE AN EFFECTIVE APPROACH TO EVALUATE THE IDS PERFORMANCE Evgeniya Nikolova, Veselina Jecheva Burgas Free University Abstract:

More information

CHAPTER 3 A FAST K-MODES CLUSTERING ALGORITHM TO WAREHOUSE VERY LARGE HETEROGENEOUS MEDICAL DATABASES

CHAPTER 3 A FAST K-MODES CLUSTERING ALGORITHM TO WAREHOUSE VERY LARGE HETEROGENEOUS MEDICAL DATABASES 70 CHAPTER 3 A FAST K-MODES CLUSTERING ALGORITHM TO WAREHOUSE VERY LARGE HETEROGENEOUS MEDICAL DATABASES 3.1 INTRODUCTION In medical science, effective tools are essential to categorize and systematically

More information

Based on the fusion of neural network algorithm in the application of the anomaly detection

Based on the fusion of neural network algorithm in the application of the anomaly detection , pp.28-34 http://dx.doi.org/10.14257/astl.2016.134.05 Based on the fusion of neural network algorithm in the application of the anomaly detection Zhu YuanZhong Electrical and Information Engineering Department

More information

Pyrite or gold? It takes more than a pick and shovel

Pyrite or gold? It takes more than a pick and shovel Pyrite or gold? It takes more than a pick and shovel SEI/CERT -CyLab Carnegie Mellon University 20 August 2004 John McHugh, and a cast of thousands Pyrite or Gold? Failed promises Data mining and machine

More information

Intrusion Detection System based on Support Vector Machine and BN-KDD Data Set

Intrusion Detection System based on Support Vector Machine and BN-KDD Data Set Intrusion Detection System based on Support Vector Machine and BN-KDD Data Set Razieh Baradaran, Department of information technology, university of Qom, Qom, Iran R.baradaran@stu.qom.ac.ir Mahdieh HajiMohammadHosseini,

More information

An Approach for Privacy Preserving in Association Rule Mining Using Data Restriction

An Approach for Privacy Preserving in Association Rule Mining Using Data Restriction International Journal of Engineering Science Invention Volume 2 Issue 1 January. 2013 An Approach for Privacy Preserving in Association Rule Mining Using Data Restriction Janakiramaiah Bonam 1, Dr.RamaMohan

More information

2. INTRUDER DETECTION SYSTEMS

2. INTRUDER DETECTION SYSTEMS 1. INTRODUCTION It is apparent that information technology is the backbone of many organizations, small or big. Since they depend on information technology to drive their business forward, issues regarding

More information

Hiding Intrusions: From the Abnormal to the Normal and Beyond

Hiding Intrusions: From the Abnormal to the Normal and Beyond Hiding Intrusions: From the Abnormal to the Normal and Beyond Kymie Tan 1,JohnMcHugh 2, and Kevin Killourhy 1 1 Carnegie Mellon University, Department of Computer Science Pittsburgh, PA 15213 USA {kmct,ksk}@cs.cmu.edu,

More information

A Conflict-Based Confidence Measure for Associative Classification

A Conflict-Based Confidence Measure for Associative Classification A Conflict-Based Confidence Measure for Associative Classification Peerapon Vateekul and Mei-Ling Shyu Department of Electrical and Computer Engineering University of Miami Coral Gables, FL 33124, USA

More information

A Comparison Between the Silhouette Index and the Davies-Bouldin Index in Labelling IDS Clusters

A Comparison Between the Silhouette Index and the Davies-Bouldin Index in Labelling IDS Clusters A Comparison Between the Silhouette Index and the Davies-Bouldin Index in Labelling IDS Clusters Slobodan Petrović NISlab, Department of Computer Science and Media Technology, Gjøvik University College,

More information

A Knowledge-based Alert Evaluation and Security Decision Support Framework 1

A Knowledge-based Alert Evaluation and Security Decision Support Framework 1 A Knowledge-based Alert Evaluation and Security Decision Support Framework 1 Jinqiao Yu Department of Mathematics and Computer Science Illinois Wesleyan Univerisity P.O.Box 2900 Bloomington, IL 61701 Ramana

More information

CS395/495 Computer Security Project #2

CS395/495 Computer Security Project #2 CS395/495 Computer Security Project #2 Important Dates Out: 1/19/2005 Due: 2/15/2005 11:59pm Winter 2005 Project Overview Intrusion Detection System (IDS) is a common tool to detect the malicious activity

More information

Intelligent Risk Identification and Analysis in IT Network Systems

Intelligent Risk Identification and Analysis in IT Network Systems Intelligent Risk Identification and Analysis in IT Network Systems Masoud Mohammadian University of Canberra, Faculty of Information Sciences and Engineering, Canberra, ACT 2616, Australia masoud.mohammadian@canberra.edu.au

More information

Analysis of Dendrogram Tree for Identifying and Visualizing Trends in Multi-attribute Transactional Data

Analysis of Dendrogram Tree for Identifying and Visualizing Trends in Multi-attribute Transactional Data Analysis of Dendrogram Tree for Identifying and Visualizing Trends in Multi-attribute Transactional Data D.Radha Rani 1, A.Vini Bharati 2, P.Lakshmi Durga Madhuri 3, M.Phaneendra Babu 4, A.Sravani 5 Department

More information

Overview Intrusion Detection Systems and Practices

Overview Intrusion Detection Systems and Practices Overview Intrusion Detection Systems and Practices Chapter 13 Lecturer: Pei-yih Ting Intrusion Detection Concepts Dealing with Intruders Detecting Intruders Principles of Intrusions and IDS The IDS Taxonomy

More information

Approach Using Genetic Algorithm for Intrusion Detection System

Approach Using Genetic Algorithm for Intrusion Detection System Approach Using Genetic Algorithm for Intrusion Detection System 544 Abhijeet Karve Government College of Engineering, Aurangabad, Dr. Babasaheb Ambedkar Marathwada University, Aurangabad, Maharashtra-

More information

Temporal Weighted Association Rule Mining for Classification

Temporal Weighted Association Rule Mining for Classification Temporal Weighted Association Rule Mining for Classification Purushottam Sharma and Kanak Saxena Abstract There are so many important techniques towards finding the association rules. But, when we consider

More information

Behavior-based Authentication Systems. Multimedia Security

Behavior-based Authentication Systems. Multimedia Security Behavior-based Authentication Systems Multimedia Security Part 1: User Authentication Through Typing Biometrics Features Part 2: User Re-Authentication via Mouse Movements 2 User Authentication Through

More information

pirically,we sh ow that this approachsuffices for intrusion detection data obtained from live environments. In addition, because the intrusion detecti

pirically,we sh ow that this approachsuffices for intrusion detection data obtained from live environments. In addition, because the intrusion detecti Anomaly Detection over Noisy Data using Learned Probability Distributions Eleazar Eskin eeskin@cs.columbia.edu Computer Science Department, Columbia University, 45 CS Building, 5 W. 2thst., New York, NY

More information

CHAPTER 5 CONTRIBUTORY ANALYSIS OF NSL-KDD CUP DATA SET

CHAPTER 5 CONTRIBUTORY ANALYSIS OF NSL-KDD CUP DATA SET CHAPTER 5 CONTRIBUTORY ANALYSIS OF NSL-KDD CUP DATA SET 5 CONTRIBUTORY ANALYSIS OF NSL-KDD CUP DATA SET An IDS monitors the network bustle through incoming and outgoing data to assess the conduct of data

More information

Anomaly Detection. You Chen

Anomaly Detection. You Chen Anomaly Detection You Chen 1 Two questions: (1) What is Anomaly Detection? (2) What are Anomalies? Anomaly detection refers to the problem of finding patterns in data that do not conform to expected behavior

More information

EFFECTIVE INTRUSION DETECTION AND REDUCING SECURITY RISKS IN VIRTUAL NETWORKS (EDSV)

EFFECTIVE INTRUSION DETECTION AND REDUCING SECURITY RISKS IN VIRTUAL NETWORKS (EDSV) Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 8, August 2014,

More information

Intrusion Detection and Malware Analysis

Intrusion Detection and Malware Analysis Intrusion Detection and Malware Analysis Anomaly-based IDS Pavel Laskov Wilhelm Schickard Institute for Computer Science Taxonomy of anomaly-based IDS Features: Packet headers Byte streams Syntactic events

More information

Evaluating Intrusion Detection Systems without Attacking your Friends: The 1998 DARPA Intrusion Detection Evaluation

Evaluating Intrusion Detection Systems without Attacking your Friends: The 1998 DARPA Intrusion Detection Evaluation Evaluating Intrusion Detection Systems without Attacking your Friends: The 1998 DARPA Intrusion Detection Evaluation R. K. Cunningham, R. P. Lippmann, D. J. Fried, S. L. Garfinkel, I. Graf, K. R. Kendall,

More information

A Novel Approach of Mining Write-Prints for Authorship Attribution in Forensics

A Novel Approach of Mining Write-Prints for Authorship Attribution in  Forensics DIGITAL FORENSIC RESEARCH CONFERENCE A Novel Approach of Mining Write-Prints for Authorship Attribution in E-mail Forensics By Farkhund Iqbal, Rachid Hadjidj, Benjamin Fung, Mourad Debbabi Presented At

More information

A Novel Statistical Distortion Model Based on Mixed Laplacian and Uniform Distribution of Mpeg-4 FGS

A Novel Statistical Distortion Model Based on Mixed Laplacian and Uniform Distribution of Mpeg-4 FGS A Novel Statistical Distortion Model Based on Mixed Laplacian and Uniform Distribution of Mpeg-4 FGS Xie Li and Wenjun Zhang Institute of Image Communication and Information Processing, Shanghai Jiaotong

More information

An Intelligent Clustering Algorithm for High Dimensional and Highly Overlapped Photo-Thermal Infrared Imaging Data

An Intelligent Clustering Algorithm for High Dimensional and Highly Overlapped Photo-Thermal Infrared Imaging Data An Intelligent Clustering Algorithm for High Dimensional and Highly Overlapped Photo-Thermal Infrared Imaging Data Nian Zhang and Lara Thompson Department of Electrical and Computer Engineering, University

More information