首页> 外文会议>Proceedings of the International Conference on Security and Management(SAM'03) >KDD Feature Set Complaint Heuristic Rules for R2L Attack Detection
【24h】

KDD Feature Set Complaint Heuristic Rules for R2L Attack Detection

机译:用于R2L攻击检测的KDD功能集投诉启发式规则

获取原文
获取原文并翻译 | 示例

摘要

Automated rule induction procedures like machine learning and statistical techniques result in rules that lack generalization and maintainability. Developing rules manually through incorporation of attack signatures results in meaningful but weak rules as it is difficult to define thresholds. This paper utilizes a hybrid procedure for developing rules by combining signature analysis with automated techniques to improve readability, comprehensibility, and maintainability of rules. Through the proposed rule-formulation technique, heuristic rules were developed for two remote-to-local (R2L) attacks using the KDD intrusion detection features and dataset. Empirical results show that high detection rates with low false alarms are observed for the warezmaster and warezclient attacks in the KDD data set. The utilized technique also highlighted a mislabeling problem in the KDD dataset for the two R2L attacks considered.
机译:诸如机器学习和统计技术之类的自动化规则归纳程序导致规则缺乏通用性和可维护性。通过合并攻击特征来手动开发规则会导致有意义但脆弱的规则,因为很难定义阈值。本文通过将签名分析与自动化技术相结合来利用混合过程来开发规则,以提高规则的可读性,可理解性和可维护性。通过提出的规则制定技术,使用KDD入侵检测功能和数据集为两种远程到本地(R2L)攻击开发了启发式规则。实证结果表明,对于KDD数据集中的warezmaster和warezclient攻击,观察到的检出率高且错误警报少。所利用的技术还突出了KDD数据集中针对所考虑的两次R2L攻击的标签错误问题。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号