首页> 外文期刊>ACM Computing Surveys >Host-Based Intrusion Detection System with System Calls: Review and Future Trends
【24h】

Host-Based Intrusion Detection System with System Calls: Review and Future Trends

机译:基于主机的入侵检测系统,具有系统呼叫:审查和未来趋势

获取原文
获取原文并翻译 | 示例
       

摘要

In a contemporary data center, Linux applications often generate a large quantity of real-time system call traces, which are not suitable for traditional host-based intrusion detection systems deployed on every single host. Training data mining models with system calls on a single host that has static computing and storage capacity is time-consuming, and intermediate datasets are not capable of being efficiently handled. It is cumbersome for the maintenance and updating of host-based intrusion detection systems (HIDS) installed on every physical or virtual host, and comprehensive system call analysis can hardly be performed to detect complex and distributed attacks among multiple hosts. Considering these limitations of current system-callbased HIDS, in this article, we provide a review of the development of system-call-based HIDS and future research trends. Algorithms and techniques relevant to system-call-based HIDS are investigated, including feature extraction methods and various data mining algorithms. The HIDS dataset issues are discussed, including currently available datasets with system calls and approaches for researchers to generate new datasets. The application of system-call-based HIDS on current embedded systems is studied, and related works are investigated. Finally, future research trends are forecast regarding three aspects, namely, the reduction of the false-positive rate, the improvement of detection efficiency, and the enhancement of collaborative security.
机译:在当代数据中心中,Linux应用程序通常会产生大量的实时系统呼叫迹线,这不适用于在每个主机上部署的传统主机的入侵检测系统。在具有静态计算和存储容量的单个主机上培训具有系统调用的数据挖掘模型是耗时的,中间数据集不能有效处理。维护和更新安装在每个物理或虚拟主机上的主机的入侵检测系统(HID)的维护和更新是繁重的,并且几乎无法执行全面的系统呼叫分析以检测多个主机之间的复杂和分布式攻击。在本文中,考虑到当前系统CallBased HID的这些限制,我们提供了基于系统呼叫的隐藏和未来研究趋势的发展述评。研究了与基于系统呼叫的HID相关的算法和技术,包括特征提取方法和各种数据挖掘算法。讨论HIDS数据集问题,包括当前可用的数据集,其中具有系统调用和研究人员的方法来生成新数据集。研究了基于系统呼叫的HID在当前嵌入式系统上的应用,并研究了相关的作品。最后,未来的研究趋势是关于三个方面的预测,即减少假阳性率,改善检测效率,以及加强协作安全性。

著录项

  • 来源
    《ACM Computing Surveys》 |2019年第5期|98.1-98.36|共36页
  • 作者单位

    Shanghai Jiao Tong Univ Sch Elect Informat & Elect Engn Shanghai 200240 Peoples R China|Univ Technol Sydney Fac Engn & IT Ultimo NSW 2007 Australia;

    Shanghai Jiao Tong Univ Sch Elect Informat & Elect Engn Shanghai 200240 Peoples R China;

    Hangzhou Dianzi Univ Sch Comp Sci Hangzhou Zhejiang Peoples R China;

    Joowing Australia Glen Waverley Vic 3150 Australia;

    Swinburne Univ Technol Fac Sci Engn & Technol Hawthorn Vic 3122 Australia;

  • 收录信息 美国《科学引文索引》(SCI);美国《工程索引》(EI);
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

    Cybersecurity; system call; intrusion detection; cloud computing; big data;

    机译:网络安全;系统调用;入侵检测;云计算;大数据;
  • 入库时间 2022-08-18 22:02:08

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号