首页> 外文期刊>Computers & Security >FGMC-HADS: Fuzzy Gaussian mixture-based correntropy models for detecting zero-day attacks from linux systems
【24h】

FGMC-HADS: Fuzzy Gaussian mixture-based correntropy models for detecting zero-day attacks from linux systems

机译:FGMC - HATS:基于模糊的高斯混合的矫正模型,用于检测Linux系统的零日攻击

获取原文
获取原文并翻译 | 示例
       

摘要

As existing system calls-based Host Anomaly Detection Systems (HADSs) exclude hidden patterns that can reside in the elapsed times of system calls with respect to the lifecycle of a kernel-calling process, they lack precision in the construction of behavioral regions for assisting in reliably protecting hosts against modern unknown attacks. In this paper, a HADS, the so-called Fuzzy Gaussian Mixture-based Correntropy (FGMC-HADS), based on the fuzzy rough set attribute reduction (FRAR) method, Gaussian mixture model (GMM) and Correntropy mechanism, is proposed. FGMC-HADS comprises two novel modules: (1) the FRAR method is applied to combine system calls' identifiers and elapsed times to construct relevant hidden patterns; and (2) the GMM and Correntropy approaches is an anomaly detection technique, the so-called 'Corr-GMM', developed to fuse multivariate features and recognize unknown anomalous activities, respectively. The posterior probabilities of the GMM are used as input to the Correntropy model to determine the time-series interdependencies of host activities, and then the Corr-GMM constructs legitimate boundaries as a threshold for discovering abnormal behaviors. The proposed FGMC-HADS is trained and validated using the datasets of NGIDS-DS, KDD-98 and new ToNJoT of Linux data. The experimental results indicate that the proposed FGMC-HADS a reliable defense layer for Linux-based hosts against unknown attacks compared with other compelling HIDS techniques.
机译:由于基于系统呼叫的主机异常检测系统(HAFSS)排除了可以驻留在系统呼叫的经过时间的隐藏模式,这些模式对于核心呼叫过程的生命周期,它们缺乏在辅助行为区域的构建中的精确度可靠地保护主持人免受现代未知攻击。在本文中,提出了基于模糊粗糙集属性减少(FRAR)方法,高斯混合模型(GMM)和管道机制的基于所谓的模糊高斯混合物的控制器(FGMC·HAVE)。 FGMC-HATS包括两种新型模块:(1)FRAR方法应用于组合系统调用的标识符和经过的时间来构建相关隐藏模式; (2)GMM和管制方法是一种异常检测技术,所谓的“Corm-GMM”,用于熔断器多变量特征,分别识别未知的异常活动。 GMM的后验概率用作对正常模型的输入,以确定主机活动的时间序列相互依赖性,然后CORR-GMM构造合法边界作为发现异常行为的阈值。使用NgIDS-DS,KDD-98和新吨的Linux数据的数据集进行培训和验证所提出的FGMC-HATS。实验结果表明,与其他引人注目的HIDS技术相比,该拟议的FGMC对基于Linux的主机的可靠防御层进行了针对未知攻击的可靠防御层。

著录项

  • 来源
    《Computers & Security》 |2020年第9期|101906.1-101906.12|共12页
  • 作者单位

    UNSW Canberra and Canberra Institute of Technology. Canberra ACT 2600 Australia;

    School of Engineering and Information Technology the University of New South Wales @ ADFA Canberra ACT 2600 Australia;

    School of Engineering and Information Technology the University of New South Wales @ ADFA Canberra ACT 2600 Australia;

    Department of Computer Science. University of Texas at San Antonio San Antonio TX 78249-0631 USA;

    Department of Information Systems and Cyber Security and Department of Electrical and Computer Engineering University of Texas at San Antonio San Antonio TX 78249-0631 USA;

    Riphah Institute of Systems Engineering (RISE) Riphah International University Islamabad Pakistan;

  • 收录信息 美国《科学引文索引》(SCI);美国《工程索引》(EI);
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

    Intrusion detection; Host anomaly detection; Fuzzy rough sets; Gaussian mixture modeling; Correntropy; Zero-day attacks;

    机译:入侵检测;宿主异常检测;模糊粗糙集;高斯混合建模;管制;零日攻击;
  • 入库时间 2022-08-18 21:21:52

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号