...
首页> 外文期刊>Pattern Recognition: The Journal of the Pattern Recognition Society >Host-based intrusion detection using dynamic and static behavioral models
【24h】

Host-based intrusion detection using dynamic and static behavioral models

机译:使用动态和静态行为模型的基于主机的入侵检测

获取原文
获取原文并翻译 | 示例

摘要

Intrusion detection has emerged as an important approach to network security. In this paper, we adopt an anomaly detection approach by detecting possible intrusions based on program or user profiles built from normal usage data. In particular, program profiles based on Unix system calls and user profiles based on Unix shell commands are modeled using two different types of behavioral models for data mining. The dynamic modeling approach is based on hidden Markov models (HMM) and the principle of maximum likelihood, while the static modeling approach is based on event occurrence frequency distributions and the principle of minimum cross entropy. The novelty detection approach is adopted to estimate the model parameters using normal training data only, as opposed to the classification approach which has to use both normal and intrusion data for training. To determine whether or not a certain behavior is similar enough to the normal model and hence should be classified as normal, we use a scheme that can be justified from the perspective of hypothesis testing. Our experimental results show that the dynamic modeling approach is better than the static modeling approach for the system call datasets, while the dynamic modeling approach is worse for the shell command datasets. Moreover, the static modeling approach is similar in performance to instance-based learning reported previously by others for the same shell command database but with much higher computational and storage requirements than our method. (C) 2002 Pattern Recognition Society. Published by Elsevier Science Ltd. All rights reserved. [References: 25]
机译:入侵检测已成为网络安全的重要方法。在本文中,我们通过基于基于正常使用数据构建的程序或用户个人资料来检测可能的入侵,从而采用异常检测方法。特别是,使用两种不同类型的行为模型进行数据挖掘,对基于Unix系统调用的程序配置文件和基于Unix Shell命令的用户配置文件进行建模。动态建模方法基于隐马尔可夫模型(HMM)和最大似然原理,而静态建模方法基于事件发生频率分布和最小交叉熵原理。与仅使用正常数据和入侵数据进行训练的分类方法相反,采用新颖性检测方法仅使用正常训练数据来估计模型参数。为了确定某种行为是否与正常模型足够相似,因此应该归为正常模型,我们使用了一种可以从假设检验的角度证明其合理性的方案。我们的实验结果表明,对于系统调用数据集,动态建模方法优于静态建模方法,而对于Shell命令数据集,动态建模方法则较差。此外,静态建模方法的性能类似于其他人先前针对相同的shell命令数据库报告的基于实例的学习,但是比我们的方法具有更高的计算和存储要求。 (C)2002模式识别学会。由Elsevier Science Ltd.出版。保留所有权利。 [参考:25]

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号