Efficient SVH2M for information anomaly detection in manufacturing processes on system call

被引:0
|
作者
Hsieh, Chao-Hsien [1 ]
Xu, Fengya [2 ]
Yang, Qingqing [2 ]
Kong, Dehong [2 ]
机构
[1] Xian Int Univ, Coll Engn, Xian 710077, Shaanxi, Peoples R China
[2] Qufu Normal Univ, Sch Cyber Sci & Engn, Qufu 273165, Shandong, Peoples R China
来源
KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS | 2024年 / 18卷 / 10期
关键词
Hidden Markov model; support vector machine; system call; intrusion detection; INTRUSION DETECTION SYSTEM;
D O I
10.3837/tiis.2024.10.009
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the integration of the manufacturing process in the Internet, cybersecurity becomes even more important in the process of factory operations. Because of the complexity of data traffic in the manufacturing industry, the identification and classification of anomalous behavior is an important direction of current research. System calls are made at the operating system level. Therefore, the use of system call sequences can detect potential threats much earlier. So, this paper chooses system call information as the research object. System call orderliness is an ideal property for analysis of using hidden Markov model. In terms of methodology, the SVH2M model improves the performance and efficiency of attack detection in manufacturing systems. The SVH2M model combines pSVM with mHMM. The pSVM and mHMM models use SVMPSA and PATA. pSVM is first used to initially categorize the system call sequences into normal and abnormal categories. The classification of pSVM can reduce the amount of data. This reduces the error rate of mHMM processing. Next, mHMM is built for different types of known anomalies. The SVH2M model in the false positive rate is lower than that of hidden Markov model. The experimental results show that the AUC of the improved model is increased by 17%. The average Mismatch Rate is reduced by 16%. The performance and efficiency of detecting anomalous information are improved in manufacturing systems.
引用
收藏
页码:2984 / 3009
页数:26
相关论文
共 50 条
  • [1] Using Information Theory to Measure Call Site Information of System Call in Anomaly Detection
    Xie, Feng
    Xie, Lixia
    2013 15TH IEEE INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY (ICCT), 2013, : 6 - 10
  • [2] Anomaly detection method based on HMMs using system call and call stack information
    Zhang, C
    Peng, QK
    COMPUTATIONAL INTELLIGENCE AND SECURITY, PT 2, PROCEEDINGS, 2005, 3802 : 315 - 321
  • [3] Anomaly detection using call stack information
    Feng, HHP
    Kolesnikov, OM
    Fogla, P
    Lee, WK
    Gong, WB
    2003 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2003, : 62 - 75
  • [4] Anomaly detection based on system call classification
    Xu, Ming
    Chen, Chun
    Ying, Jing
    Ruan Jian Xue Bao/Journal of Software, 2004, 15 (03): : 391 - 403
  • [5] Development of Scalable On-Line Anomaly Detection System for Autonomous and Adaptive Manufacturing Processes
    Choi, Seunghyun
    Youm, Sekyoung
    Kang, Yong-Shin
    APPLIED SCIENCES-BASEL, 2019, 9 (21):
  • [6] The Algorithm of Information System Anomaly Detection
    Gu, Ming
    2013 3RD INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS, COMMUNICATIONS AND NETWORKS (CECNET), 2013, : 653 - 657
  • [7] Selecting and Improving System Call Models for Anomaly Detection
    Frossi, Alessandro
    Maggi, Federico
    Rizzo, Gian Luigi
    Zanero, Stefano
    DETECTION OF INTRUSIONS AND MALWARE, AND VULNERABILITY ASSESSMENT, PROCEEDINGS, 2009, 5587 : 206 - 223
  • [8] Anomaly detection and event mining in cold forming manufacturing processes
    Diego Nieves Avendano
    Daniel Caljouw
    Dirk Deschrijver
    Sofie Van Hoecke
    The International Journal of Advanced Manufacturing Technology, 2021, 115 : 837 - 852
  • [9] Anomaly detection and event mining in cold forming manufacturing processes
    Nieves Avendano, Diego
    Caljouw, Daniel
    Deschrijver, Dirk
    Van Hoecke, Sofie
    INTERNATIONAL JOURNAL OF ADVANCED MANUFACTURING TECHNOLOGY, 2021, 115 (03): : 837 - 852
  • [10] Research on Markov chain model for system call anomaly detection
    Qian, Q
    Wang, XF
    PROCEEDINGS OF THE 8TH JOINT CONFERENCE ON INFORMATION SCIENCES, VOLS 1-3, 2005, : 328 - 333