Efficient SVH2M for information anomaly detection in manufacturing processes on system call

被引:0
|
作者
Hsieh, Chao-Hsien [1 ]
Xu, Fengya [2 ]
Yang, Qingqing [2 ]
Kong, Dehong [2 ]
机构
[1] Xian Int Univ, Coll Engn, Xian 710077, Shaanxi, Peoples R China
[2] Qufu Normal Univ, Sch Cyber Sci & Engn, Qufu 273165, Shandong, Peoples R China
来源
KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS | 2024年 / 18卷 / 10期
关键词
Hidden Markov model; support vector machine; system call; intrusion detection; INTRUSION DETECTION SYSTEM;
D O I
10.3837/tiis.2024.10.009
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the integration of the manufacturing process in the Internet, cybersecurity becomes even more important in the process of factory operations. Because of the complexity of data traffic in the manufacturing industry, the identification and classification of anomalous behavior is an important direction of current research. System calls are made at the operating system level. Therefore, the use of system call sequences can detect potential threats much earlier. So, this paper chooses system call information as the research object. System call orderliness is an ideal property for analysis of using hidden Markov model. In terms of methodology, the SVH2M model improves the performance and efficiency of attack detection in manufacturing systems. The SVH2M model combines pSVM with mHMM. The pSVM and mHMM models use SVMPSA and PATA. pSVM is first used to initially categorize the system call sequences into normal and abnormal categories. The classification of pSVM can reduce the amount of data. This reduces the error rate of mHMM processing. Next, mHMM is built for different types of known anomalies. The SVH2M model in the false positive rate is lower than that of hidden Markov model. The experimental results show that the AUC of the improved model is increased by 17%. The average Mismatch Rate is reduced by 16%. The performance and efficiency of detecting anomalous information are improved in manufacturing systems.
引用
收藏
页码:2984 / 3009
页数:26
相关论文
共 50 条
  • [21] An efficient hybrid system for anomaly detection in social networks
    Md. Shafiur Rahman
    Sajal Halder
    Md. Ashraf Uddin
    Uzzal Kumar Acharjee
    Cybersecurity, 4
  • [22] DeepAnom: An Ensemble Deep Framework for Anomaly Detection in System Processes
    Ezeme, Okwudili M.
    Lescisin, Michael
    Mahmoud, Qusay H.
    Azim, Akramul
    ADVANCES IN ARTIFICIAL INTELLIGENCE, 2019, 11489 : 549 - 555
  • [23] A Multi-Module Anomaly Detection Scheme based on System Call Prediction
    Xu, Zhenghua
    Yu, Xinghuo
    Feng, Yong
    Hu, Jiankun
    Tari, Zahir
    Han, Fengling
    PROCEEDINGS OF THE 2013 IEEE 8TH CONFERENCE ON INDUSTRIAL ELECTRONICS AND APPLICATIONS (ICIEA), 2013, : 1376 - 1381
  • [24] An anomaly intrusion detection Based on Hidden Markov model System Call Sequenc
    Wang, Dongliang
    Wang, Zhigang
    ADVANCED RESEARCH ON AUTOMATION, COMMUNICATION, ARCHITECTONICS AND MATERIALS, PTS 1 AND 2, 2011, 225-226 (1-2): : 609 - +
  • [25] Anomaly intrusion detection for system call using the Soundex algorithm and neural networks
    Cha, BR
    Vaidya, B
    Han, S
    10TH IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS, PROCEEDINGS, 2005, : 427 - 433
  • [26] Anomaly Based Host Intrusion Detection System Using Semantic Based System Call Patterns
    Anandapriya, M.
    Lakshmanan, B.
    PROCEEDINGS OF 2015 IEEE 9TH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS AND CONTROL (ISCO), 2015,
  • [27] Advanced Anomaly Intrusion Detection Technique For Host Based System Using System Call Patterns
    Maske, Sandeep Ankush
    Parvat, Thaksen. J.
    2016 INTERNATIONAL CONFERENCE ON INVENTIVE COMPUTATION TECHNOLOGIES (ICICT), VOL 2, 2016, : 441 - 444
  • [28] An efficient system for anomaly detection using deep learning classifier
    A. R. Revathi
    Dhananjay Kumar
    Signal, Image and Video Processing, 2017, 11 : 291 - 299
  • [29] Efficient Approach for Anomaly Detection in IoT Using System Calls
    Shamim, Nouman
    Asim, Muhammad
    Baker, Thar
    Awad, Ali Ismail
    SENSORS, 2023, 23 (02)
  • [30] An efficient system for anomaly detection using deep learning classifier
    Revathi, A. R.
    Kumar, Dhananjay
    SIGNAL IMAGE AND VIDEO PROCESSING, 2017, 11 (02) : 291 - 299