Efficient SVH2M for information anomaly detection in manufacturing processes on system call

被引:0
|
作者
Hsieh, Chao-Hsien [1 ]
Xu, Fengya [2 ]
Yang, Qingqing [2 ]
Kong, Dehong [2 ]
机构
[1] Xian Int Univ, Coll Engn, Xian 710077, Shaanxi, Peoples R China
[2] Qufu Normal Univ, Sch Cyber Sci & Engn, Qufu 273165, Shandong, Peoples R China
来源
KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS | 2024年 / 18卷 / 10期
关键词
Hidden Markov model; support vector machine; system call; intrusion detection; INTRUSION DETECTION SYSTEM;
D O I
10.3837/tiis.2024.10.009
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the integration of the manufacturing process in the Internet, cybersecurity becomes even more important in the process of factory operations. Because of the complexity of data traffic in the manufacturing industry, the identification and classification of anomalous behavior is an important direction of current research. System calls are made at the operating system level. Therefore, the use of system call sequences can detect potential threats much earlier. So, this paper chooses system call information as the research object. System call orderliness is an ideal property for analysis of using hidden Markov model. In terms of methodology, the SVH2M model improves the performance and efficiency of attack detection in manufacturing systems. The SVH2M model combines pSVM with mHMM. The pSVM and mHMM models use SVMPSA and PATA. pSVM is first used to initially categorize the system call sequences into normal and abnormal categories. The classification of pSVM can reduce the amount of data. This reduces the error rate of mHMM processing. Next, mHMM is built for different types of known anomalies. The SVH2M model in the false positive rate is lower than that of hidden Markov model. The experimental results show that the AUC of the improved model is increased by 17%. The average Mismatch Rate is reduced by 16%. The performance and efficiency of detecting anomalous information are improved in manufacturing systems.
引用
收藏
页码:2984 / 3009
页数:26
相关论文
共 50 条
  • [31] An Efficient Hybrid Classifier Model for Anomaly Intrusion Detection System
    Shah, Asghar Ali
    Ehsan, M. Khurram
    Ishaq, Kashif
    Ali, Zakir
    Farooq, Muhammad Shoaib
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2018, 18 (11): : 127 - +
  • [32] An efficient proactive artificial immune system based anomaly detection and prevention system
    Saurabh, Praneet
    Verma, Bhupendra
    EXPERT SYSTEMS WITH APPLICATIONS, 2016, 60 : 311 - 320
  • [33] Anomaly Detection of System Call Sequence Based on Dynamic Features and Relaxed-SVM
    Liao, Xiaoyao
    Wang, Changzhi
    Chen, Wen
    SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
  • [34] Applying unsupervised system-call based software security techniques for anomaly detection
    Kishore, Pushkar
    Nayak, Gayatri
    Barisal, Swadhin Kumar
    JOURNAL OF INFORMATION & OPTIMIZATION SCIENCES, 2022, 43 (05): : 915 - 922
  • [35] A statistical pattern based feature extraction method on system call traces for anomaly detection
    Liu, Zhen
    Japkowicz, Nathalie
    Wang, Ruoyu
    Cai, Yongming
    Tang, Deyu
    Cai, Xianfa
    INFORMATION AND SOFTWARE TECHNOLOGY, 2020, 126 (126)
  • [36] Data-driven anomaly detection and diagnostics for changeover processes in biopharmaceutical drug product manufacturing
    Zeberli, Anicia
    Badr, Sara
    Siegmund, Christian
    Mattern, Markus
    Sugiyama, Hirokazu
    CHEMICAL ENGINEERING RESEARCH & DESIGN, 2021, 167 : 53 - 62
  • [37] Advanced Anomaly Detection in Manufacturing Processes: Leveraging Feature Value Analysis for Normalizing Anomalous Data
    Kim, Seunghyun
    Seo, Hyunsoo
    Lee, Eui Chul
    ELECTRONICS, 2024, 13 (07)
  • [38] An Information System Supporting Insurance Use Cases by Automated Anomaly Detection
    Reis, Thoralf
    Kreibich, Alexander
    Bruchhaus, Sebastian
    Krause, Thomas
    Freund, Florian
    Bornschlegl, Marco X.
    Hemmje, Matthias L.
    BIG DATA AND COGNITIVE COMPUTING, 2023, 7 (01)
  • [39] An Efficient Anomaly Detection System for Crowded Scenes Using Variational Autoencoders
    Xu, Ming
    Yu, Xiaosheng
    Chen, Dongyue
    Wu, Chengdong
    Jiang, Yang
    APPLIED SCIENCES-BASEL, 2019, 9 (16):
  • [40] Building an efficient intrusion detection system using grasshopper optimization algorithm for anomaly detection
    Shubhra Dwivedi
    Manu Vardhan
    Sarsij Tripathi
    Cluster Computing, 2021, 24 : 1881 - 1900