Intrusion detection using variable-length audit trail patterns

被引:0
|
作者
Wespi, A [1 ]
Dacier, M [1 ]
Debar, H [1 ]
机构
[1] IBM Res, Zurich Res Lab, CH-8803 Ruschlikon, Switzerland
关键词
intrusion detection; Teiresias; pattern discovery; pattern matching; variable-length patterns; C2 audit trail; functionality verification tests;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Audit trail patterns generated on behalf of a Unix process can be used to model the process behavior. Most of the approaches proposed so far use a table of fixed-length patterns to represent the process model. However, variable-length patterns seem to be more naturally suited to model the process behavior, but they are also more difficult to construct. In this paper, we present a novel technique to build a table of variable-length patterns. This technique is based on Teiresias, an algorithm initially developed for discovering rigid patterns in unaligned biological sequences. We evaluate the quality of our technique in a testbed environment, and compare it with the intrusion-detection system proposed by Forrest et al. [8], which is based on fixed-length patterns. The results achieved with our novel method are significantly better than those obtained with the original method based on fixed-length patterns.
引用
收藏
页码:110 / 129
页数:20
相关论文
共 50 条
  • [1] Variable-length signatures for intrusion detection
    Li, Zhuowei
    Das, Amitabha
    Zhou, Jianying
    Patra, Jagdish C.
    COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2008, 23 (03): : 183 - 191
  • [2] A Useful Anomaly Intrusion Detection Method Using Variable-length Patterns and Average Hamming Distance
    Du, Ye
    Zhang, Ruhui
    Guo, Youyan
    JOURNAL OF COMPUTERS, 2010, 5 (08) : 1219 - 1226
  • [3] Intrusion detection model based on variable-length character patterns and its simulating analysis
    Ge, Fang-Bin
    Yang, Lin
    Wang, Jian-Xin
    Zang, Lei
    Xitong Fangzhen Xuebao / Journal of System Simulation, 2008, 20 (22): : 6118 - 6121
  • [4] Flexible intrusion detection using variable-length behavior modeling in distributed environment:: Application to CORBA objects
    Marrakchi, Z
    Mé, L
    Vivinis, B
    Morin, B
    RECENT ADVANCES IN INTRUSION DETECTION, PROCEEDINGS, 2000, 1907 : 130 - 144
  • [5] A variable-length model for masquerade detection
    Xiao, Xi
    Tian, Xinguang
    Zhai, Qibin
    Xi, Shutao
    JOURNAL OF SYSTEMS AND SOFTWARE, 2012, 85 (11) : 2470 - 2478
  • [6] Intrusion detection method based on hierarchical hidden Markov model and variable-length semantic pattern
    Duan, Xue-Tao
    Jia, Chun-Fu
    Liu, Chun-Bo
    Tongxin Xuebao/Journal on Communications, 2010, 31 (03): : 109 - 114
  • [7] VARIABLE-LENGTH TO VARIABLE-LENGTH ENCODERS ARE ASYMPTOTICALLY MEAN STATIONARY.
    Kieffer, John C.
    Dunham, James G.
    Proceedings - Annual Allerton Conference on Communication, Control, and Computing, 1980, : 438 - 439
  • [8] Synapsing variable-length crossover: Meaningful crossover for variable-length genomes
    Hutt, Benjamin
    Warwick, Kevin
    IEEE TRANSACTIONS ON EVOLUTIONARY COMPUTATION, 2007, 11 (01) : 118 - 131
  • [9] Variable-Length Extractors
    Zhou, Hongchao
    Bruck, Jehoshua
    2012 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY PROCEEDINGS (ISIT), 2012,
  • [10] VARIABLE-LENGTH ENCODING
    BENDE, S
    PERIODICA POLYTECHNICA-CHEMICAL ENGINEERING, 1970, 14 (3-4) : 225 - &