A fast host-based intrusion detection system using rough set theory

被引:0
|
作者
Rawat, S [1 ]
Gulati, VP
Pujari, AK
机构
[1] Univ Hyderabad, AI Lab, Dept Comp & Informat Sci, Hyderabad 500046, Andhra Pradesh, India
[2] IDRBT, Hyderabad 500057, Andhra Pradesh, India
来源
关键词
data mining; decision table; rough set; intrusion detection; anomaly; misuse;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Intrusion Detection system has become the main research focus in the area of information security. Last few years have witnessed a large variety of technique and model to provide increasingly efficient intrusion detection solutions. We advocate here that the intrusive behavior of a process is highly localized characteristics of the process. There are certain smaller episodes in a process that make the process intrusive in an otherwise normal stream. As a result it is unnecessary and most often misleading to consider the whole process in totality and to attempt to characterize its abnormal features. In the present work we establish that subsequences of reasonably small length of sequence of system calls would suffice to identify abnormality in a process. We make use of rough set theory to demonstrate this concept. Rough set theory also facilitates identifying rules for intrusion detection. The main contributions of the paper are the following- (a) It is established that very small subsequence of system call is sufficient to identify intrusive behavior with high accuracy. We demonstrate our result using DARPA'98 BSM data; (b) A rough set based system is developed that can extract rules for intrusion detection; (c) An algorithm is presented that can determine the status of a process as either normal or abnormal on-line.
引用
收藏
页码:144 / 161
页数:18
相关论文
共 50 条
  • [11] Application of Sequence Embedding in Host-based Intrusion Detection System
    Lu, Yijun
    Teng, Shaohua
    PROCEEDINGS OF THE 2021 IEEE 24TH INTERNATIONAL CONFERENCE ON COMPUTER SUPPORTED COOPERATIVE WORK IN DESIGN (CSCWD), 2021, : 434 - 439
  • [12] Host-Based Intrusion Detection Model Using Siamese Network
    Park, Daekyeong
    Kim, Sangsoo
    Kwon, Hyukjin
    Shin, Dongil
    Shin, Dongkyoo
    IEEE ACCESS, 2021, 9 : 76614 - 76623
  • [13] Rough set theory's application on intrusion detection based on system calls
    Wang, LJ
    Gao, C
    PROCEEDINGS OF THE 11TH JOINT INTERNATIONAL COMPUTER CONFERENCE, 2005, : 83 - 86
  • [14] An Approach for Host-Based Intrusion Detection System Design Using Convolutional Neural Network
    Nam Nhat Tran
    Sarker, Ruhul
    Hu, Jiankun
    MOBILE NETWORKS AND MANAGEMENT (MONAMI 2017), 2018, 235 : 116 - 126
  • [15] A reinforcement learning approach for host-based intrusion detection using sequences of system calls
    Xu, X
    Xie, T
    ADVANCES IN INTELLIGENT COMPUTING, PT 1, PROCEEDINGS, 2005, 3644 : 995 - 1003
  • [16] Towards a better similarity algorithm for host-based intrusion detection system
    Ouarda, Lounis
    Malika, Bourenane
    Brahim, Bouderah
    JOURNAL OF INTELLIGENT SYSTEMS, 2023, 32 (01)
  • [17] Bluebox: A policy-driven, host-based intrusion detection system
    Chari, Suresh N.
    Cheng, Pau-Chen
    ACM Transactions on Information and System Security, 2003, 6 (02) : 173 - 200
  • [18] Host-Based Intrusion Detection System with System Calls: Review and Future Trends
    Liu, Ming
    Xue, Zhi
    Xu, Xianghua
    Zhong, Changmin
    Chen, Jinjun
    ACM COMPUTING SURVEYS, 2019, 51 (05)
  • [19] A network audit system for host-based intrusion detection (NASHID) in linux
    Daniels, TE
    Spafford, EH
    16TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2000, : 178 - 187
  • [20] An Autonomous Host-Based Intrusion Detection System for Android Mobile Devices
    José Ribeiro
    Firooz B. Saghezchi
    Georgios Mantas
    Jonathan Rodriguez
    Simon J. Shepherd
    Raed A. Abd-Alhameed
    Mobile Networks and Applications, 2020, 25 : 164 - 172