Mdlcompress for intrusion detection: Signature inference and masquerade attack

被引:0
|
作者
Evans, Scott [1 ]
Eiland, Earl [1 ]
Markham, Stephen [1 ]
Impson, Jeremy [2 ]
Laczo, Adam [2 ]
机构
[1] GE Res, New York, NY USA
[2] Lockheed Martin Corp, Owego, NY USA
关键词
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
MDLcompress is a grammar inference algorithm that uses Minimum Description Length principles from the theory of Kolmogorov Complexity and Algorithmic Information Theory to infer a grammar, finding patterns and motifs that aid most in compressing unknown data sets. This technology has been applied to detection of FTP exploits and inference of DNA sequence motifs related to breast cancer. In this paper we apply MDLcompress to infer grammars, and then apply those grammars to identify masquerades in the publicly available Schonlau system call data sets. Compared to similar protocols our system detects anomalous events with comparable performance with the advantage of executing in linear time.
引用
收藏
页码:1652 / +
页数:2
相关论文
共 50 条
  • [21] Probe Attack Detection Using an Improved Intrusion Detection System
    Almazyad, Abdulaziz
    Halman, Laila
    Alsaeed, Alaa
    CMC-COMPUTERS MATERIALS & CONTINUA, 2023, 74 (03): : 4769 - 4784
  • [22] Unknown Attack Detection: Combining Relabeling and Hybrid Intrusion Detection
    Shin, Gun-Yoon
    Kim, Dong-Wook
    Kim, Sang-Soo
    Han, Myung-Mook
    CMC-COMPUTERS MATERIALS & CONTINUA, 2021, 68 (03): : 3289 - 3303
  • [23] Visual Analytics Model for Intrusion Detection in Flood Attack
    Zhang, Jinson
    Huang, Mao Lin
    2013 12TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2013), 2013, : 277 - 284
  • [24] Attack Graph Algorithm in the Application of Intrusion Detection System
    Luo Zhiyong
    You Bo
    Xu Jiazhong
    Yu Guixin
    Liu Yahui
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2013, 7 (05): : 249 - 256
  • [25] Intrusion Detection with Hypergraph-Based Attack Models
    Guzzo, Antonella
    Pugliese, Andrea
    Rullo, Antonino
    Sacca, Domenico
    GRAPH STRUCTURES FOR KNOWLEDGE REPRESENTATION AND REASONING, GKR 2013, 2014, 8323 : 58 - 73
  • [26] Minimal complexity attack classification intrusion detection system
    Gowrison, G.
    Ramar, K.
    Muneeswaran, K.
    Revathi, T.
    APPLIED SOFT COMPUTING, 2013, 13 (02) : 921 - 927
  • [27] Intrusion detection of distributed denial of service attack in cloud
    S. Velliangiri
    J. Premalatha
    Cluster Computing, 2019, 22 : 10615 - 10623
  • [28] Signature Based Semantic Intrusion Detection System on Cloud
    Sangeetha, S.
    Devi, B. Gayathri
    Ramya, R.
    Dharani, M. K.
    Sathya, P.
    INFORMATION SYSTEMS DESIGN AND INTELLIGENT APPLICATIONS, VOL 1, 2015, 339 : 657 - 666
  • [29] Masquerade intrusion detection algorithm based on interval type-2 fuzzy set
    EDA Laboratory, Physics Department, Xiamen University, Xiamen 361005, China
    不详
    Tien Tzu Hsueh Pao, 2008, 4 (777-780):
  • [30] Analysis of intrusion detection and attack proliferation in computer networks
    Rangan, Prahalad
    Knuth, Kevin H.
    BAYESIAN INFERENCE AND MAXIMUM ENTROPY METHODS IN SCIENCE AND ENGINEERING, 2007, 954 : 443 - +