Mdlcompress for intrusion detection: Signature inference and masquerade attack

被引:0
|
作者
Evans, Scott [1 ]
Eiland, Earl [1 ]
Markham, Stephen [1 ]
Impson, Jeremy [2 ]
Laczo, Adam [2 ]
机构
[1] GE Res, New York, NY USA
[2] Lockheed Martin Corp, Owego, NY USA
关键词
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
MDLcompress is a grammar inference algorithm that uses Minimum Description Length principles from the theory of Kolmogorov Complexity and Algorithmic Information Theory to infer a grammar, finding patterns and motifs that aid most in compressing unknown data sets. This technology has been applied to detection of FTP exploits and inference of DNA sequence motifs related to breast cancer. In this paper we apply MDLcompress to infer grammars, and then apply those grammars to identify masquerades in the publicly available Schonlau system call data sets. Compared to similar protocols our system detects anomalous events with comparable performance with the advantage of executing in linear time.
引用
收藏
页码:1652 / +
页数:2
相关论文
共 50 条
  • [31] Intrusion detection of distributed denial of service attack in cloud
    Velliangiri, S.
    Premalatha, J.
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2019, 22 (Suppl 5): : 10615 - 10623
  • [32] Masquerade Attack Detection Through Observation Planning for Multi-Robot Systems
    Wardega, Kacper
    Tron, Roberto
    Li, Wenchao
    AAMAS '19: PROCEEDINGS OF THE 18TH INTERNATIONAL CONFERENCE ON AUTONOMOUS AGENTS AND MULTIAGENT SYSTEMS, 2019, : 2262 - 2264
  • [33] A Low-Cost Masquerade and Replay Attack Detection Method for CAN in Automobiles
    Ansari, Mohammad Raashid
    Miller, W. Thomas
    She, Chenghua
    Yu, Qiaoyan
    2017 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS), 2017, : 2178 - 2181
  • [34] Evaluating Attack Resiliency for Host Intrusion Detection Systems
    Molina, Jesus
    Cukier, Michel
    JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2009, 4 (01): : 1 - 9
  • [35] A Poisoning Attack on Intrusion Detection System Based on SVM
    Qian Y.-G.
    Lu H.-B.
    Ji S.-L.
    Zhou W.-J.
    Wu S.-H.
    Lei J.-S.
    Tao X.-X.
    Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2019, 47 (01): : 59 - 65
  • [36] HyINT: Signature-Anomaly Intrusion Detection System
    Kumar, Roshan
    Sharma, Deepak
    2018 9TH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND NETWORKING TECHNOLOGIES (ICCCNT), 2018,
  • [37] Probabilistic inference strategy in distributed intrusion detection systems
    Ding, JG
    Xu, SH
    Krämer, B
    Bai, YC
    Chen, HS
    Zhang, J
    PARALLEL AND DISTRIBUTED PROCESSING AND APPLICATIONS, PROCEEDINGS, 2004, 3358 : 835 - 844
  • [38] Attack Prediction Models for Cloud Intrusion Detection Systems
    Kholidy, Hisham A.
    Erradi, Abdelkarim
    Abdelwahed, Sherif
    2014 2ND INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE, MODELLING AND SIMULATION, 2014, : 270 - 275
  • [39] A Proposed Wireless Intrusion Detection Prevention and Attack System
    Nada, Jafar Abo
    Al-Mosa, Mohammad Rasmi
    2018 19TH INTERNATIONAL ARAB CONFERENCE ON INFORMATION TECHNOLOGY (ACIT), 2018, : 211 - 215
  • [40] A signature match processor architecture for network intrusion detection
    Singaraju, J
    Bu, L
    Chandy, JA
    FCCM 2005: 13TH ANNUAL IEEE SYMPOSIUM ON FIELD-PROGRAMMABLE CUSTOM COMPUTING MACHINES, PROCEEDINGS, 2005, : 235 - 242