A Novel Similar Temporal System Call Pattern Mining for Efficient Intrusion Detection

被引:0
|
作者
Radhakrishna, Vangipuram [1 ]
Kumar, Puligadda Veereswara [2 ]
Janaki, Vinjamuri [3 ]
机构
[1] VNR Vignana Jyothi Inst Engn & Technol, Hyderabad, Andhra Pradesh, India
[2] Osmania Univ, Univ Coll Engn, Hyderabad, Andhra Pradesh, India
[3] Vaagdevi Engn Coll, Warangal, Andhra Pradesh, India
关键词
Intrusion; Malicious; System Call Pattern; Temporal; Similarity; Vulnerability;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Software security pattern mining is the recent research interest among researchers working in the areas of security and data mining. When an application runs, several process and system calls associated are invoked in background. In this paper, the major objective is to identify the intrusion using temporal pattern mining. The idea is to find normal temporal system call patterns and use these patterns to identify abnormal temporal system call patterns. For finding normal system call patterns, we use the concept of temporal association patterns. The reference sequence is used to obtain temporal association system call patterns satisfying specified dissimilarity threshold. To find similar (normal) temporal system call patterns, we apply our novel method which performs only a single database scan, reducing unnecessary extra overhead incurred when multiple scans are performed thus achieving space and time efficiency. The importance of the approach coins from the fact that this is first single database scan approach in the literature. To find if a given process is normal or abnormal, it is just sufficient to verify if there exists a temporal system call pattern which is not similar to the reference system call support sequence for specified threshold. This eliminates the need for finding decision rules by constructing decision table. The approach is efficient as it eliminates the need for finding decision rules (2(n) is usually very large for even small value of n) and thus aims at efficient dimensionality reduction as we consider only similar temporal system call sequence for deciding on intrusion.
引用
收藏
页码:475 / 493
页数:19
相关论文
共 50 条
  • [21] A Novel Rule-based Intrusion Detection System Using Data Mining
    Li, Lei
    Yang, De-Zhang
    Shen, Fang-Cheng
    PROCEEDINGS OF 2010 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY (ICCSIT 2010), VOL 6, 2010, : 169 - 172
  • [22] An efficient framework for intrusion detection based on data mining
    Li, Weidong
    Zhang, Kejun
    Li, Boqun
    Yang, Bingru
    2005 ICSC CONGRESS ON COMPUTATIONAL INTELLIGENCE METHODS AND APPLICATIONS (CIMA 2005), 2005, : 55 - 58
  • [23] Intrusion detection system based on data mining
    Zhang, Jishan
    Gan, Yong
    Bian, Zhiwei
    Fifth Wuhan International Conference on E-Business, Vols 1-3: INTEGRATION AND INNOVATION THROUGH MEASUREMENT AND MANAGEMENT, 2006, : 1214 - 1218
  • [24] Intrusion detection system based on data mining
    Zhan Jinhua
    FIRST INTERNATIONAL WORKSHOP ON KNOWLEDGE DISCOVERY AND DATA MINING, PROCEEDINGS, 2007, : 402 - 405
  • [25] SensorWebIDS: a web mining intrusion detection system
    Ezeife, C. I.
    Dong, Jingyu
    Aggarwal, A. K.
    INTERNATIONAL JOURNAL OF WEB INFORMATION SYSTEMS, 2008, 4 (01) : 97 - +
  • [26] Integrating Intrusion Detection System and Data Mining
    Yusufovna, Sattarova Feruza
    INTERNATIONAL SYMPOSIUM ON UBIQUITOUS MULTIMEDIA COMPUTING, PROCEEDINGS, 2008, : 256 - 259
  • [27] EFFICIENT INTRUSION DETECTION SYSTEM MODELS
    Adsule, Urmila
    Pachghare, V. K.
    Kulkarni, Parag
    ICCNT 2009: PROCEEDINGS OF THE 2009 INTERNATIONAL CONFERENCE ON COMPUTER AND NETWORK TECHNOLOGY, 2010, : 199 - +
  • [28] ADREM: System Call Based Intrusion Detection Framework
    Vaduva, Jan-Alexandru
    Chiscariu, Radu-Emanuel
    Culic, Ioana
    Florea, Iulia-Maria
    Rughinis, Razvan
    NEW TECHNOLOGIES AND REDESIGNING LEARNING SPACES, VOL I, 2019, : 159 - 164
  • [29] Efficient Pattern Matching Algorithm for Intrusion Detection Systems
    Yang, Wenjun
    SENSORS, MECHATRONICS AND AUTOMATION, 2014, 511-512 : 1178 - 1184
  • [30] The Impact of Different System Call Representations on Intrusion Detection
    Wunderlich, Sarah
    Ring, Markus
    Landes, Dieter
    Hotho, Andreas
    LOGIC JOURNAL OF THE IGPL, 2022, 30 (02) : 239 - 251