A Novel Similar Temporal System Call Pattern Mining for Efficient Intrusion Detection

被引:0
|
作者
Radhakrishna, Vangipuram [1 ]
Kumar, Puligadda Veereswara [2 ]
Janaki, Vinjamuri [3 ]
机构
[1] VNR Vignana Jyothi Inst Engn & Technol, Hyderabad, Andhra Pradesh, India
[2] Osmania Univ, Univ Coll Engn, Hyderabad, Andhra Pradesh, India
[3] Vaagdevi Engn Coll, Warangal, Andhra Pradesh, India
关键词
Intrusion; Malicious; System Call Pattern; Temporal; Similarity; Vulnerability;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Software security pattern mining is the recent research interest among researchers working in the areas of security and data mining. When an application runs, several process and system calls associated are invoked in background. In this paper, the major objective is to identify the intrusion using temporal pattern mining. The idea is to find normal temporal system call patterns and use these patterns to identify abnormal temporal system call patterns. For finding normal system call patterns, we use the concept of temporal association patterns. The reference sequence is used to obtain temporal association system call patterns satisfying specified dissimilarity threshold. To find similar (normal) temporal system call patterns, we apply our novel method which performs only a single database scan, reducing unnecessary extra overhead incurred when multiple scans are performed thus achieving space and time efficiency. The importance of the approach coins from the fact that this is first single database scan approach in the literature. To find if a given process is normal or abnormal, it is just sufficient to verify if there exists a temporal system call pattern which is not similar to the reference system call support sequence for specified threshold. This eliminates the need for finding decision rules by constructing decision table. The approach is efficient as it eliminates the need for finding decision rules (2(n) is usually very large for even small value of n) and thus aims at efficient dimensionality reduction as we consider only similar temporal system call sequence for deciding on intrusion.
引用
收藏
页码:475 / 493
页数:19
相关论文
共 50 条
  • [31] An Efficient Pattern Matching Algorithm for Intrusion Detection Systems
    Anithakumari, S.
    Chithraprasad, D.
    2009 IEEE INTERNATIONAL ADVANCE COMPUTING CONFERENCE, VOLS 1-3, 2009, : 223 - +
  • [32] Efficient Pattern Matching on GPUs for Intrusion Detection Systems
    Tumeo, Antonino
    Villa, Oreste
    Sciuto, Donatella
    PROCEEDINGS OF THE 2010 COMPUTING FRONTIERS CONFERENCE (CF 2010), 2010, : 87 - 88
  • [33] Shielding wireless sensor network using Markovian intrusion detection system with attack pattern mining
    Huang, Jen-Yan
    Liao, I-En
    Chung, Yu-Fang
    Chen, Kuen-Tzung
    INFORMATION SCIENCES, 2013, 231 : 32 - 44
  • [34] A Computationally Efficient Approach for Temporal Pattern Mining in IoT
    Radhakrishna, Vangipuram
    Kumar, Puligadda Veereswara
    Janaki, Vinjamuri
    Aljawarneh, Shadi
    2016 INTERNATIONAL CONFERENCE ON ENGINEERING & MIS (ICEMIS), 2016,
  • [35] Intrusion Detection System Based on Pattern Recognition
    Mohamed M. Abdeldayem
    Arabian Journal for Science and Engineering, 2023, 48 : 9849 - 9857
  • [36] Intrusion Detection System Based on Pattern Recognition
    Abdeldayem, Mohamed M.
    ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2023, 48 (08) : 9849 - 9857
  • [37] The sound of intrusion: A novel network intrusion detection system
    Aldarwbi, Mohammed Y.
    Lashkari, Arash H.
    Ghorbani, Ali A.
    COMPUTERS & ELECTRICAL ENGINEERING, 2022, 104
  • [38] A novel network Intrusion Detection System(NIDS) based on signatures search of data mining
    Hu Zhengbing
    Li Zhitang
    Wu Junqi
    FIRST INTERNATIONAL WORKSHOP ON KNOWLEDGE DISCOVERY AND DATA MINING, PROCEEDINGS, 2007, : 10 - +
  • [39] An Efficient Approach for Intrusion Detection Using Data Mining Methods
    Wankhade, Kapil
    Patka, Sadia
    Thool, Ravindra
    2013 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2013, : 1615 - 1618
  • [40] Efficient Classification Mechanism for Network Intrusion Detection System Based on Data Mining Techniques: a Survey
    Subaira, A. S.
    Scholar, P. G.
    Anitha, P.
    2014 IEEE 8TH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS AND CONTROL (ISCO), 2014, : 274 - 280