A Novel Similar Temporal System Call Pattern Mining for Efficient Intrusion Detection

被引:0
|
作者
Radhakrishna, Vangipuram [1 ]
Kumar, Puligadda Veereswara [2 ]
Janaki, Vinjamuri [3 ]
机构
[1] VNR Vignana Jyothi Inst Engn & Technol, Hyderabad, Andhra Pradesh, India
[2] Osmania Univ, Univ Coll Engn, Hyderabad, Andhra Pradesh, India
[3] Vaagdevi Engn Coll, Warangal, Andhra Pradesh, India
关键词
Intrusion; Malicious; System Call Pattern; Temporal; Similarity; Vulnerability;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Software security pattern mining is the recent research interest among researchers working in the areas of security and data mining. When an application runs, several process and system calls associated are invoked in background. In this paper, the major objective is to identify the intrusion using temporal pattern mining. The idea is to find normal temporal system call patterns and use these patterns to identify abnormal temporal system call patterns. For finding normal system call patterns, we use the concept of temporal association patterns. The reference sequence is used to obtain temporal association system call patterns satisfying specified dissimilarity threshold. To find similar (normal) temporal system call patterns, we apply our novel method which performs only a single database scan, reducing unnecessary extra overhead incurred when multiple scans are performed thus achieving space and time efficiency. The importance of the approach coins from the fact that this is first single database scan approach in the literature. To find if a given process is normal or abnormal, it is just sufficient to verify if there exists a temporal system call pattern which is not similar to the reference system call support sequence for specified threshold. This eliminates the need for finding decision rules by constructing decision table. The approach is efficient as it eliminates the need for finding decision rules (2(n) is usually very large for even small value of n) and thus aims at efficient dimensionality reduction as we consider only similar temporal system call sequence for deciding on intrusion.
引用
收藏
页码:475 / 493
页数:19
相关论文
共 50 条
  • [41] Building intrusion pattern miner for snort network intrusion detection system
    Wuu, LC
    Chen, SF
    37TH ANNUAL 2003 INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY, PROCEEDINGS, 2003, : 477 - 484
  • [42] Building intrusion pattern miner for Snort network intrusion detection system
    Wuu, Lih-Chyau
    Hung, Chi-Hsiang
    Chen, Sout-Fong
    JOURNAL OF SYSTEMS AND SOFTWARE, 2007, 80 (10) : 1699 - 1715
  • [43] A NOVEL INTRUSION DETECTION SYSTEM FOR MANETS
    Panos, Christoforos
    Xenakis, Christos
    Stavrakakis, Ioannis
    SECRYPT 2010: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2010, : 25 - 34
  • [44] A Novel Architecture of Intrusion Detection System
    Zhang, Da
    Yeo, Chai Kiat
    2010 7TH IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE-CCNC 2010, 2010, : 164 - 168
  • [45] Network Intrusion Detection System Using Data Mining
    Lima de Campos, Lidio Mauro
    Limao de Oliveira, Roberto Celio
    Roisenberg, Mauro
    ENGINEERING APPLICATIONS OF NEURAL NETWORKS, 2012, 311 : 104 - 113
  • [46] Combination of Data Mining Techniques for Intrusion Detection System
    Elekar, Kailas Shivshankar
    2015 INTERNATIONAL CONFERENCE ON COMPUTER, COMMUNICATION AND CONTROL (IC4), 2015,
  • [47] An intelligent and expert mining intrusion detection and response system
    Hooper, Emmanuel
    2006 1ST INTERNATIONAL CONFERENCE ON DIGITAL INFORMATION MANAGEMENT, 2006, : 187 - 192
  • [48] The Application of Data Mining Technology in the Intrusion Detection System
    Jia, Zongpu
    Jin, Shichao
    THIRD INTERNATIONAL SYMPOSIUM ON COMPUTER SCIENCE AND COMPUTATIONAL TECHNOLOGY (ISCSCT 2010), 2010, : 208 - 211
  • [49] Application of data mining technology to intrusion detection system
    Xia, HX
    Qi, S
    Rui, H
    DCABES 2004, Proceedings, Vols, 1 and 2, 2004, : 1027 - 1030
  • [50] Application of Data Mining on the Design of Intrusion Detection System
    Chang Zhen-yun
    Du Yan-fang
    2011 INTERNATIONAL CONFERENCE ON ELECTRONICS, COMMUNICATIONS AND CONTROL (ICECC), 2011, : 1890 - 1893