An Anomaly Intrusion Detection Based on Hidden Markov Model System Call Sequenc

Article Preview

Abstract:

To improve detection accuracy, Utilizing HMM (Hidden Markov model) and BW to building model, the detection accuracy improves greatly. First, the research progress of intrusion detection is recalled, then the model based on Markov and BW is presented. An example of using system call trace data which is used in intrusion detection, is given to illustrate the performance of this model. Finally, comparison of detection ability between the above detection method and others is given. It is found that the IDS based on HMM System Call sequence has improve the accuracy greatly.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 225-226)

Pages:

609-613

Citation:

Online since:

April 2011

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2011 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Liao Y H, Vemuri V R. Use of k-nearest Neighbor Classifier for Intrusion Detection. Computer&security[J]. 2002, vol. 21, No5: 439-448.

DOI: 10.1016/s0167-4048(02)00514-x

Google Scholar

[2] Warrender C, Forrest S, Pearlmutter B. Detecting intrusion using system call: alternative data models[A]. 1999IEEE Symposium on Security and Privacy, Oakland, USA, (1999).

DOI: 10.1109/secpri.1999.766910

Google Scholar

[3] Schlapbach A, Bunke H. Using HMM based recognizersfor writer identification and verification[J]. Frontiers inHandwriting Recognition, 2004, 107(1): 167-172.

DOI: 10.1109/iwfhr.2004.107

Google Scholar

[4] Rabiner L R. A Tutorial on Hidden Markov Models and Selected Applications in Speech Recognition Proceeding of the IEEE[C]. 1989, Vol. 77. No. 2.

DOI: 10.1109/5.18626

Google Scholar

[5] Forrest S, Hofmeyr S A, Somayaji A, et al. A sence of Self for Unix Processes. Proceedings of the 1996 IEEE Symposium on Research in Security and privacy[C] Los Alamos, CA, 1996. 120-128.

DOI: 10.1109/secpri.1996.502675

Google Scholar

[6] Lee W, Stolfo S. Data Mining Approaches for Intrusion Detection. Proceedings of the 7th USENIX Securiposium[C]. Usenix Assocciation, 1998. 79-94.

Google Scholar

[7] C Cortes, V Vapnik. Support vector networks. Machine Learning, 1998, 20(3): 273-297.

Google Scholar