Intrusion detection through learning behavior model

被引:85
作者
Balajinath, B [1 ]
Raghavan, SV [1 ]
机构
[1] Indian Inst Technol, Dept Comp Sci & Engn, Network & Multimedia Syst Lab, Madras 600036, Tamil Nadu, India
关键词
intrusion detection; behavior learning; genetic algorithms;
D O I
10.1016/S0140-3664(00)00364-9
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 [计算机科学与技术];
摘要
Intrusion detection is the process of identifying user actions that might potentially lead a system from a secured state to a compromised state. Normally, it is observed that the users exhibit regularities in their usage of commands of a system, as they tend to achieve the same (or perhaps similar) objective. The command sequences can therefore be used to characterize the user behavior (ACM SIGMETRICS, Performance Evaluation Review, Texas, USA, 13(2) (1985) 40). Deviations from the characteristic behavior pattern of a user can be used to detect potential intrusions. But, it requires that the user behavior is modeled either on an individual or on a group basis, in such a way that the model captures the essence of the user behavior. In this work reported here, we propose an algorithm for intrusion detection, called Genetic algorithm Based Intrusion Detector (GBID) based on "learning the individual user behavior". The user behavior is learnt by using genetic algorithms. Current user behavior can be predicted by genetic algorithms based on the past observed user behavior. The user behavior has been described using a S-tuple (Match index, Entropy index, Newness index). Value of the 3-tuple is calculated for fixed block size of commands in a user session, called command sample. The 3-tuple value of a command sample in user session are compared with expected non-intrusive behavior 3-tuple value to find intrusions. (C) 2001 Elsevier Science B.V. All rights reserved.
引用
收藏
页码:1202 / 1212
页数:11
相关论文
共 23 条
[1]
[Anonymous], 1994, P 17 NAT COMP SEC C
[2]
[Anonymous], ACM Trans. Inf. Syst. Secur, DOI DOI 10.1145/322510.322526
[3]
CROSBIE M, 1995, AAAI FALL S SERIES
[4]
DAVISON BD, 1997, P 14 NAT C ART INT R
[5]
Towards a taxonomy of intrusion-detection systems [J].
Debar, H ;
Dacier, M ;
Wespi, A .
COMPUTER NETWORKS-THE INTERNATIONAL JOURNAL OF COMPUTER AND TELECOMMUNICATIONS NETWORKING, 1999, 31 (08) :805-822
[6]
AN INTRUSION-DETECTION MODEL [J].
DENNING, DE .
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 1987, 13 (02) :222-232
[7]
GHOSH A, 1999, USENIX WORKSH INTR D
[8]
Goldberg D. E., 1999, GENETIC ALGORITHMS S
[9]
STATE TRANSITION ANALYSIS - A RULE-BASED INTRUSION DETECTION APPROACH [J].
ILGUN, K ;
KEMMERER, RA ;
PORRAS, PA .
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 1995, 21 (03) :181-199
[10]
LANE T, 1997, 20 NAT INF SYST SEC, P366