Bayesian event classification for intrusion detection

被引:127
作者
Kruegel, C [1 ]
Mutz, D [1 ]
Robertson, W [1 ]
Valeur, F [1 ]
机构
[1] Univ Calif Santa Barbara, Reliable Software Grp, Santa Barbara, CA 93106 USA
来源
19TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS | 2003年
关键词
D O I
10.1109/CSAC.2003.1254306
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Intrusion detection systems (IDSs) attempt to identify attacks by comparing collected data to predefined signatures known to be malicious (misuse-based IDSs) or to a model of legal behavior (anomaly-based IDSs). Anomaly-based approaches have the advantage of being able to detect previously unknown attacks, but they suffer from the difficulty of building robust models of acceptable behavior which may 11 result in a large number of false alarms. Almost all current anomaly-based intrusion detection systems classify an input event as normal or anomalous by analyzing its features, utilizing a number of different models. A decision for all input event is made by aggregating the results of all employed models. We have identified two reasons for the large number of false alarms, caused by incorrect classification of events in current systems. One is the simplistic aggregation of model Outputs in the decision phase. Often, only the sum of the model results is calculated and compared to a threshold. The other reason is the lack of integration of additional information into the decision process. This additional information can be related to the models, such as the confidence in a model's output, or can be extracted from external sources. To mitigate these shortcomings, we propose an event classification scheme that is based oil Bayesian networks. Bayesian networks improve the aggregation of different model outputs and allow one to seamlessly incorporate additional information. Experimental results show that the accuracy of the event classification process is significantly improved using our proposed approach.
引用
收藏
页码:14 / 23
页数:10
相关论文
共 25 条
[1]  
AXELSSON S, 1999, 6 ACM C COMP COMM SE
[2]  
Billingsley P., 1995, Probability and measure, VThird
[3]   AN INTRUSION-DETECTION MODEL [J].
DENNING, DE .
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 1987, 13 (02) :222-232
[4]   A sense of self for unix processes [J].
Forrest, S ;
Hofmeyr, SA ;
Somayaji, A ;
Longstaff, TA .
1996 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 1996, :120-128
[5]  
GOLDMAN R, 2002, S REC ADV INTR DET R
[6]  
ILGUN K, 1993, P IEEE S RES SEC PRI
[7]  
JAVITZ HS, 1991, P IEEE S SEC PRIV MA
[8]  
Jensen FV, 2007, Bayesian Networks and Decision Graphs, V2
[9]  
KRUEGEL C, 2002, S APPL COMP SAC MARC
[10]  
*M LINC LABS, 1999, DARPA INTR DET EV