Efficient deterministic method for detecting new U2R attacks

被引:10
作者
Beghdad, Rachid [1 ]
机构
[1] Univ Bejaia, Dept Comp Sci, Bejaia 06000, Algeria
关键词
Linear programming system; Behavior classes; Misuse detection; Simulation tool; Knowledge discovery; Data mining (KDD) dataset;
D O I
10.1016/j.comcom.2008.12.037
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The purpose of this study is to describe an efficient deterministic intrusion detection approach that detects both old and new attacks. We especially focused on detecting the user to root (U2R) attacks of the 1999 DARPA evaluation dataset. The main idea of our approach is to test if an unknown behavior is close enough to a known behavior (attack or normal) such as we can conclude that it belongs to its class. To achieve that, we formulate the problem of intrusion detection as a linear programming system (LPS). The objective function of this LPS leads to minimize the distance between an unknown behavior and one of the known behaviors, by respect of some constraints. The solution of such a problem is a set of bivalent variables x(ij). If (x(ij) = 1) then we can conclude that the unknown behavior i belong to the class of behaviors j. Our experiments demonstrated the efficiency of our approach. (C) 2009 Elsevier B.V. All rights reserved.
引用
收藏
页码:1104 / 1110
页数:7
相关论文
共 10 条
[1]  
[Anonymous], 1999, KDD DAT SET
[2]  
BASU R, 2001, P 2001 IEEE WORKSH I
[3]   Modelling and solving the intrusion detection problem in computer networks [J].
Beghdad, R .
COMPUTERS & SECURITY, 2004, 23 (08) :687-696
[4]  
BEGHDAD R, 2007, INT SCI J COMPUTING, V6, P115
[5]  
Bouzida Y., 2006, IEEE IST WORKSH MON
[6]  
Cormen ThomasH., 2001, INTRO ALGORITHMS, VSecond, P790
[7]  
Lee W., 2000, ACM Transactions on Information and Systems Security, V3, P227, DOI 10.1145/382912.382914
[8]  
Mahoney MV, 2001, CS20012 FLOR I TECHN
[9]  
ME L, 1994, THESIS U RENNES 1 RE
[10]  
YE N, 2001, P 2 IEEE SMC INF ASS, P1