Using artificial anomalies to detect unknown and known network intrusions

被引:54
作者
Fan, W [1 ]
Miller, A
Stolfo, S
Lee, W
Chan, P
机构
[1] IBM Corp, TJ Watson Res Ctr, Hawthorne, NY 10532 USA
[2] Columbia Univ, New York, NY USA
[3] Georgia Tech, Coll Comp Sci, Atlanta, GA USA
[4] Florida Inst Technol, Melbourn, FL USA
关键词
anomaly detection; intrusion detection; artificial anomaly; security;
D O I
10.1007/s10115-003-0132-7
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Intrusion detection systems (IDSs) must be capable of detecting new and unknown attacks, or anomalies. We study the problem of building detection models for both pure anomaly detection and combined misuse and anomaly detection (i.e., detection of both known and unknown intrusions). We show the necessity of artificial anomalies by discussing the failure to use conventional inductive learning methods to detect anomalies. We propose an algorithm to generate artificial anomalies to coerce the inductive learner into discovering an accurate boundary between known classes (normal connections and known intrusions) and anomalies. Empirical studies show that our pure anomaly-detection model trained using normal and artificial anomalies is capable of detecting more than 77% of all unknown intrusion classes with more than 50% accuracy per intrusion class. The combined misuse and anomaly-detection models are as accurate as a pure misuse detection model in detecting known intrusions and are capable of detecting at least 50% of unknown intrusion classes with accuracy measurements between 75 and 100% per class.
引用
收藏
页码:507 / 527
页数:21
相关论文
共 13 条
[1]  
[Anonymous], P 11 EUR C MACH LEAR
[2]  
[Anonymous], THESIS COLUMBIA U
[3]  
Cohen W. W., 1995, P 12 INT C MACH LEAR, P115, DOI DOI 10.1016/B978-1-55860-377-6.50023-2
[4]   A sense of self for unix processes [J].
Forrest, S ;
Hofmeyr, SA ;
Somayaji, A ;
Longstaff, TA .
1996 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 1996, :120-128
[5]  
Ghosh AK, 1999, PROCEEDINGS OF THE WORKSHOP ON INTRUSION DETECTION AND NETWORK MONITORING (ID '99), P51
[6]  
JAVITZ H, 1991, P IEEE S SEC PRIV, P1991
[7]  
Kubat M, 1997, P 14 INT C MACH LEAR, P821
[8]  
Lane T., 1998, Proceedings Fourth International Conference on Knowledge Discovery and Data Mining, P259
[9]   Information-theoretic measures for anomaly detection [J].
Lee, W ;
Xiang, D .
2001 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2001, :130-143
[10]   Benchmarking anomaly-based detection systems [J].
Maxion, RA ;
Tan, KMC .
DSN 2000: INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS, PROCEEDINGS, 2000, :623-630