Efficient anomaly detection by modeling privilege flows using hidden Markov model

被引:99
作者
Cho, SB [1 ]
Park, HJ [1 ]
机构
[1] Yonsei Univ, Dept Comp Sci, Sudaemoon Ku, Seoul 120749, South Korea
关键词
anomaly detection; privilege flows; system calls; hidden Markov model; intrusion detection;
D O I
10.1016/S0167-4048(03)00112-3
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Anomaly detection techniques have been devised to address the limitations of misuse detection approaches for intrusion detection with the model of normal behaviors. A hidden Markov model (HMM) is a useful tool to model sequence information, an optimal modeling technique to minimize false-positive error while maximizing detection rate. In spite of high performance, however, it requires large amounts of time to model normal behaviors and determine intrusions, making it difficult to detect intrusions in real-time. This paper proposes an effective HMM-based intrusion detection system that improves the modeling time and performance by only considering the privilege transition flows based on the domain knowledge of attacks. Experimental results show that training with the proposed method is significantly faster than the conventional method trained with all data, without loss of detection performance.
引用
收藏
页码:45 / 55
页数:11
相关论文
共 16 条
  • [1] [Anonymous], IEEE ASSP MAGAZINE
  • [2] Axelsson S., 1999, RES INTRUSION DETECT
  • [3] CHOY J, 2000, LECT NOTE ARTIFICIAL, V1886, P829
  • [4] Debar H., 1992, Proceedings. 1992 IEEE Computer Society Symposium on Research in Security and Privacy (Cat. No.92CH3157-5), P240, DOI 10.1109/RISP.1992.213257
  • [5] NADIR: An automated system for detecting network intrusion and misuse
    Hochberg, Judith
    Jackson, Kathleen
    Stallings, Cathy
    McClary, J.F.
    DuBois, David
    Ford, Josephine
    [J]. Computers and Security, 1993, 12 (03) : 235 - 248
  • [6] HOFMEYR S, 2000, EVOLUTIONARY COMPUTA
  • [7] JAVITZ H, 1994, SRI IDES STAT ANOMAL
  • [8] KUPERMAN BA, 1998, 9911 CERIAS PURD U C
  • [9] LLEPINS GE, 1992, COMPUT SECUR, V11, P347
  • [10] LUNT TF, 1993, COMPUTERS SECURITY, V12