Benchmarking anomaly-based detection systems

被引:49
作者
Maxion, RA [1 ]
Tan, KMC [1 ]
机构
[1] Carnegie Mellon Univ, Dept Comp Sci, Pittsburgh, PA 15213 USA
来源
DSN 2000: INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS, PROCEEDINGS | 2000年
关键词
anomaly detection; benchmarking; computer security; empirical methods; intrusion detection;
D O I
10.1109/ICDSN.2000.857599
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Anomaly detection is a key element of intrusion-detection and other detection systems in which perturbations of normal behavior suggest the presence of intentionally or unintentionally induced attacks, faults, defects, etc. Because most anomaly detectors are based on probabilistic algorithms that exploit the intrinsic structure, or regularity, embedded in data logs, a fundamental question is whether or not such structure influences detection performance. If detector performance is indeed a function of environmental regularity, it would be critical to match detectors to environmental characteristics. In intrusion-detection settings, however, this is not done, possibly because such characteristics are not easily ascertained. This paper introduces a metric for characterizing structure in data environments, and tests the hypothesis that intrinsic structure influences probabilistic detection. In a series of experiments, an anomaly-detection algorithm was applied to benchmark suite of 165 carefully calibrated, anomaly injected datasets of varying structure. Results showed performance differences of as much as an order of magnitude, indicating that current approaches to anomaly detection may not be universally dependable.
引用
收藏
页码:623 / 630
页数:8
相关论文
共 20 条
[1]  
AKHAVAN S, 1998, P 6 INT C FUZZ THEOR, P96
[2]  
AMOROSO EG, 1999, INTRUSION DETECTION
[3]  
Cover T. M., 2005, ELEM INF THEORY, DOI 10.1002/047174882X
[4]   Towards a taxonomy of intrusion-detection systems [J].
Debar, H ;
Dacier, M ;
Wespi, A .
COMPUTER NETWORKS-THE INTERNATIONAL JOURNAL OF COMPUTER AND TELECOMMUNICATIONS NETWORKING, 1999, 31 (08) :805-822
[5]   Computer immunology [J].
Forrest, S ;
Hofmeyr, SA ;
Somayaji, A .
COMMUNICATIONS OF THE ACM, 1997, 40 (10) :88-96
[6]  
Lane T., 1998, 5th ACM Conference on Computer and Communications Security, P150, DOI 10.1145/288090.288122
[7]  
Lippmann R, 2000, P DARPA INF SURV C E, V2, P12, DOI DOI 10.1109/DISCEX.2000.821506
[8]  
LUNT TF, 1990, ANN COMP SEC APPL C, P273
[9]  
MARSAGLIA G, 1984, COMPUTER SCI STAT, P3
[10]   A CASE-STUDY OF ETHERNET ANOMALIES IN A DISTRIBUTED COMPUTING ENVIRONMENT [J].
MAXION, RA ;
FEATHER, FE .
IEEE TRANSACTIONS ON RELIABILITY, 1990, 39 (04) :433-443