Abstract
This paper uses a real-time anomaly attack detection based on improved variable length sequences and data mining. The method is mainly used for host-based intrusion detection systems on Linux or Unix platforms which use shell commands. The algorithm first generates a stream of command sequences with different lengths and subsumes them into a generic sequence library, de-duplicats and sortes shell command sequences. The shell command sequences are then stratified according to their weighted frequency of occurrence to define the state. Next, the behavioural patterns of normal users are mined to output the state stream and a Markov chain is constructed. Then, the state sequences are calculated based on a primary probability distribution and a transfer probability matrix. The System will check decision values of the short sequence stream. Finally, the decision values of the behavioural sequences are analysed to determine whether the current session user is behaving abnormally. The improved algorithm introduces the concept of multi-order frequencies and proposes a new separation mechanism. The extension module is integrated into the variable length model. By comparing the performance of the old and new separation mechanisms on the SEA dataset and the self-made dataset (SD), it is found that the improved model greatly improves the performance of the model and shortens the running time.
Subject
Computational Mathematics,Computer Science Applications,General Engineering
Reference9 articles.
1. Analysis of two anomaly detection methods in intrusion detection system;Xian;Network Security Technology and Application
2. Computerintrusion: Detecting masquerades;Schonlau;Statistical Science
3. Empirical evaluation of SVM-based masquerade detection using UNIX commands;Kim;Computer Security,2005
4. A data-drivensemi-global alignment approach for detecting masquerade attacks;Kholidy;IEEE Transactions on Dependable and Secure Computing
5. Wireless Traffic Prediction With Scalable Gaussian Process: Framework, Algorithms, and Verification
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Research on techniques for detecting brute-force attacks on corporate email;Journal of Computational Methods in Sciences and Engineering;2024-06-17