Improved Intrusive Process Detection Via Text Categorization
نویسنده
چکیده
This paper compares the efficacy of two anomaly detection classifiers with respect to the classification of processes as either intrusive or non-intrusive. To the task of process classification, both classifiers treat processes as system call sequences, encode those system call sequences as text documents, and apply the k-nearest neighbor text categorization method to classify the processes. In these text documents, system call attributes are represented as weighted frequencies. One of the classifiers; an established anomaly detection classifier encodes system calls associated with a process as a vector of weighted frequencies. The other, putative classifier encodes pairs of sequential system calls as a twodimensional table of weighted frequencies. For a process, each entry in the table represents the weighted frequency of a transition from one system call to the next. As such the putative classifier categorizes processes based on local system call ordering and system call frequency, while the established classifier relies on system call frequency alone. Using the DARPA Off-line Intrusion Detection Evaluation data, this paper shows that the putative, weighted-table anomaly detection classifier more accurately identifies intrusive processes than the weighted-vector k-nearest neighbor classifier. By employing a more detailed encoding of system call sequences, the putative, weighted-table classifier achieves a higher detection rate while maintaining a low false positive rate relative to the weighted-vector classifier.
منابع مشابه
Using Text Categorization Techniques for Intrusion Detection
A new approach, based on the k-Nearest Neighbor (kNN) classifier, is used to classify program behavior as normal or intrusive. Short sequences of system calls have been used by others to characterize a program’s normal behavior before. However, separate databases of short system call sequences have to be built for different programs, and learning program profiles involves time-consuming trainin...
متن کاملUse of K-Nearest Neighbor classifier for intrusion detection
A new approach, based on the k-Nearest Neighbor (kNN) classifier, is used to classify program behavior as normal or intrusive. Program behavior, in turn, is represented by frequencies of system calls. Each system call is treated as a word and the collection of system calls over each program execution as a document. These documents are then classified using kNN classifier, a popular method in te...
متن کاملText Categorization Techniques for Intrusion Detection -- A N-Gram-Based Method
Text categorization techniques have been used in anomaly intrusion detection by Liao and Vermuri in USENIX 02 paper. [1] Another n-gram-based text categorization method proposed in this report is expected to improve the performance of intrusion detection system that implements Liao’s method.
متن کاملEvent Detection for Supporting Environmental Scanning: An Information Extraction-based Approach
Environmental scanning, the acquisition and use of the information about events, trends, and relationships in an organization’s external environment, permits an organization to adapt to its environment and to develop effective responses to secure or improve the organization’s position in the future. Event detection technique that identifies the onset of new events from streams of news stories w...
متن کاملSupport Vector Machines for Text Categorization
Text categorization is the process of sorting text documents into one or more predefined categories or classes of similar documents. Differences in the results of such categorization arise from the feature set chosen to base the association of a given document with a given category. Advocates of text categorization recognize that the sorting of text documents into categories of like documents r...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2004