A Fast Host-Based Intrusion Detection System Using Rough Set Theory
نویسندگان
چکیده
Intrusion Detection system has become the main research focus in the area of information security. Last few years have witnessed a large variety of technique and model to provide increasingly efficient intrusion detection solutions. We advocate here that the intrusive behavior of a process is highly localized characteristics of the process. There are certain smaller episodes in a process that make the process intrusive in an otherwise normal stream. As a result it is unnecessary and most often misleading to consider the whole process in totality and to attempt to characterize its abnormal features. In the present work we establish that subsequences of reasonably small length of sequence of system calls would suffice to identify abnormality in a process. We make use of rough set theory to demonstrate this concept. Rough set theory also facilitates identifying rules for intrusion detection. The main contributions of the paper are the following(a) It is established that very small subsequence of system call is sufficient to identify intrusive behavior with high accuracy. We demonstrate our result using DARPA’98 BSM data; (b) A rough set based system is developed that can extract rules for intrusion detection; (c) An algorithm is presented that can determine the status of a process as either normal or abnormal on-line.
منابع مشابه
The Discretization Algorithm for Rough Data and Its Application to Intrusion Detection
The data processed by intrusion detection systems usually is vague, uncertainty, imprecise and incomplete. Rough Set theory is one of the best methods to process this kind of data. But Rough Set theory can only process some discrete data. So the data with continuous numerical attributes must be discretized before they are used. Some current discretization algorithms are classified and reviewed ...
متن کاملNetwork Intrusion Detection System Using Genetic Algorithm Ppt
Intrusion Detection Systems (IDSs) detects the network factor for traditional SNORT (Network Based Intrusion. Detection Using Genetic Algorithms for intrusion detection has proven to be an implementation method. Section IV. Designing of On Line Intrusion Detection System Using Rough Set Theory and Q Evaluation of Rough Set Theory Based Network Traffic Data Classifier Using Traffic Data Classifi...
متن کاملA Resourceful Intrusion Detection System for Manet Using Rough Set Theory and Support Vector Machine
Mobile impromptu Networks has more difficult vulnerabilities compared with wired networks. Mobile impromptu networking (MANET) has become a vital technology in current years attributable to the speedy proliferation of wireless devices. They’re extremely at risk of attacks thanks to the open medium, dynamically ever-changing topology and lack of centralized watching purpose. It’s vital to look n...
متن کاملIntrusion Detection Using Modern Techniques: Integration of Genetic Algorithms and Rough Set with Neural Nets
Intrusion detection system (IDS) is now becoming an integral part of the network security infrastructure. Data mining tools are widely used for developing an IDS. However, this requires an ability to find the mapping from the input space to the output space with the help of available data. Rough sets and neural networks are the best known data mining tools to analyze data and help solve this pr...
متن کاملA Rough-Fuzzy Hybrid Algorithm for Computer Intrusion Detection
In this paper, we propose an intrusion detection method that combines rough sets theory and fuzzy c-means for anomaly detection. The first step consists of attribute selection which is based on rough set theory for each of the 5 classes of intrusions in the Defense Advanced Research Projects Agency (DARPA) data is identified. The next phase is clustering by using fuzzy c-means; we are using rou...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2005