A Fast Host-Based Intrusion Detection System Using Rough Set Theory

نویسندگان

  • Sanjay Rawat
  • Ved Prakash Gulati
  • Arun K. Pujari
چکیده

Intrusion Detection system has become the main research focus in the area of information security. Last few years have witnessed a large variety of technique and model to provide increasingly efficient intrusion detection solutions. We advocate here that the intrusive behavior of a process is highly localized characteristics of the process. There are certain smaller episodes in a process that make the process intrusive in an otherwise normal stream. As a result it is unnecessary and most often misleading to consider the whole process in totality and to attempt to characterize its abnormal features. In the present work we establish that subsequences of reasonably small length of sequence of system calls would suffice to identify abnormality in a process. We make use of rough set theory to demonstrate this concept. Rough set theory also facilitates identifying rules for intrusion detection. The main contributions of the paper are the following(a) It is established that very small subsequence of system call is sufficient to identify intrusive behavior with high accuracy. We demonstrate our result using DARPA’98 BSM data; (b) A rough set based system is developed that can extract rules for intrusion detection; (c) An algorithm is presented that can determine the status of a process as either normal or abnormal on-line.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

The Discretization Algorithm for Rough Data and Its Application to Intrusion Detection

The data processed by intrusion detection systems usually is vague, uncertainty, imprecise and incomplete. Rough Set theory is one of the best methods to process this kind of data. But Rough Set theory can only process some discrete data. So the data with continuous numerical attributes must be discretized before they are used. Some current discretization algorithms are classified and reviewed ...

متن کامل

Network Intrusion Detection System Using Genetic Algorithm Ppt

Intrusion Detection Systems (IDSs) detects the network factor for traditional SNORT (Network Based Intrusion. Detection Using Genetic Algorithms for intrusion detection has proven to be an implementation method. Section IV. Designing of On Line Intrusion Detection System Using Rough Set Theory and Q Evaluation of Rough Set Theory Based Network Traffic Data Classifier Using Traffic Data Classifi...

متن کامل

A Resourceful Intrusion Detection System for Manet Using Rough Set Theory and Support Vector Machine

Mobile impromptu Networks has more difficult vulnerabilities compared with wired networks. Mobile impromptu networking (MANET) has become a vital technology in current years attributable to the speedy proliferation of wireless devices. They’re extremely at risk of attacks thanks to the open medium, dynamically ever-changing topology and lack of centralized watching purpose. It’s vital to look n...

متن کامل

Intrusion Detection Using Modern Techniques: Integration of Genetic Algorithms and Rough Set with Neural Nets

Intrusion detection system (IDS) is now becoming an integral part of the network security infrastructure. Data mining tools are widely used for developing an IDS. However, this requires an ability to find the mapping from the input space to the output space with the help of available data. Rough sets and neural networks are the best known data mining tools to analyze data and help solve this pr...

متن کامل

A Rough-Fuzzy Hybrid Algorithm for Computer Intrusion Detection

In this paper, we propose an intrusion detection method that combines rough sets theory and fuzzy c-means for anomaly detection. The first step consists of attribute selection which is based on rough set theory for each of the 5 classes of intrusions in the Defense Advanced Research Projects Agency (DARPA) data is identified. The next phase is clustering by using fuzzy c-means; we are using rou...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2005