期刊文献+

A Method for Anomaly Detection of User Behaviors Based on Machine Learning 被引量:4

A Method for Anomaly Detection of User Behaviors Based on Machine Learning
原文传递
导出
摘要 This paper presents a new anomaly detection method based on machine learning. Applicable to host-based intrusion detection .systems, this method uses shell commands as audit data. The method employs shell command sequences of different lengths to characterize behavioral patterns of a network user, and constructs multiple sequence libraries to represent the user's normal behavior profile. In the detection stage, the behavioral patterns in the audit data are mined by a sequence-matching algorithm, and the similarities between the mined patterns and the historical profile are evaluated. These similarities are then smoothed with sliding windows, and the smoothed similarities are used to determine whether the monitored user's behaviors are normal or anomalous. The results of our experience show the method can achieve higher detection accuracy and .shorter detection time than the instance-based method presented by Lane T. The method has been successfully applied in practical host-based intrusion detection systems. This paper presents a new anomaly detection method based on machine learning. Applicable to host-based intrusion detection .systems, this method uses shell commands as audit data. The method employs shell command sequences of different lengths to characterize behavioral patterns of a network user, and constructs multiple sequence libraries to represent the user's normal behavior profile. In the detection stage, the behavioral patterns in the audit data are mined by a sequence-matching algorithm, and the similarities between the mined patterns and the historical profile are evaluated. These similarities are then smoothed with sliding windows, and the smoothed similarities are used to determine whether the monitored user's behaviors are normal or anomalous. The results of our experience show the method can achieve higher detection accuracy and .shorter detection time than the instance-based method presented by Lane T. The method has been successfully applied in practical host-based intrusion detection systems.
出处 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2006年第2期61-65,78,共6页 中国邮电高校学报(英文版)
基金 ThisworkissupportedbyNational"863"HighTechnologyProjectsofChina(86330775)andResearchFoundationofBeijingCapitelGroupCorporation(011025).
关键词 intrusion detection machine learning anomaly detection shell command intrusion detection machine learning anomaly detection shell command
作者简介 Biographies: TIAN Xin-guang, male, Ph. D. of National University of Defense Technology, interested in the research on intrusion detection, network security, and digital signal processing.GAO Li-zhi, male, Ph. D. of Tsinghua University, associate professor, interested in the research on intrusion detection, network security, and firewall technology.SUN Chun-lai, female, senior engineer of Beijing Jiaotong University, interested in the research on computer network, information security.DUAN Mi-yi, male, professor of Beijing Jiaotong University, interested in the research on information processing, computer network.ZHANG Er-yang, male, professor, tutor of doctor students, National University of Defense Technology, interested in the research on information security, computer network, and signal processing.
  • 相关文献

参考文献3

二级参考文献15

  • 1杨武,方滨兴,云晓春,张宏莉,胡铭曾.一种高性能分布式入侵检测系统的研究与实现[J].北京邮电大学学报,2004,27(4):83-86. 被引量:14
  • 2[1]Lee Wenke, Stolfo S J. Data mining approaches for intrusion detection. In: Proc the 7th USENIX Security Symposium, San Antonio, TX, 1998
  • 3[2]Lee Wenke, Stolfo S J, Mok K W. A data mining framework for building intrusion detection models. In: Proc the 1999 IEEE Symposium on Security and Privacy, Berkely, California, 1999. 120-132
  • 4[3]Lee Wenke. A data mining framework for constructing features and models for intrusion detection systems[Ph D dissertation]. Columbia University, 1999
  • 5[4]Paxson Vern. Bro: A system for detecting network intruders in real-time. In: Proc the 7th USENIX Security Symposium, San Antonio, TX, 1998
  • 6[5]Agrawal Rakesh, Srikant Ramakrishnan. Fast algorithms for mining association rules. In: Proc the 20th International Conference on Very Large Databases, Santiago, Chile, 1994
  • 7[6]Agrawal Rakesh, Srikant Ramakrishnan. Mining sequential patterns. IBM Almaden Research Center, San Jose, California:Research Report RJ 9910, 1994
  • 8[7]Chen M, Han J, Yu P. Data mining: An overview from database perspective. IEEE Trans Knowledge and Data Engineeing, 1996,8(6):866-883
  • 9Lane T,Brodley C E. An application of machine learning to anomaly detection. In:Proceedings of the 20th National Informa-tion Systems Security Conference,Baltimore Marylard, USA, 1997.366~377
  • 10Kosoresow A P,Hofmeyr S A. A shape of self for UNIX processes. IEEE Software,1997,14(5):35~42

共引文献98

同被引文献46

引证文献4

二级引证文献14

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部