Network intrusion detection based on system calls and data mining

Xinguang TIAN1,Xueqi CHENG1,Miyi DUAN2,Rui LIAO3,Hong CHEN4,Xiaojuan CHEN5,

PDF(168 KB)
PDF(168 KB)
Front. Comput. Sci. ›› 2010, Vol. 4 ›› Issue (4) : 522-528. DOI: 10.1007/s11704-010-0570-9
Research articles

Network intrusion detection based on system calls and data mining

  • Xinguang TIAN1,Xueqi CHENG1,Miyi DUAN2,Rui LIAO3,Hong CHEN4,Xiaojuan CHEN5,
Author information +
History +

Abstract

Anomaly intrusion detection is currently an active research topic in the field of network security. This paper proposes a novel method for detecting anomalous program behavior, which is applicable to host-based intrusion detection systems monitoring system call activities. The method employs data mining techniques to model the normal behavior of a privileged program, and extracts normal system call sequences according to their supports and confidences in the training data. At the detection stage, a fixed-length sequence pattern matching algorithm is utilized to perform the comparison of the current behavior and historic normal behavior, which is less computationally expensive than the variable-length pattern matching algorithm proposed by Hofmeyr et al. At the detection stage, the temporal correlation of the audit data is taken into account, and two alternative schemes could be used to distinguish between normalities and intrusions. The method gives attention to both computational efficiency and detection accuracy, and is especially suitable for online detection. It has been applied to practical hosted-based intrusion detection systems, and has achieved high detection performance.

Keywords

intrusion detection / data mining / system call / anomaly detection

Cite this article

Download citation ▾
Xinguang TIAN, Xueqi CHENG, Miyi DUAN, Rui LIAO, Hong CHEN, Xiaojuan CHEN,. Network intrusion detection based on system calls and data mining. Front. Comput. Sci., 2010, 4(4): 522‒528 https://doi.org/10.1007/s11704-010-0570-9
AI Summary AI Mindmap
PDF(168 KB)

Accesses

Citations

Detail

Sections
Recommended

/