DocumentCode :
1863030
Title :
Analysis of command frequency and command sequence grammar in IDS
Author :
Zhou, Jian ; Shirai, Haruhiko ; Kuroiwa, Jousuke ; Odaka, Tomohiro ; Ogura, Hisakazu
Author_Institution :
Venture Bus. Lab., Univ. of Fukui, Fukui
fYear :
2008
fDate :
25-27 June 2008
Firstpage :
113
Lastpage :
118
Abstract :
Masquerader is someone who impersonates another user and operates computer system with privileged access. It´s difficult to detect out by conventional techniques as firewall or misuse-based intrusion detection. Anomaly detection has been considered as a promising approach for masquerade detection, which is based on the idea that significant departures from normal behavior could be considered due to a masquerade. However, for low detection accuracy and high false alarm rate, it is still in research stage. Till now, many methods have been proposed from different viewpoints, such as Hidden Markov Model, Naive Bayes, SVM, and so on. Compared with other methods that with well theoretical backgrounds, two intuitive determined statistical methods: the Customized Grammars method and the Self Signature approach combined with Uniqueness, reported the much better detection efficiency. Especially, both methods based on the intuitive notion that the more frequently a usage pattern was employed by current user previously, the more indicative of normal. In other hand, the statistics of usage pattern in the Customized Grammars method was based on sequential grammars, and that of the Self Signature approach combined with Uniqueness was on commands and 2-grams. In this paper, these two methods are compared and evaluated on two benchmark data sets of Unix command sequence: the Schonlau data and the Greenberg data. As a result, contributions of command frequency and command sequence grammar in IDS were analyzed and clarified.
Keywords :
Unix; authorisation; grammars; statistical analysis; Greenberg data; IDS; Schonlau data; Unix command sequence; anomaly detection; command frequency; command sequence grammar; customized grammars; firewall; masquerade detection; misuse-based intrusion detection; self signature approach; statistical methods; Application software; Computer applications; Computer industry; Data security; Frequency; Hidden Markov models; Intrusion detection; Statistical analysis; Statistics; Support vector machines; Command sequence; Customized grammar; Intrusion detection system (IDS); Masquerade detection; N-gram; Self signature; Uniqueness; Unix;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Soft Computing in Industrial Applications, 2008. SMCia '08. IEEE Conference on
Conference_Location :
Muroran
Print_ISBN :
978-1-4244-3782-5
Electronic_ISBN :
978-4-9904-2590-6
Type :
conf
DOI :
10.1109/SMCIA.2008.5045945
Filename :
5045945
Link To Document :
بازگشت