Title :
Bayesian event classification for intrusion detection
Author :
Kruegel, Christopher ; Mutz, Darren ; Robertson, William ; Valeur, Fredrik
Author_Institution :
Reliable Software Group, California Univ., Santa Barbara, CA, USA
Abstract :
Intrusion detection systems (IDSs) attempt to identify attacks by comparing collected data to predefined signatures known to be malicious (misuse-based IDSs) or to a model of legal behavior (anomaly-based IDSs). Anomaly-based approaches have the advantage of being able to detect previously unknown attacks, but they suffer from the difficulty of building robust models of acceptable behavior, which may result in a large number of false alarms. Almost all current anomaly-based intrusion detection systems classify an input event as normal or anomalous by analyzing its features, utilizing a number of different models. A decision for an input event is made by aggregating the results of all employed models. We have identified two reasons for the large number of false alarms, caused by incorrect classification of events in current systems. One is the simplistic aggregation of model outputs in the decision phase. Often, only the sum of the model results is calculated and compared to a threshold. The other reason is the lack of integration of additional information into the decision process. This additional information can be related to the models, such as the confidence in a model´s output, or can be extracted from external sources. To mitigate these shortcomings, we propose an event classification scheme that is based on Bayesian networks. Bayesian networks improve the aggregation of different model outputs and allow one to seamlessly incorporate additional information. Experimental results show that the accuracy of the event classification process is significantly improved using our proposed approach.
Keywords :
belief networks; computer crime; message authentication; pattern classification; Bayesian event classification; Bayesian networks; anomaly-based IDS; anomaly-based intrusion detection systems; input event decision; misuse-based IDS; model output aggregation; predefined malicious signatures; Bayesian methods; Data mining; Floods; Intrusion detection; Law; Legal factors; Operating systems; Robustness; Telecommunication traffic; Traffic control;
Conference_Titel :
Computer Security Applications Conference, 2003. Proceedings. 19th Annual
Print_ISBN :
0-7695-2041-3
DOI :
10.1109/CSAC.2003.1254306