DocumentCode :
244732
Title :
A Parameterless Learning Algorithm for Behavior-Based Detection
Author :
Can Wang ; Yaokai Feng ; Kawamoto, Junpei ; Hori, Yoichi ; Sakurai, Kimio
Author_Institution :
Dept. of Inf., Kyushu Univ. Inst. of Syst., Fukuoka, Japan
fYear :
2014
fDate :
3-5 Sept. 2014
Firstpage :
11
Lastpage :
18
Abstract :
The frequency and the extent of damages caused by network attacks have been actually increasing greatly in recent years, although many approaches to avoiding and detecting attacks have been proposed in the community of network security. Thus, how to fast detect actual or potential attacks has become an urgent issue. Among the detection strategies, behavior-based ones, which use normal access patterns learned from reference data (e.g., History traffic) to detect new attacks, have attracted attention from many researchers. In each of all such strategies, a learning algorithm is necessary and plays a key role. Obviously, whether the learning algorithm can extract the normal behavior modes properly or not directly influence the detection result. However, some parameters have to determine in advance in the existing learning algorithms, which is not easy, even not feasible, in many actual applications. For example, even in the newest learning algorithm, which called FHST learning algorithm in this study, two parameters are used and they are difficult to be determined in advance. In this study, we propose a parameter less learning algorithm for the first time, in which no parameters are used. The efficiency of our proposal is verified by experiment. Although the proposed learning algorithm in this study is designed for detecting port scans, it is obviously able to be used to other behavior-based detections.
Keywords :
learning (artificial intelligence); security of data; FHST learning algorithm; avoiding attack; behavior-based detection; detecting attack; detection strategy; history traffic; network attack; network security; normal access pattern; normal behavior mode; parameterless learning algorithm; port scan; Algorithm design and analysis; Educational institutions; History; Information technology; Ports (Computers); Security; Time-frequency analysis; attack detection; behavior-based detection; learning algorithm; network security; port scan;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Information Security (ASIA JCIS), 2014 Ninth Asia Joint Conference on
Conference_Location :
Wuhan
Type :
conf
DOI :
10.1109/AsiaJCIS.2014.29
Filename :
7023233
Link To Document :
بازگشت