DocumentCode :
2565227
Title :
A Typical Set Method of Intrusion Detection Technology Base on Computer Audit Data
Author :
Xuetao, Duan ; Chunfu, Jia ; Yubing, Fu
fYear :
2007
fDate :
15-19 Dec. 2007
Firstpage :
687
Lastpage :
691
Abstract :
The signature database of intrusion detection system is usually built by the short sequences of system call. The real-time efficiency and accuracy of intrusion detection is greatly influenced by the scale of signature database and the approach of intrusion data analysis. In this paper, a typical set method is provided to compress the normal signature database. Using the data set of UNM CERT sendmail for testing, the feasibility of typical set method is validated, and a proper rate of typical set for intrusion detection is proposed. Meanwhile, the LSM (Linux Security Modules) framework is presented to hook system calls and other audit data from operation system to build intrusion detection system signature database and identify intrusion activity. A system service process oriented detection idea is also introduced to make the intrusion detection more pertinent and accurate. Abnormal detection experiments results show good performance of our intrusion detection method.
Keywords :
Data security; Databases; Entropy; Information systems; Information technology; Information theory; Intrusion detection; Linux; Random variables; Telecommunication traffic;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Computational Intelligence and Security, 2007 International Conference on
Conference_Location :
Harbin, China
Print_ISBN :
0-7695-3072-9
Electronic_ISBN :
978-0-7695-3072-7
Type :
conf
DOI :
10.1109/CIS.2007.89
Filename :
4415432
Link To Document :
بازگشت