Intrusion detection system using sequence and set preserving metric

8Citations
Citations of this article
12Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Intrusion detection systems rely on a wide variety of observable data to distinguish between legitimate and illegitimate activities. In this paper we investigate the use of sequences of system calls for classifying intrusions and faults induced by privileged processes in Unix Operating system. In our work we applied sequence-data mining approach in the context of intrusion detection system (IDS). This paper introduces a new similarity measure that considers both sequence as well as set similarity among sessions. Considering both order of occurrences as well as content in a session enhances the capabilities of kNN classifier significantly, especially in the context of intrusion detection. From our experiments on DARPA 1998 IDS dataset we infer that the order of occurrences plays a major role in determining the nature of the session. The objective of this work is to construct concise and accurate classifiers to detect anomalies based on sequence as well as set similarity. © Springer-Verlag Berlin Heidelberg 2005.

Cite

CITATION STYLE

APA

Kumar, P., Rao, M. V., Krishna, P. R., Bapi, R. S., & Laha, A. (2005). Intrusion detection system using sequence and set preserving metric. In Lecture Notes in Computer Science (Vol. 3495, pp. 498–504). Springer Verlag. https://doi.org/10.1007/11427995_49

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free