Skip to main content
Top

2017 | OriginalPaper | Chapter

Improved OBS-NMF Algorithm for Intrusion Detection

Authors : Wenping Ma, Yue Wu, Shanfeng Wang, Maoguo Gong

Published in: Bio-inspired Computing: Theories and Applications

Publisher: Springer Singapore

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

In this paper, the optimal brain surgeon (OBS) strategy is introduced to improve the iterative rule of non-negative matrix factorization (NMF) algorithm for intrusion detection, which is called OBS-NMF algorithm. A new convergence condition and criterion function are proposed to improve the performance of the OBS-NMF algorithm. Then the proposed method is applied in the HIDS and NIDS, the experimental results show that our method can obtain higher accuracy and better stability than the NMF algorithm, and achieves satisfying detection performance. The improved OBS-NMF algorithm is also suitable for real-time intrusion detection.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Alaeiyan, M.H., Parsa, S.: Automatic loop detection in the sequence of system calls. In: International Conference on Knowledge-Based Engineering and Innovation, pp. 720–723. IEEE (2015) Alaeiyan, M.H., Parsa, S.: Automatic loop detection in the sequence of system calls. In: International Conference on Knowledge-Based Engineering and Innovation, pp. 720–723. IEEE (2015)
2.
go back to reference Canfora, G., Medvet, E., Mercaldo, F., Visaggio, C.A.: Detecting android malware using sequences of system calls. In: International Workshop on Software Development Lifecycle for Mobile, pp. 13–20. ACM (2015) Canfora, G., Medvet, E., Mercaldo, F., Visaggio, C.A.: Detecting android malware using sequences of system calls. In: International Workshop on Software Development Lifecycle for Mobile, pp. 13–20. ACM (2015)
3.
go back to reference Cardona-Morrell, M., Chapman, A., Turner, R.M., Lewis, E., Gallego-Luxan, B., Parr, M., Hillman, K.: Pre-existing risk factors for in-hospital death among older patients could be used to initiate end-of-life discussions rather than rapid response system calls: a case-control study. Resuscitation, 76–80 (2016) Cardona-Morrell, M., Chapman, A., Turner, R.M., Lewis, E., Gallego-Luxan, B., Parr, M., Hillman, K.: Pre-existing risk factors for in-hospital death among older patients could be used to initiate end-of-life discussions rather than rapid response system calls: a case-control study. Resuscitation, 76–80 (2016)
4.
go back to reference Ashfaq, R.A.R., Wang, X.Z., Huang, J.Z., Abbas, H., He, Y.L.: Fuzziness based semi-supervised learning approach for intrusion detection system. Inform. Sci. 378, 484–497 (2017)CrossRef Ashfaq, R.A.R., Wang, X.Z., Huang, J.Z., Abbas, H., He, Y.L.: Fuzziness based semi-supervised learning approach for intrusion detection system. Inform. Sci. 378, 484–497 (2017)CrossRef
5.
go back to reference Hernando, A., Bobadilla, J., Ortega, F.: A non negative matrix factorization for collaborative filtering recommender systems based on a bayesian probabilistic model. Knowl-Based. Syst. 97, 188–202 (2016)CrossRef Hernando, A., Bobadilla, J., Ortega, F.: A non negative matrix factorization for collaborative filtering recommender systems based on a bayesian probabilistic model. Knowl-Based. Syst. 97, 188–202 (2016)CrossRef
6.
go back to reference Zafeiriou, S., Petrou, M.: Nonlinear non-negative component analysis algorithms. IEEE Trans. Image Process. 19(4), 1050–1066 (2010)CrossRefMATHMathSciNet Zafeiriou, S., Petrou, M.: Nonlinear non-negative component analysis algorithms. IEEE Trans. Image Process. 19(4), 1050–1066 (2010)CrossRefMATHMathSciNet
7.
go back to reference Oza, N., Castle, J.P., Stutz, J.: Classification of aeronautics system health and safety documents. IEEE Trans. Power Syst. Man Cybern. Part C (Appl. Rev.) 39(6), 670–680 (2009)CrossRef Oza, N., Castle, J.P., Stutz, J.: Classification of aeronautics system health and safety documents. IEEE Trans. Power Syst. Man Cybern. Part C (Appl. Rev.) 39(6), 670–680 (2009)CrossRef
8.
go back to reference Grindlay, G., Ellis, D.: Multi-Voice polyphonic music transcription using eigen instruments. In: IEEE Workshop on Applications of Signal Processing to Audio and Acoustics, vol. 18(21), pp. 53–56 (2009) Grindlay, G., Ellis, D.: Multi-Voice polyphonic music transcription using eigen instruments. In: IEEE Workshop on Applications of Signal Processing to Audio and Acoustics, vol. 18(21), pp. 53–56 (2009)
9.
go back to reference Hassibi, B., Stork, D.G., Wolff, G.J.: Optimal Brain Surgeon and general network pruning. In: IEEE International Conference on Neural Networks, pp. 293–299 (1993) Hassibi, B., Stork, D.G., Wolff, G.J.: Optimal Brain Surgeon and general network pruning. In: IEEE International Conference on Neural Networks, pp. 293–299 (1993)
10.
go back to reference Forrest, S., Hofmeyr, S. A., Somayaji, A., Longstaff, T, A.: A sense of self for unix processes. In: IEEE Symposium on Security and Privacy, pp. 120–128 (1996) Forrest, S., Hofmeyr, S. A., Somayaji, A., Longstaff, T, A.: A sense of self for unix processes. In: IEEE Symposium on Security and Privacy, pp. 120–128 (1996)
11.
go back to reference Tran, D., Tan, Y.K.: Sensorless illumination control of a networked led-lighting system using feedforward neural network. IEEE Trans. Ind. Electron. 61(4), 2113–2121 (2014)CrossRef Tran, D., Tan, Y.K.: Sensorless illumination control of a networked led-lighting system using feedforward neural network. IEEE Trans. Ind. Electron. 61(4), 2113–2121 (2014)CrossRef
12.
go back to reference Attik, M., Bougrain, L., Alexandre, F.: Optimal brain surgeon variants for feature selection. In: IEEE International Joint Conference on Neural Networks, pp. 1371–1374. IEEE (2004) Attik, M., Bougrain, L., Alexandre, F.: Optimal brain surgeon variants for feature selection. In: IEEE International Joint Conference on Neural Networks, pp. 1371–1374. IEEE (2004)
13.
go back to reference Lee, D.D., Seung, H.S.: Algorithms for Nonegative Matrix Factorization. Adv. Neural Inf. Process. Syst. 13, 556–562 (2001) Lee, D.D., Seung, H.S.: Algorithms for Nonegative Matrix Factorization. Adv. Neural Inf. Process. Syst. 13, 556–562 (2001)
14.
go back to reference Wang, W., Guan, X.H., Zhang, X.L.: Profiling program and user behaviors for anomaly intrusion detection based on non-negative matrix factorization. In: IEEE Conference on Decision and Control, pp. 99–104 (2004) Wang, W., Guan, X.H., Zhang, X.L.: Profiling program and user behaviors for anomaly intrusion detection based on non-negative matrix factorization. In: IEEE Conference on Decision and Control, pp. 99–104 (2004)
16.
go back to reference Wang, W., Guan, X., Zhang, X.: Processing of massive audit data streams for real-time anomaly intrusion detection. IEICE Trans. Fund. Electron. 31(1), 58–72 (2008) Wang, W., Guan, X., Zhang, X.: Processing of massive audit data streams for real-time anomaly intrusion detection. IEICE Trans. Fund. Electron. 31(1), 58–72 (2008)
Metadata
Title
Improved OBS-NMF Algorithm for Intrusion Detection
Authors
Wenping Ma
Yue Wu
Shanfeng Wang
Maoguo Gong
Copyright Year
2017
Publisher
Springer Singapore
DOI
https://doi.org/10.1007/978-981-10-7179-9_47

Premium Partner