Skip to main content
Erschienen in:
Buchtitelbild

2021 | OriginalPaper | Buchkapitel

Intrusion Detection Using a Hybrid Sequential Model

verfasst von : Abhishek Sinha, Aditya Pandey, P. S. Aishwarya

Erschienen in: Advances in Machine Learning and Computational Intelligence

Verlag: Springer Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

A large amount of work has been done on the KDD 99 dataset, most of which include the use of a hybrid anomaly and misuse detection model done in parallel with each other. In order to further classify the intrusions, our approach to network intrusion detection includes the use of two different anomaly detection models followed by misuse detection applied to the combined output obtained from the previous step. The end goal of this is to verify the anomalies detected by the anomaly detection algorithm and clarify whether they are actually intrusions or random outliers from the trained normal (and thus to try and reduce the number of false positives). We aim to detect a pattern in this novel intrusion technique itself, and not the handling of such intrusions. The intrusions were detected to a very high degree of accuracy.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat A. Lazarevic, L. Ertoz, V. Kumar, A comparative study of anomaly detection schemes in network intrusion detection. in Proceedings of the 2003 SIAM International Conference on Data Mining (2002) A. Lazarevic, L. Ertoz, V. Kumar, A comparative study of anomaly detection schemes in network intrusion detection. in Proceedings of the 2003 SIAM International Conference on Data Mining (2002)
2.
Zurück zum Zitat D. Barbara, N. Wu, S. Jajodia, Detecting novel network intrusions using bayes estimators. in Proceedings of the 2001 SIAM International Conference on Data Mining (2001) D. Barbara, N. Wu, S. Jajodia, Detecting novel network intrusions using bayes estimators. in Proceedings of the 2001 SIAM International Conference on Data Mining (2001)
3.
Zurück zum Zitat S.A. Hofmeyr, S. Forrest, A. Somayaji, Intrusion detection using sequences of system calls. J. Comput. Security. 6(3), 151–180 (1998) S.A. Hofmeyr, S. Forrest, A. Somayaji, Intrusion detection using sequences of system calls. J. Comput. Security. 6(3), 151–180 (1998)
4.
Zurück zum Zitat A. Ghosh, A. Schwartzbard, A study in using neural networks for anomaly and misuse detection. in Proceedings of the 8th USENIX Security Symposium, August 23–36,(1999), pp. 141–152 A. Ghosh, A. Schwartzbard, A study in using neural networks for anomaly and misuse detection. in Proceedings of the 8th USENIX Security Symposium, August 23–36,(1999), pp. 141–152
5.
Zurück zum Zitat E. Eskin, W. Lee, S.J. Stolfo, Modeling system calls for intrusion detection with dynamic window sizes. in Proceedings DARPA Information Survivability Conference and Exposition II, (DISCEX’01, 2001) E. Eskin, W. Lee, S.J. Stolfo, Modeling system calls for intrusion detection with dynamic window sizes. in Proceedings DARPA Information Survivability Conference and Exposition II, (DISCEX’01, 2001)
6.
Zurück zum Zitat R. Sekar, A. Gupta, J. Frullo. Specification-based anomaly detection: A new approach for detecting network intrusions. in CCS ‘02: Proceedings of the 9th ACM conference on Computer and communications security, November 2002, (2002), pp. 265–274 R. Sekar, A. Gupta, J. Frullo. Specification-based anomaly detection: A new approach for detecting network intrusions. in CCS ‘02: Proceedings of the 9th ACM conference on Computer and communications security, November 2002, (2002), pp. 265–274
7.
Zurück zum Zitat J. Zhang, M. Zulkernine, A. Haque, Random-forests-based network intrusion detection systems. in IEEE Transactions on Systems, Man, and Cybernetics—part C: Applications and Reviews, vol. 38, No. 5 (2008) J. Zhang, M. Zulkernine, A. Haque, Random-forests-based network intrusion detection systems. in IEEE Transactions on Systems, Man, and Cybernetics—part C: Applications and Reviews, vol. 38, No. 5 (2008)
8.
Zurück zum Zitat J. Cannady, Artificial neural networks for misuse detection. in National Information Systems Security Conference, (1998) J. Cannady, Artificial neural networks for misuse detection. in National Information Systems Security Conference, (1998)
9.
Zurück zum Zitat R.S. Landge, A.P. Wadh, Misuse detection system using various techniques: A review. Int. J. Adv. Res. Comput. Sci., Udaipur 4(6) (2013) R.S. Landge, A.P. Wadh, Misuse detection system using various techniques: A review. Int. J. Adv. Res. Comput. Sci., Udaipur 4(6) (2013)
Metadaten
Titel
Intrusion Detection Using a Hybrid Sequential Model
verfasst von
Abhishek Sinha
Aditya Pandey
P. S. Aishwarya
Copyright-Jahr
2021
Verlag
Springer Singapore
DOI
https://doi.org/10.1007/978-981-15-5243-4_1

    Marktübersichten

    Die im Laufe eines Jahres in der „adhäsion“ veröffentlichten Marktübersichten helfen Anwendern verschiedenster Branchen, sich einen gezielten Überblick über Lieferantenangebote zu verschaffen.