๐”– Bobbio Scriptorium
โœฆ   LIBER   โœฆ

Intrusion detection through learning behavior model

โœ Scribed by B Balajinath; S.V Raghavan


Book ID
104273729
Publisher
Elsevier Science
Year
2001
Tongue
English
Weight
252 KB
Volume
24
Category
Article
ISSN
0140-3664

No coin nor oath required. For personal study only.

โœฆ Synopsis


Intrusion detection is the process of identifying user actions that might potentially lead a system from a secured state to a compromised state. Normally, it is observed that the users exhibit regularities in their usage of commands of a system, as they tend to achieve the same (or perhaps similar) objective. The command sequences can therefore be used to characterize the user behavior (ACM SIGMETRICS, Performance Evaluation Review, Texas, USA, 13(2) (1985) 40). Deviations from the characteristic behavior pattern of a user can be used to detect potential intrusions. But, it requires that the user behavior is modeled either on an individual or on a group basis, in such a way that the model captures the essence of the user behavior. In this work reported here, we propose an algorithm for intrusion detection, called Genetic algorithm Based Intrusion Detector (GBID) based on ยชlearning the individual user behaviorยบ. The user behavior is learnt by using genetic algorithms. Current user behavior can be predicted by genetic algorithms based on the past observed user behavior. The user behavior has been described using a 3-tuple kMatch index, Entropy index, Newness indexl. Value of the 3-tuple is calculated for ยฎxed block size of commands in a user session, called command sample. The 3-tuple value of a command sample in user session are compared with expected non-intrusive behavior 3-tuple value to ยฎnd intrusions.


๐Ÿ“œ SIMILAR VOLUMES


Novel model for intrusion detection
โœ Li Jia-chun; Li Zhi-tang ๐Ÿ“‚ Article ๐Ÿ“… 2003 ๐Ÿ› Wuhan University ๐ŸŒ English โš– 430 KB
Behavior-Based Intrusion Detection in Mo
โœ Azzedine Boukerche; Mirela Sechi M. Annoni Notare ๐Ÿ“‚ Article ๐Ÿ“… 2002 ๐Ÿ› Elsevier Science ๐ŸŒ English โš– 397 KB

The field of mobile and wireless networking is reemerging amid unprecedented growth in the scale and diversity of computer networking. However, further increases in network security are necessary before the promise of mobile communication can be fulfilled. In this paper, we describe how neural netwo