Advertisement

Using Behavior Knowledge Space and Temporal Information for Detecting Intrusions in Computer Networks

  • L. P. Cordella
  • I. Finizio
  • C. Mazzariello
  • C. Sansone
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3687)

Abstract

Pattern Recognition (PR) techniques have proven their ability for detecting malicious activities within network traffic. Systems based on multiple classifiers can further enforce detection capabilities by combining and correlating the results obtained by different sources.

An aspect often disregarded in PR approaches dealing with the intrusion detection problem is the use of temporal information. Indeed, an attack is typically carried out along a set of consecutive network packets; therefore, a PR system could improve its reliability by examining sequences of network connections before expressing a decision.

In this paper we present a system that uses a multiple classifier approach together with temporal information about the network packets to be classified. In order to improve classification reliability, we introduce the concept of rejection: instead of emitting an unreliable verdict, an ambiguously classified packet can be logged for further analysis.

The proposed system has been tested on a wide database made up of real network traffic traces.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Vigna, G., Kemmerer, R.: Netstat: a network based intrusion detection system. Journal of Computer Security 7(1) (1999)Google Scholar
  2. 2.
    Axelsson, S.: Research in Intrusion Detection Systems: A Survey, TR 98-17, Chalmers University of Technology (1999)Google Scholar
  3. 3.
    Kumar, R., Spafford, E.H.: A Software Architecture to Support Misuse Intrusion Detection. In: Proceedings of the 18th National Information Security Conference, pp. 194–204 (1995)Google Scholar
  4. 4.
    Ghosh, A.K., Schwartzbard, A.: A Study in Using Neural Networks for Anomaly and Misuse Detection. In: Proc. 8’th USENIX Security Symposium, Washington DC, August 26-29 (1999)Google Scholar
  5. 5.
    Lane, T., Brodley, C.E.: Temporal Sequence learning and data reduction for anomaly detection. ACM Trans. on Inform. and System Security 2(3), 295–261 (1999)Google Scholar
  6. 6.
    Lee, W., Stolfo, S.J.: A framework for constructing features and models for intrusion detection systems. ACM Transactions on Inform. System Security 3(4), 227–261 (2000)CrossRefGoogle Scholar
  7. 7.
    Esposito, M., Mazzariello, C., Oliviero, F., Romano, S.P., Sansone, C.: Real Time Detection of Novel Attacks by Means of Data Mining Techniques. In: Proceedings of the 7th International Conference on Enterprise Information Systems, Miami (USA), May 24-28, pp. 120–127 (2005)Google Scholar
  8. 8.
    Lee, S.C., Heinbuch, D.V.: Training a neural Network based intrusion detector to recognize novel attack. IEEE Trans. Syst, Man and Cybernetic, Part-A 31, 294–299 (2001)CrossRefGoogle Scholar
  9. 9.
    Fugate, M., Gattiker, J.R.: Computer Intrusion Detection with Classification and Anomaly Detection, using SVMs. International Journal of Pattern Recognition and Artificial Intelligence 17(3), 441–458 (2003)CrossRefGoogle Scholar
  10. 10.
    Giacinto, G., Roli, F., Didaci, L.: Fusion of multiple classifiers for intrusion detection in computer networks. Pattern Recognition Letters 24, 1795–1803 (2003)CrossRefGoogle Scholar
  11. 11.
    Giacinto, G., Roli, F., Didaci, L.: A Modular Multiple Classifier System for the Detection of Intrusions. In: Windeatt, T., Roli, F. (eds.) MCS 2003. LNCS, vol. 2709, pp. 346–355. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  12. 12.
    Cordella, L.P., Limongiello, A., Sansone, C.: Network Intrusion Detection by a Multi Stage Classification System. In: Roli, F., Kittler, J., Windeatt, T. (eds.) MCS 2004. LNCS, vol. 3077, pp. 324–333. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  13. 13.
    Singh, S., Markou, M.: Novelty detection: a review - part 2: neural network based approaches. Signal Processing 83(12), 2499–2521 (2003)zbMATHCrossRefGoogle Scholar
  14. 14.
    Ryan, J., Lin, M.J., Miikkulainen, R.: Intrusion detection with neural networks. In: Jordan, M., et al. (eds.) Advances in Neural Information Processing Systems 10, pp. 943–949. MIT Press, Cambridge (1998)Google Scholar
  15. 15.
    Labib, K., Vemuri, R.: NSOM: A real-time network-based intrusion detection system using self-organizing maps. Technical report, Dept. of Applied Science, University of California, Davis (2002)Google Scholar
  16. 16.
    Axelsson, S.: The Base-Rate Fallacy and the Difficulty of Intrusion Detection. ACM Trans. on Information and System Security 3(3), 186–205 (2000)CrossRefMathSciNetGoogle Scholar
  17. 17.
    Cohen, W.W., Singer, Y.: Simple, Fast, and Effective Rule Learner. In: Proc. of the Sixteenth National Conference on Artificial Intelligence and Eleventh Conference on Innovative Applications of Artificial Intelligence, Orlando, Florida, USA, July 18-22, pp. 335–342 (1999)Google Scholar
  18. 18.
    Huang, Y.S., Suen, C.Y.: A Method of Combining Multiple Experts for the Recognition of Unconstrained Handwritten Numerals. IEEE Transactions on Pattern Analysis and Machine Intelligence 17(1), 90–94 (1995)CrossRefGoogle Scholar
  19. 19.
    Cordella, L.P., Sansone, C., Tortorella, F., Vento, M., De Stefano, C.: Neural Network Classification Reliability: Problems and Applications. In: Image Processing and Pattern Recognition. Neural Network Systems Techniques and Applications, vol. 5, pp. 161–200. Academic Press, San Diego (1998)Google Scholar
  20. 20.
    Liu, Y., Chen, K., Liao, X., Zhang, W.: A genetic clustering method for intrusion detection. Pattern Recognition 37 (2004)Google Scholar
  21. 21.
    McHugh, J.: Testing Intrusion Detection Systems: A Critique of the 1998 and 1999 DARPA Intrusion Detection System Evaluations as Performed by Lincoln Laboratory. ACM Transactions on Information and System Security 3(4), 262–294 (2000)CrossRefGoogle Scholar
  22. 22.
    Paxson, V., Floyd, S.: Difficulties in simulating the internet. IEEE/ACM Transactions on Networking 9(4), 392–403 (2001)CrossRefGoogle Scholar
  23. 23.
    Mahoney, M.: A Machine Learning Approach to Detecting Attacks by Identifying Anomalies in Network Traffic, PhD thesis, Florida Institute of Technology (2003)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2005

Authors and Affiliations

  • L. P. Cordella
    • 1
  • I. Finizio
    • 1
  • C. Mazzariello
    • 1
  • C. Sansone
    • 1
  1. 1.Dipartimento di Informatica e SistemisticaUniversità di Napoli “Federico II”NapoliItaly

Personalised recommendations