Advertisement

Dynamic Combination of Multiple Host-Based Anomaly Detectors with Broader Detection Coverage and Fewer False Alerts

  • Zonghua Zhang
  • Hong Shen
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3421)

Abstract

To achieve broader detection coverage with fewer false alarms, a POMDP-based anomaly detection model combining several sate-of-the-art host-based anomaly detectors is proposed in this paper. An optimal combinatorial manner is expected to be discovered through a policy-gradient reinforcement learning algorithm, based on the independent actions of those detectors, and the behavior of the proposed model can be adjusted through a global reward signal to adapt to various system situations. A primarily experiment with some comparative studies are carried out to validate its performance.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Aberdeen, D.: A Survey of Approimate Methods for Solving Partially Observable Markov Decision Processes, National ICT Australia Report, AustraliaGoogle Scholar
  2. 2.
    Bartlett, P.L., Baxter, J.: Stochastic Optimization of Controlled Partially Observable Markov Decision Processes. In: Proceedings of the 39th IEEE Conference on Decision and Control (CDC 2000) (2000)Google Scholar
  3. 3.
    Forrest, S., Hofmeyr, S.A., Longstaff, T.A.: A sense of self for UNIX processes. In: Proceedings of 1996 IEEE Symposium on Security and Privacy, Los Alamitos, CA (1996)Google Scholar
  4. 4.
    Liao, Y., Vemuri, V.R.: Use of K-Nearest Neighbor classifier for intrusion detection. Computers and Security 21(5), 439–448 (2002)CrossRefGoogle Scholar
  5. 5.
    Tao, N., Baxter, J., Weaver, L.: A Multi-Agent, Policy-Gradient approach to Network Routing. In: 18th International Conference on Machine Learning, ICML 2000 (2000)Google Scholar
  6. 6.
    Ye, N., Li, X., Chen, Q., Emran, S.M., Xu, M.: Probabilistic Techniques for Intrusion Detection Based on Computer Audit Data. In: IEEE Transaction on Systems, Man, and Cybernetics-Part A:Systems and Humans, vol. 31(4) (July 2001)Google Scholar
  7. 7.
    Yeung, D.-Y., Ding, Y.: Host-based intrusion detection using dynamic and static behavioral models. Pattern Recognition 36, 229–243 (2003)zbMATHCrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2005

Authors and Affiliations

  • Zonghua Zhang
    • 1
  • Hong Shen
    • 1
  1. 1.School of Information ScienceJapan Advanced Institute of Science and TechnologyIshikwaJapan

Personalised recommendations