Effective Intrusion Type Identification with Edit Distance for HMM-Based Anomaly Detection System

  • Ja-Min Koo
  • Sung-Bae Cho
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3776)

Abstract

As computer security becomes important, various system security mechanisms have been developed. Especially anomaly detection using hidden Markov model has been actively exploited. However, it can only detect abnormal behaviors under predefined threshold, and it cannot identify the type of intrusions. This paper aims to identify the type of intrusions by analyzing the state sequences using Viterbi algorithm and calculating the distance between the standard state sequence of each intrusion type and the current state sequence. Because the state sequences are not always extracted consistently due to environmental factors, edit distance is utilized to measure the distance effectively. Experimental results with buffer overflow attacks show that it identifies the type of intrusions well with inconsistent state sequences.

References

  1. 1.
    Denning, D.: An intrusion-detection model. IEEE Trans. on Software Engineering 13(2), 212–232 (1987)Google Scholar
  2. 2.
    Balajinath, B., Raghavan, S.V.: Intrusion detection through learning behavior model. Computer Communications 24, 1202–1212 (2001)CrossRefGoogle Scholar
  3. 3.
    Vaccaro, H.S., Liepins, G.E.: Detection of anomalous computer session activity. In: Proc. of IEEE Symp. on Research Security and Privacy, pp. 280–289 (1989)Google Scholar
  4. 4.
    Koo, J.-M., Cho, S.-B.: Viterbi algorithm for intrusion type identification in anomaly detection system. In: Chae, K.-J., Yung, M. (eds.) WISA 2003. LNCS, vol. 2908, pp. 97–110. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  5. 5.
    Warrender, C., Forrest, S., Pearlmutter, B.: Detecting intrusion using calls: Alternative data models. In: Proc. of IEEE Symp. on Security and Privacy, May 1999, pp. 133–145 (1999)Google Scholar
  6. 6.
    Cho, S.-B., Park, H.-J.: Efficient anomaly detection by modeling privilege flows using hidden Markov model. Computers & Security 22(1), 45–55 (2003)CrossRefMathSciNetGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2005

Authors and Affiliations

  • Ja-Min Koo
    • 1
  • Sung-Bae Cho
    • 1
  1. 1.Dept. of Computer ScienceYonsei UniversitySeoulKorea

Personalised recommendations