{"title":"A Typical Set Method of Intrusion Detection Technology Base on Computer Audit Data","authors":"Du Xuetao, Ji Chunfu, Fu Yubing","doi":"10.1109/CIS.2007.75","DOIUrl":null,"url":null,"abstract":"The signature database of intrusion detection system is usually built by the short sequences of system call. The real-time efficiency and accuracy of intrusion detection is greatly influenced by the scale of signature database and the approach of intrusion data analysis. In this paper, a typical set method is provided to compress the normal signature database. Using the data set of UNM CERT sendmail for testing, the feasibility of typical set method is validated, and a proper rate of typical set for intrusion detection is proposed. Meanwhile, the LSM (Linux Security Modules) framework is presented to hook system calls and other audit data from operation system to build intrusion detection system signature database and identify intrusion activity. A system service process oriented detection idea is also introduced to make the intrusion detection more pertinent and accurate. Abnormal detection experiments results show good performance of our intrusion detection method.","PeriodicalId":127238,"journal":{"name":"2007 International Conference on Computational Intelligence and Security (CIS 2007)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2007-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"11","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2007 International Conference on Computational Intelligence and Security (CIS 2007)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CIS.2007.75","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 11
Abstract
The signature database of intrusion detection system is usually built by the short sequences of system call. The real-time efficiency and accuracy of intrusion detection is greatly influenced by the scale of signature database and the approach of intrusion data analysis. In this paper, a typical set method is provided to compress the normal signature database. Using the data set of UNM CERT sendmail for testing, the feasibility of typical set method is validated, and a proper rate of typical set for intrusion detection is proposed. Meanwhile, the LSM (Linux Security Modules) framework is presented to hook system calls and other audit data from operation system to build intrusion detection system signature database and identify intrusion activity. A system service process oriented detection idea is also introduced to make the intrusion detection more pertinent and accurate. Abnormal detection experiments results show good performance of our intrusion detection method.