[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/1014052.1014084acmconferencesArticle/Chapter ViewAbstractPublication PageskddConference Proceedingsconference-collections
Article

Selection, combination, and evaluation of effective software sensors for detecting abnormal computer usage

Published: 22 August 2004 Publication History

Abstract

We present and empirically analyze a machine-learning approach for detecting intrusions on individual computers. Our Winnow-based algorithm continually monitors user and system behavior, recording such properties as the number of bytes transferred over the last 10 seconds, the programs that currently are running, and the load on the CPU. In all, hundreds of measurements are made and analyzed each second. Using this data, our algorithm creates a model that represents each particular computer's range of normal behavior. Parameters that determine when an alarm should be raised, due to abnormal activity, are set on a per-computer basis, based on an analysis of training data. A major issue in intrusion-detection systems is the need for very low false-alarm rates. Our empirical results suggest that it is possible to obtain high intrusion-detection rates (95%) and low false-alarm rates (less than one per day per computer), without "stealing" too many CPU cycles (less than 1%). We also report which system measurements are the most valuable in terms of detecting intrusions. A surprisingly large number of different measurements prove significantly useful.

References

[1]
R. Agarwal & M. Joshi, PNrule: A New Framework for Learning Classifier Models in Data Mining (A Case-Study in Network Intrusion Detection) Proc. First SIAM Intl. Conf. on Data Mining, 2001.
[2]
J. Anderson, Computer Security Threat Monitoring and Surveillance, J. P. Anderson Company Technical Report, Fort Washington, PA, 1980.
[3]
DARPA, Research and Development Initiatives Focused on Preventing, Detecting, and Responding to Insider Misuse of Critical Defense Information Systems, DARPA Workshop Report, 1999.
[4]
A. Ghosh, A. Schwartzbard, & M. Schatz, Learning Program Behavior Profiles for Intrusion Detection, USENIX Workshop on Intrusion Detection & Network Monitoring, April 1999.
[5]
T. Lane & C. Brodley, Approaches to Online Learning and Concept Drift for User Identification in Computer Security, Proc. KDD, pp 259--263, 1998.
[6]
A. Lazarevic, L. Ertoz, A. Ozgur, J. Srivastava & V. Kumar, A Comparative Study of Anomaly Detection Schemes in Network Intrusion Detection, Proc. SIAM Conf. Data Mining, 2003.
[7]
W. Lee, S.J. Stolfo, and K. Mok, A Data Mining Framework for Building Intrusion Detection Models, Proc. IEEE Symp. on Security and Privacy, 1999.
[8]
N. Littlestone, Learning Quickly When Irrelevant Attributes Abound. Machine Learning 2, pp. 285--318.
[9]
T. Lunt, A Survey of Intrusion Detection Techniques, Computers and Security 12:4, pp. 405--418, 1993.
[10]
T. Mitchell, Machine Learning, McGraw-Hill.
[11]
P. Neumann, The Challenges of Insider Misuse, SRI Computer Science Lab Technical Report, 1999
[12]
J. Shavlik & M. Shavlik, Final Project Report for DARPA's Insider Threat Active Profiling (ITAP) program, April 2002.
[13]
C. Warrender, S. Forrest, & B. Pearlmutter. Detecting Intrusions using System Calls. IEEE Symposium on Security and Privacy, pp. 133--145, 1999.

Cited By

View all
  • (2022)Estimating Accuracy of Mobile-Masquerader Detection Using Worst-Case and Best-Case ScenarioInformation and Communications Security10.1007/11935308_22(302-321)Online publication date: 10-Mar-2022
  • (2021)Intrusion detection techniques in network environment: a systematic reviewWireless Networks10.1007/s11276-020-02529-3Online publication date: 2-Jan-2021
  • (2021)Denial of service detection using dynamic time warpingInternational Journal of Network Management10.1002/nem.215931:6Online publication date: 2-Nov-2021
  • Show More Cited By

Index Terms

  1. Selection, combination, and evaluation of effective software sensors for detecting abnormal computer usage

      Recommendations

      Comments

      Please enable JavaScript to view thecomments powered by Disqus.

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      KDD '04: Proceedings of the tenth ACM SIGKDD international conference on Knowledge discovery and data mining
      August 2004
      874 pages
      ISBN:1581138881
      DOI:10.1145/1014052
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 22 August 2004

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. Windows 2000
      2. Winnow algorithm
      3. anomaly detection
      4. feature selection
      5. intrusion detection
      6. machine learning
      7. user modeling

      Qualifiers

      • Article

      Conference

      KDD04

      Acceptance Rates

      Overall Acceptance Rate 1,133 of 8,635 submissions, 13%

      Upcoming Conference

      KDD '25

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)4
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 01 Jan 2025

      Other Metrics

      Citations

      Cited By

      View all
      • (2022)Estimating Accuracy of Mobile-Masquerader Detection Using Worst-Case and Best-Case ScenarioInformation and Communications Security10.1007/11935308_22(302-321)Online publication date: 10-Mar-2022
      • (2021)Intrusion detection techniques in network environment: a systematic reviewWireless Networks10.1007/s11276-020-02529-3Online publication date: 2-Jan-2021
      • (2021)Denial of service detection using dynamic time warpingInternational Journal of Network Management10.1002/nem.215931:6Online publication date: 2-Nov-2021
      • (2020)Empirical Detection Techniques of Insider Threat IncidentsIEEE Access10.1109/ACCESS.2020.29897398(78385-78402)Online publication date: 2020
      • (2020)A robust anomaly detection method using a constant false alarm rate approachMultimedia Tools and Applications10.1007/s11042-020-08653-8Online publication date: 22-Jan-2020
      • (2019)A Survey of Intrusion Detection Systems Leveraging Host DataACM Computing Surveys10.1145/334438252:6(1-35)Online publication date: 14-Nov-2019
      • (2018)Reasonably programmable literal notationProceedings of the ACM on Programming Languages10.1145/32368012:ICFP(1-32)Online publication date: 30-Jul-2018
      • (2018)Generic zero-cost reuse for dependent typesProceedings of the ACM on Programming Languages10.1145/32367992:ICFP(1-30)Online publication date: 30-Jul-2018
      • (2018)Graduality from embedding-projection pairsProceedings of the ACM on Programming Languages10.1145/32367682:ICFP(1-30)Online publication date: 30-Jul-2018
      • (2018)Detecting and Preventing Cyber Insider Threats: A SurveyIEEE Communications Surveys & Tutorials10.1109/COMST.2018.280074020:2(1397-1417)Online publication date: Oct-2019
      • Show More Cited By

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media