Browse > Article
http://dx.doi.org/10.13089/JKIISC.2005.15.2.13

Host Anomaly Detection of Neural Networks and Neural-fuzzy Techniques with Soundex Algorithm  

Cha, Byung-Rae (Honam University)
Kim, Hyung-Jong (Honam University)
Park, Bong-Gu (Honam University)
Cho, Hyug-Hyun (Yosu University)
Abstract
To improve the anomaly IDS using system calls, this study focuses on Neural Networks Learning using the Soundex algorithm which is designed to change feature selection and variable length data into a fixed length learning pattern. That is, by changing variable length sequential system call data into a fixed length behavior pattern using the Soundex algorithm, this study conducted neural networks learning by using a backpropagation algorithm with fuzzy membership function. The back-propagation neural networks and Neuro-Fuzzy technique are applied for anomaly intrusion detection of system calls using Sendmail Data of UNM to demonstrate its aspect of he complexity of time, space and MDL performance.
Keywords
Host anomaly detection; Neural Networks; Neuro-Fuzzy; and Soundex algorithm;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Marco Pagni, 'Introduction to Patterns, Profiles and Hidden Markov Models', Swiss Institute of Bioinformatics(SIB), August 30, 2002
2 Christopher M. Bishop, 'Neural Networks for Pattern Recognition', Oxford Press, pp.429-433, 1995
3 Wenke Lee, Salvatore J. Stolfo, Philip K. Chan, Eleazar Eskin, Wei Fan, Matthew Miller, Shlomo Hershkop, and Junxin Zhang, 'Real Time Data Mining -based Intrusion Detection', Proceedings of DISCEX II. June 2001
4 http://www.archives.gov/research_room/genealogy/census/soundex.html
5 http://cs.unm.edu/~immsec/data/syn-thsm.html
6 Jack Marin, Daniel Ragsdale, and John Shurdu, 'A Hybrid Approach to the Profile Creation and Intrusion Detection', Proceedings of DARPA Information Survivability Conference and Exposition, IEEE, pp.69-76, 2001
7 Nong Ye, and Xiangyang Li, 'A Scalable Clustering Technique for Intrusion Signature Recognition', Proceedings of 2001 IEEE Workshop on Information Assurance and Security, pp. 1-4, 2001
8 김미혜, '퍼지적분을 이용한 침입탐지시스템 평가방법', 정보보호학회논문지, 제14권 제2호, 2004년 2월
9 L. Portnoy, E. Eskin, S. Stolfo, 'Intrusion detection with unlabeled data using clustering', In ACM Workshop on Data Mining Applied to Security, 2001
10 James A. Freeman and David M. Skapura, 'Neural Networks : Algorithms, Applications, and Programming Techniques', p89-123, Addison Wesley, 1992
11 황현욱, 김민수, 노봉남, '감사로그 상관관계를 통한 호스트기반의 침입탐지시스템', 정보보호학회논문지, 제13권 제3호, 2003년 6월
12 유은진, 전문석, '비정상적인 컴퓨터 행위 방지를 위한 실시간 침입 탐지 병렬 시스템에 관한 연구', 통신정보보호학회지 제5권 제2호, 1995년 6월
13 Christina Warrender, Stephanie Forrest, Barak Pearlmutter, 'Detecting Intrusion Using System Calls : Alternative Data Models', In 1999 IEEE Symposium on Security and Privacy, IEEE Computer Society, pp. 133-145, 1999