Paper
15 April 2004 A new search algorithm based on probability in intrusion detection
Jianhua Sun, Hai Jin, Zongfen Han, Hao Chen, Yanping Yang
Author Affiliations +
Proceedings Volume 5282, Network Architectures, Management, and Applications; (2004) https://doi.org/10.1117/12.520538
Event: Asia-Pacific Optical and Wireless Communications, 2003, Wuhan, China
Abstract
Detection rate is vital to intrusion detection. We propose a new search algorithm base on probability to speed up the process rate for a novel compound intrusion detection system (CIDS). We employ an improved Bayesian decision theorem to build this compound model. The improved Bayesian decision theorem brings four profits to this model. The first is to eliminate the flaws of a narrow definition for normal patterns and intrusion patterns. The second is to extend the known intrusions patterns to novel intrusions patterns. The third is to reduce risks that detecting intrusion brings to system. The last is to offer a method to build a compound intrusion detection model that integrates misuse intrusion detection system (MIDS) and anomaly intrusion detection system (AIDS). During the experiment of this model, we find that different system calls sequences have different probabilities. So the sequences with high probabilities are compared prior to an observed sequence, which is the foundation of our new search algorithm. We evaluate the performance of the new algorithm using numerical results, and the results show this new algorithm increases the detection rate.
© (2004) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Jianhua Sun, Hai Jin, Zongfen Han, Hao Chen, and Yanping Yang "A new search algorithm based on probability in intrusion detection", Proc. SPIE 5282, Network Architectures, Management, and Applications, (15 April 2004); https://doi.org/10.1117/12.520538
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Databases

Computer intrusion detection

Detection and tracking algorithms

Binary data

Fuzzy logic

Data modeling

Evolutionary algorithms

Back to Top