Ajou University repository

Comparison of anomaly detection accuracy of host-based intrusion detection systems based on different machine learning algorithmsoa mark
Citations

SCOPUS

18

Citation Export

Publication Year
2020-01-01
Publisher
Science and Information Organization
Citation
International Journal of Advanced Computer Science and Applications, pp.252-259
Keyword
Anomaly detectionCyber securityHost based intrusion detection systemMachine learningSimulationSystem calls
Mesh Keyword
Anomaly based intrusion detection systemsAnomaly detectionCyber securityDetection accuracyDetection ratesHost-based intrusion detection systemIntrusion detection modelsMachine learning algorithmsSimulationSystem calls
All Science Classification Codes (ASJC)
Computer Science (all)
Abstract
Among the different host-based intrusion detection systems, an anomaly-based intrusion detection system detects attacks based on deviations from normal behavior; however, such a system has a low detection rate. Therefore, several studies have been conducted to increase the accurate detection rate of anomaly-based intrusion detection systems; recently, some of these studies involved the development of intrusion detection models using machine learning algorithms to overcome the limitations of existing anomaly-based intrusion detection methodologies as well as signature-based intrusion detection methodologies. In a similar vein, in this study, we propose a method for improving the intrusion detection accuracy of anomaly-based intrusion detection systems by applying various machine learning algorithms for classification of normal and attack data. To verify the effectiveness of the proposed intrusion detection models, we use the ADFA Linux Dataset which consists of system call traces for attacks on the latest operating systems. Further, for verification, we develop models and perform simulations for host-based intrusion detection systems based on machine learning algorithms to detect and classify anomalies using the Arena simulation tool.
Language
eng
URI
https://dspace.ajou.ac.kr/dev/handle/2018.oak/31198
DOI
https://doi.org/10.14569/ijacsa.2020.0110233
Fulltext

Type
Article
Funding
This work was supported by the National Research Foundation of Korea (NRF) grant funded by the Korea government (MSIT: Ministry of Science and ICT) (No. NRF-2019R1F1A1059036).
Show full item record

Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

KIM, Kang Seok Image
KIM, Kang Seok김강석
Department of Cyber Security
Read More

Total Views & Downloads

File Download

  • There are no files associated with this item.