Self-similarity based lightweight intrusion detection method
- Authors
- Kwon, Hyukmin; Kim, Eunjin; Yu, Song Jin; Kim, Huy Kang
- Issue Date
- 11월-2011
- Publisher
- INT INFORMATION INST
- Keywords
- information security; self-similarity; lightweight; intrusion detection; anomaly detection
- Citation
- INFORMATION-AN INTERNATIONAL INTERDISCIPLINARY JOURNAL, v.14, no.11, pp.3683 - 3690
- Indexed
- SCIE
SCOPUS
- Journal Title
- INFORMATION-AN INTERNATIONAL INTERDISCIPLINARY JOURNAL
- Volume
- 14
- Number
- 11
- Start Page
- 3683
- End Page
- 3690
- URI
- https://scholar.korea.ac.kr/handle/2021.sw.korea/111193
- ISSN
- 1343-4500
- Abstract
- There are many security concerns such as data leakage, unauthorized access from outside the system and abnormal activities from inside the system. To detect these system's abnormal activities or misuse by malicious attackers, intrusion detection system (IDS) is usually adopted. Even though detection algorithms and their performance are improved, IDS still consume system resources not ignorable. For providing high performance computing environment, lightweight anomaly detection method is needed today. In this paper, we propose self-similarity measures for lightweight IDS. For normal systems, a regular and periodic self-similarity can be observed in a system's internal activities such as system calls and process status. On the other hand, outliers occur when an anomalous attack happens, and then the system's self-similarity cannot be maintained. Therefore monitoring the changes of a system's self-similarity can be used to detect the system's anomalies. From this viewpoint, we developed a new measure based on cosine similarity and found the optimal time interval for estimating the self-similarity of a given system. As a result, we can detect abnormal activities using only a few resources.
- Files in This Item
- There are no files associated with this item.
- Appears in
Collections - School of Cyber Security > Department of Information Security > 1. Journal Articles
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.