2019
DOI: 10.1109/tifs.2018.2868614
|View full text |Cite
|
Sign up to set email alerts
|

Sequence Covering for Efficient Host-Based Intrusion Detection

Abstract: This paper introduces a new similarity measure, the covering similarity, that we formally define for evaluating the similarity between a symbolic sequence and a set of symbolic sequences. A pair-wise similarity can also be directly derived from the covering similarity to compare two symbolic sequences. An efficient implementation to compute the covering similarity is proposed that uses a suffix-tree data-structure, but other implementations, based on suffix-array for instance, are possible and possibly necessa… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
16
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
4
4
1

Relationship

0
9

Authors

Journals

citations
Cited by 33 publications
(16 citation statements)
references
References 37 publications
0
16
0
Order By: Relevance
“…Ye et al 37 used multivariable control technology to establish a norm for normal activities in an information system and then used the norm to detect anomalies and judge intrusion behaviors. Based on the suffix tree data structure, Marteau 38 and others proposed a method to measure the similarity of host intrusion behavior, which can isolate the attack sequence from the normal sequence within the host's intrusion detection range. Serpen et al 39 introduced a system design scheme for intrusion detection for the Linux operating system.…”
Section: Related Workmentioning
confidence: 99%
“…Ye et al 37 used multivariable control technology to establish a norm for normal activities in an information system and then used the norm to detect anomalies and judge intrusion behaviors. Based on the suffix tree data structure, Marteau 38 and others proposed a method to measure the similarity of host intrusion behavior, which can isolate the attack sequence from the normal sequence within the host's intrusion detection range. Serpen et al 39 introduced a system design scheme for intrusion detection for the Linux operating system.…”
Section: Related Workmentioning
confidence: 99%
“…The authors in Refs. [11,12] selected five types of features, including RAM usage, node network connections and usage of bandwidth etc., to perform anomaly detection. The experimental results verified by their method have good performance in node level anomaly detection.…”
Section: Related Workmentioning
confidence: 99%
“…Host-based intrusion detection systems are an essential component of cybersecurity [16], [17]; however, our work is confined to the area of network-based detection systems, since our model is based only on network packets before they reach the authoritative DNS server.…”
Section: Related Workmentioning
confidence: 99%