A Meta Decision Tree combined with Blast Approach for Intrusion Detection
碩士 === 國立交通大學 === 資訊科學與工程研究所 === 104 === Along with the constantly updated Internet intrusions, the network security keeps getting severely challenged. In the current defense mechanism, Intrusion Detection System (IDS) is capable of detecting activities that attempt to compromise the confidentiality...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | zh-TW |
Published: |
2016
|
Online Access: | http://ndltd.ncl.edu.tw/handle/a6377x |
id |
ndltd-TW-104NCTU5394071 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-104NCTU53940712019-05-15T23:08:41Z http://ndltd.ncl.edu.tw/handle/a6377x A Meta Decision Tree combined with Blast Approach for Intrusion Detection 利用Meta決策樹結合Blast的方法預測入侵 Jao, Jui-En 饒瑞恩 碩士 國立交通大學 資訊科學與工程研究所 104 Along with the constantly updated Internet intrusions, the network security keeps getting severely challenged. In the current defense mechanism, Intrusion Detection System (IDS) is capable of detecting activities that attempt to compromise the confidentiality, integrity or availability of a system or network. Traditionally, IDS can be classified as signature detection system and anomaly detection system. Signature IDS is able to identify known malicious activities in network traffic or applications, while Anomaly IDS compares an activity against a defined "normal" baseline. One of the most investigated fields is system call analysis. An infected/intruding user program will keep trying to do some activities (e.g. Accessing file system or boot sector) which a "normal" user program seldom does. Therefore, we can inspect if the user program is an intrusion by analyzing system call sequence which allows us to check all the history activities that the program did. In this paper, we combine BLAST biological sequence alignment and Meta Decision Tree (MDT) on host based UNM dataset which is system call sequence data and we also use MDT alone on network based NSL-KDD dataset which is network packet feature based data. The result shows our method performs better than previous ones in most cases. Hu, Yuh-Jyh 胡毓志 2016 學位論文 ; thesis 50 zh-TW |
collection |
NDLTD |
language |
zh-TW |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 國立交通大學 === 資訊科學與工程研究所 === 104 === Along with the constantly updated Internet intrusions, the network security keeps getting severely challenged. In the current defense mechanism, Intrusion Detection System (IDS) is capable of detecting activities that attempt to compromise the confidentiality, integrity or availability of a system or network. Traditionally, IDS can be classified as signature detection system and anomaly detection system. Signature IDS is able to identify known malicious activities in network traffic or applications, while Anomaly IDS compares an activity against a defined "normal" baseline. One of the most investigated fields is system call analysis. An infected/intruding user program will keep trying to do some activities (e.g. Accessing file system or boot sector) which a "normal" user program seldom does. Therefore, we can inspect if the user program is an intrusion by analyzing system call sequence which allows us to check all the history activities that the program did. In this paper, we combine BLAST biological sequence alignment and Meta Decision Tree (MDT) on host based UNM dataset which is system call sequence data and we also use MDT alone on network based NSL-KDD dataset which is network packet feature based data. The result shows our method performs better than previous ones in most cases.
|
author2 |
Hu, Yuh-Jyh |
author_facet |
Hu, Yuh-Jyh Jao, Jui-En 饒瑞恩 |
author |
Jao, Jui-En 饒瑞恩 |
spellingShingle |
Jao, Jui-En 饒瑞恩 A Meta Decision Tree combined with Blast Approach for Intrusion Detection |
author_sort |
Jao, Jui-En |
title |
A Meta Decision Tree combined with Blast Approach for Intrusion Detection |
title_short |
A Meta Decision Tree combined with Blast Approach for Intrusion Detection |
title_full |
A Meta Decision Tree combined with Blast Approach for Intrusion Detection |
title_fullStr |
A Meta Decision Tree combined with Blast Approach for Intrusion Detection |
title_full_unstemmed |
A Meta Decision Tree combined with Blast Approach for Intrusion Detection |
title_sort |
meta decision tree combined with blast approach for intrusion detection |
publishDate |
2016 |
url |
http://ndltd.ncl.edu.tw/handle/a6377x |
work_keys_str_mv |
AT jaojuien ametadecisiontreecombinedwithblastapproachforintrusiondetection AT ráoruìēn ametadecisiontreecombinedwithblastapproachforintrusiondetection AT jaojuien lìyòngmetajuécèshùjiéhéblastdefāngfǎyùcèrùqīn AT ráoruìēn lìyòngmetajuécèshùjiéhéblastdefāngfǎyùcèrùqīn AT jaojuien metadecisiontreecombinedwithblastapproachforintrusiondetection AT ráoruìēn metadecisiontreecombinedwithblastapproachforintrusiondetection |
_version_ |
1719140524305154048 |