Skip to main content

Intrusion Detection by Combining Multiple Hidden Markov Models

  • Conference paper
PRICAI 2000 Topics in Artificial Intelligence (PRICAI 2000)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 1886))

Included in the following conference series:

Abstract

Intrusion detection techniques can be divided into two groups according to the type of information they use: misuse detection and anomaly detection. Anomaly detection models normal behaviors and attempts to detect intrusions by noting significant deviations from normal behavior. By constructing models using multiple measures and combining them, we can expect an enhanced reliability in intrusion detection. In this paper, we propose a technique that combine multiple models using voting technique to improve the detection rate of intrusion detection system.

The intrusion detection system is based on anomaly detection technique using hidden Markov model (HMM). Each HMM models and evaluates one aspect of events, which are collected by Sun Microsystem’s Basic Security Module (BSM) auditing facility. Usually each event, such as a BSM event, consists of several measures. When one event is evaluated through each model, a vector of evaluation values is generated. A system call, one of the measures from BSM, can be either perfectly normal or very dangerous according to the situation. For example, a write() system call to an ordinary user file is normal, whereas it is suspiciously dangerous if done to a system file by an unprivileged user. Thus, a framework that can effectively combine various measures is needed.

In HMM, the probability with which a given sequence is generated from a model can be calculated using forward-backward procedure and an optimal model can also be built from a collection of sequences using Baum-Welch reestimation formulas. If normal behavior is modeled into an HMM, we can determine whether current behavior is normal or not by comparing the evaluation value of current behavior sequence against the model’s threshold for normal behavior. Each HMM determines whether current sequence is abnormal from the measure’s point of view it is responsible for and participates in final anomaly decision with a weight Wm according to its confidence. Voting is to determine whether or not the total result R = Σ Wm* Vm, where Vm representing a model’s voting value, is greater than or equal to the threshold T.

In the experiment, a model based on system call measure and one on measure reduced by Self Organizing Map (SOM) are combined with voting. Each model is given the same voting weight. With unanimity voting, the overall false-positive error rate, a pivotal anomaly detection technique evaluation criterion, has been enhanced to 1.18% in contrast to those of previous models’ 5.33% and 23.53%, respectively.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2000 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Choy, J., Cho, SB. (2000). Intrusion Detection by Combining Multiple Hidden Markov Models. In: Mizoguchi, R., Slaney, J. (eds) PRICAI 2000 Topics in Artificial Intelligence. PRICAI 2000. Lecture Notes in Computer Science(), vol 1886. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-44533-1_118

Download citation

  • DOI: https://doi.org/10.1007/3-540-44533-1_118

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-67925-7

  • Online ISBN: 978-3-540-44533-3

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics