Evaluating host-based intrusion detection on the adfa-wd and adfa-wd: Saa datasets

With the growth of the internet and the development of new technologies also originates advancements in methods of cyber-Attacks such as zero-day and stealth attacks, a more effective method of network safety is essential for network stability for both personal use and businesses. This research paper will assess anomalous patterns of Normal Pattern and Abnormal Pattern comprised of system calls based on the Dynamic-Link Library. The two datasets assessed are designed on the Windows Operating System on a Host-based Intrusion Detection System; comprised of the Australian Defence force Windows Dataset (ADFA-WD) and Australian Defence Force Academy Windows Dataset: Stealth Attacks Addendum (ADFA-WD:SAA). The development of a binary feature space is developed based on the common vulnerabilities and exposures at the time of the creation of the dataset. The data mining techniques implemented are Support Vector Machine classifier with sigmoid and RBF kernels is compared to the Random Forest classifier. © 2017 CEUR-WS. All rights reserved.

Authors
Conference proceedings
Publisher
CEUR-WS
Language
English
Pages
409-415
Status
Published
Volume
2064
Year
2017
Organizations
  • 1 Peoples Friendship University of Russia, Moscow, Russian Federation
Keywords
Host-based Intrusion Detection; Machine learning; Random forest; RBF; Sigmoid kernel.; SVM
Date of creation
19.07.2019
Date of change
19.07.2019
Short link
https://repository.rudn.ru/en/records/article/record/39116/
Share

Other records