{"title":"Anomaly intrusion detection for system call using the soundex algorithm and neural networks","authors":"Byung-Rae Cha, B. Vaidya, Seung-Jo Han","doi":"10.1109/ISCC.2005.33","DOIUrl":null,"url":null,"abstract":"To improve the anomaly intrusion detection system using system calls, this study focuses on supervisor learning neural networks using the soundex algorithm which is designed to change feature selection and variable length data into a fixed length learning pattern. That is, by changing variable length sequential system call data into a fixed length behavior pattern using the soundex algorithm, this study conducted neural learning by using a backpropagation algorithm. The proposed method and N-gram technique are applied for anomaly intrusion detection of system call using sendmail data of UNM to demonstrate its performance.","PeriodicalId":315855,"journal":{"name":"10th IEEE Symposium on Computers and Communications (ISCC'05)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2005-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"14","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"10th IEEE Symposium on Computers and Communications (ISCC'05)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISCC.2005.33","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 14
Abstract
To improve the anomaly intrusion detection system using system calls, this study focuses on supervisor learning neural networks using the soundex algorithm which is designed to change feature selection and variable length data into a fixed length learning pattern. That is, by changing variable length sequential system call data into a fixed length behavior pattern using the soundex algorithm, this study conducted neural learning by using a backpropagation algorithm. The proposed method and N-gram technique are applied for anomaly intrusion detection of system call using sendmail data of UNM to demonstrate its performance.