yihua liao v rao vemuri
play

Yihua Liao, V. Rao Vemuri Mingxing Gong CISC850 Cyber Analytics - PowerPoint PPT Presentation

Use of K-Nearest Neighbor classifier for intrusion detection Yihua Liao, V. Rao Vemuri Mingxing Gong CISC850 Cyber Analytics Outline Introduction Methodology Experiments Discussion & Conclusion Outline Introduction


  1. Use of K-Nearest Neighbor classifier for intrusion detection Yihua Liao, V. Rao Vemuri Mingxing Gong CISC850 Cyber Analytics

  2. Outline • Introduction • Methodology • Experiments • Discussion & Conclusion

  3. Outline • Introduction • Methodology • Experiments • Discussion & Conclusion

  4. Introduction ▪ High false alarm probability or low attack detection accuracy ▪ Two general approaches: • Misuse detection • Anomaly detection ▪ Local ordering vs. frequency of system calls

  5. Nearest Neighbour Rule Consider a two class problem where each sample consists of two measurements ( x,y ). k = 1 Compute the k nearest neighbours and assign the class by majority vote. k = 3 Reference: www.robots.ox.ac.uk/~dclaus/cameraloc/samples/nearestneighbour.ppt

  6. Outline • Introduction • Methodology • Experiments • Discussion & Conclusion

  7. Methodology • Apply text categorization methods to intrusion detection

  8. Methodology • Each document is represented by a vector of words • Weighting approach tf·idf (term frequency – inverse document frequency) • The cosine similarity is defined as follows:

  9. Outline • Introduction • Methodology • Experiments • Discussion & Conclusion

  10. Experiments • DARPA data • Cross validation and 50 distinct system calls

  11. KNN classifier algorithm for anomaly detection

  12. KNN classifier performance

  13. Anomaly Detection • The overall running time of the kNN method is O(N) • Integrate with signature verification

  14. Frequency Weighting vs. tf·idf Weighting

  15. Frequency Weighting vs. tf·idf Weighting

  16. Outline • Introduction • Methodology • Experiments • Discussion & Conclusion

  17. Discussion • kNN Classifier advantages • Compared tf·idf weighting with the frequency weighting • Classification cost can be further reduced by only using most influential system calls

  18. Conclusion • kNN Classifier is able to effectively detect intrusive program behavior with low false positive rate • Further research is in process to investigate the reliability and scaling properties of the kNN classifier method

  19. Reference [1] www.robots.ox.ac.uk/~dclaus/cameraloc/samples/nearestneighbour.ppt [2] Yihua Liao, V. Rao Vemuri , ‘Use of K -Nearest Neighbor classifier for intrusion detection’, Computers & Security, Volume 21, Issue 5 , 1 October 2002, Pages 439-448

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend