Increasing detection rate of user-to-root attacks using genetic algorithms

Full text not archived in this repository.

Please see our End User Agreement.

It is advisable to refer to the publisher's version if you intend to cite from this work. See Guidance on citing.

Add to AnyAdd to TwitterAdd to FacebookAdd to LinkedinAdd to PinterestAdd to Email

Bankovic, Z., Bojanic, S. , Nieto-Taladriz, O. and Badii, A. (2007) Increasing detection rate of user-to-root attacks using genetic algorithms. In: The International Conference on Emerging Security Information, Systems, and Technologies (SecureWare 2007), Valencia, Spain. doi: 10.1109/SECUREWARE.2007.4385309

Abstract/Summary

An extensive set of machine learning and pattern classification techniques trained and tested on KDD dataset failed in detecting most of the user-to-root attacks. This paper aims to provide an approach for mitigating negative aspects of the mentioned dataset, which led to low detection rates. Genetic algorithm is employed to implement rules for detecting various types of attacks. Rules are formed of the features of the dataset identified as the most important ones for each attack type. In this way we introduce high level of generality and thus achieve high detection rates, but also gain high reduction of the system training time. Thenceforth we re-check the decision of the user-to- root rules with the rules that detect other types of attacks. In this way we decrease the false-positive rate. The model was verified on KDD 99, demonstrating higher detection rates than those reported by the state- of-the-art while maintaining low false-positive rate.

Altmetric Badge

Item Type Conference or Workshop Item (Paper)
URI https://reading-clone.eprints-hosting.org/id/eprint/14586
Identification Number/DOI 10.1109/SECUREWARE.2007.4385309
Divisions Science > School of Mathematical, Physical and Computational Sciences > Department of Computer Science
Uncontrolled Keywords genetic algorithms, pattern classification, security of data , KDD 99, KDD dataset, genetic algorithms, machine learning, pattern classification, system training time, user-to-root attack detection
Publisher IEEE
Download/View statistics View download statistics for this item

University Staff: Request a correction | Centaur Editors: Update this record

Search Google Scholar