A new intrusion detection method based on process profiling

Y. Okazaki, I. Sato, Shigeki Goto

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    30 Citations (Scopus)


    There are two well-known models for intrusion detection-anomaly intrusion detection (AID) model and misuse intrusion detection (MID) model. The former analyzes user behavior and the statistics of a process in a normal situation, and checks whether the system is being used in a different manner. The latter maintains a database of known intrusion techniques and detects intrusion by comparing behavior against the database. An intrusion detection method based on an AID model can detect a new intrusion method, but needs to update the data describing user behavior and statistics in normal usage. We call these information profiles. There are several problems in AID to be addressed. The profiles tend to be large. Detecting intrusion needs a large amount of system resources, like CPU time and memory and disk space. An MID model requires fewer system resources to detect intrusion. However, it cannot detect new, unknown intrusion methods. Our method solves these problems by recording system calls from daemon processes and setuid programs. We improved detection accuracy by adopting a DP matching scheme.

    Original languageEnglish
    Title of host publicationProceedings - 2002 Symposium on Applications and the Internet, SAINT 2002
    PublisherInstitute of Electrical and Electronics Engineers Inc.
    Number of pages9
    ISBN (Print)0769514472, 9780769514475
    Publication statusPublished - 2002
    EventSymposium on Applications and the Internet, SAINT 2002 - Nara City, Japan
    Duration: 2002 Jan 282002 Feb 1


    OtherSymposium on Applications and the Internet, SAINT 2002
    CityNara City


    • Internet
    • Intrusion detection

    ASJC Scopus subject areas

    • Computer Networks and Communications
    • Computer Science Applications


    Dive into the research topics of 'A new intrusion detection method based on process profiling'. Together they form a unique fingerprint.

    Cite this