Malware Detection and Prevention System Based on Multi-Stage Rules

The continuously rising Internet attacks pose severe challenges to develop an effective Intrusion Detection System (IDS) to detect known and unknown malicious attack. In order to address the problem of detecting known, unknown attacks and identify an attack grouped, the authors provide a new multi stage rules for detecting anomalies in multi-stage rules. The authors used the RIPPER for rule generation, which is capable to create rule sets more quickly and can determine the attack types with smaller numbers of rules. These rules would be efficient to apply for Signature Intrusion Detection System (SIDS) and Anomaly Intrusion Detection System (AIDS).

[1]  Christopher Krügel,et al.  Bayesian event classification for intrusion detection , 2003, 19th Annual Computer Security Applications Conference, 2003. Proceedings..

[2]  Earl B. Hunt,et al.  Concept learning,: An information processing problem , 1974 .

[3]  Kemal Polat,et al.  A novel hybrid intelligent method based on C4.5 decision tree classifier and one-against-all approach for multi-class classification problems , 2009, Expert Syst. Appl..

[4]  Md. Rafiqul Islam,et al.  A multi-tier phishing detection and filtering approach , 2013, J. Netw. Comput. Appl..

[5]  Jian Ma,et al.  A new approach to intrusion detection using Artificial Neural Networks and fuzzy clustering , 2010, Expert Syst. Appl..

[6]  Adam Stotz,et al.  Understanding multistage attacks by attack-track based visualization of heterogeneous event streams , 2006, VizSEC '06.

[7]  Tim Torvatn,et al.  Risk of Contract Growth and Opportunistic Behavior: A Comparison of Two Megaprojects , 2012 .

[8]  Christian Payne,et al.  Towards Usable Application-Oriented Access Controls: Qualitative Results from a Usability Study of SELinux, AppArmor and FBAC-LSM , 2012, Int. J. Inf. Secur. Priv..

[9]  David A. Cieslak,et al.  A Robust Decision Tree Algorithm for Imbalanced Data Sets , 2010, SDM.

[10]  Jemal H. Abawajy,et al.  Web application protection against SQL injection attack , 2011, ICIT 2011.

[11]  Sara Matzner,et al.  An application of machine learning to network intrusion detection , 1999, Proceedings 15th Annual Computer Security Applications Conference (ACSAC'99).

[12]  Zhu Wang,et al.  A research using hybrid RBF/Elman neural networks for intrusion detection system secure model , 2009, Comput. Phys. Commun..

[13]  Jemal H. Abawajy,et al.  Using feature selection for intrusion detection system , 2012, 2012 International Symposium on Communications and Information Technologies (ISCIT).

[14]  Reza Manabi,et al.  Risk Assessment Using AHP in a Petrochemical Engineering Case Study , 2013 .

[15]  Hamid R. Nemati International Journal of Information Security and Privacy , 2007 .

[16]  Jemal H. Abawajy,et al.  Web Malware that Targets Web Applications , 2013 .

[17]  Jung-Min Park,et al.  An overview of anomaly detection techniques: Existing solutions and latest technological trends , 2007, Comput. Networks.

[18]  Jameson M. Wetmore,et al.  Encyclopedia of information ethics and security , 2008 .

[19]  Sokratis K. Katsikas,et al.  Reducing false positives in intrusion detection systems , 2010, Comput. Secur..

[20]  Yoram Singer,et al.  A simple, fast, and effective rule learner , 1999, AAAI 1999.