skip to main content
10.1145/2420936.2420939acmconferencesArticle/Chapter ViewAbstractPublication PagespactConference Proceedingsconference-collections
research-article

Enhanced boosting-based algorithm for intrusion detection in virtual machine environments

Published:19 September 2012Publication History

ABSTRACT

Intrusion detection is one of the high priority and challenging tasks in many technologies, particularly, in virtualization technology. There is a need to safeguard these systems from known vulnerabilities and at the same time take steps to detect new and unseen, but possible, system abuses by developing more reliable and efficient intrusion detection systems.

In this correspondence, we propose a machine learning based intrusion detection algorithm based on Enhanced Boosting with Decision Stumps algorithm to detect various categories of attacks utilizing information embedded within the virtual machine monitor (VMM) level. In the algorithm, decision stumps are used as weak classifiers. The decision rules are provided for different types of features. By combining the weak classifiers for the heterogeneous mixture features types into a strong classifier, the relations between these features are handled naturally, without any forced conversions between them. Moreover, adjustable initial weights based on the area under the ROC curve (AUC) are adopted to make a tradeoff between the false-alarm and detection rates. Experimental results show that our algorithm has low computational complexity and error rates as tested on real malwares.

References

  1. M. Alshawabkeh, M. Moffie, F. Azamandian, J. A. Aslam, J. G. Dy, and D. Kaeli. Effective virtual machine monitor intrusion detection using feature selection on highly imbalanced data. In The ninth International Conference on Machine Learning and Applications (ICMLA), pages 823--825, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. The Apache Software Foundation. ab - Apache HTTP server benchmarking tool. http://www.apache.org/.Google ScholarGoogle Scholar
  3. Y. Freund and R. Schapire. Experiments with a new boosting algorithm. In Machine Learning: Proceedings of the Thirteenth International Conference, pages 148--156, 1996.Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Innotek. Innotek virtualbox. http://www.virtualbox.org/, 2010.Google ScholarGoogle Scholar
  5. P. Long and R. Servedio. Boosting the area under the roc curve. In NIPS, 2007.Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Malfease. Project malfease. https://malfease.oarci.net/.Google ScholarGoogle Scholar
  7. E. Schapire, Y. Freund, P. Bartlett, and W. Lee. Boosting the margin: A new explanation for the effectiveness of voting methods. Ann. Stat., 26(5):1651--1686, 1998.Google ScholarGoogle ScholarCross RefCross Ref
  8. P. Silapachote, D. Karuppiah, and A. Hanson. Feature selection using adaboost for face expression recognistion. Proceedings of the Fourth IASTED International Conference on Visualization, Imaging, and Imag Processing, pages 84--89, 2004.Google ScholarGoogle Scholar
  9. Transaction Processing Performance Council TPC. TPC-C, an on-line transaction processing benchmark. http://www.tpc.org/.Google ScholarGoogle Scholar
  10. I. Witten and E. Frank. Data Mining: Practical Machine Learning Tools and Techniques. second edition, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Z. Zheng, X. Wu, and R. Srihari. Feature selection for text categorization on imbalanced data. SIGKDD Explor. Newsl., 6(1):80--89, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Enhanced boosting-based algorithm for intrusion detection in virtual machine environments

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        SRAS '12: Proceedings of the First International Workshop on Secure and Resilient Architectures and Systems
        September 2012
        35 pages
        ISBN:9781450317771
        DOI:10.1145/2420936

        Copyright © 2012 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 19 September 2012

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article

        Upcoming Conference

        PACT '24
        International Conference on Parallel Architectures and Compilation Techniques
        October 14 - 16, 2024
        Southern California , CA , USA
      • Article Metrics

        • Downloads (Last 12 months)1
        • Downloads (Last 6 weeks)0

        Other Metrics

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader