Intelligent agents for intrusion detection

G. G. Helmer, J. S.K. Wong, V. Honavar, L. Miller

Research output: Chapter in Book/Report/Conference proceedingConference contribution

95 Citations (Scopus)

Abstract

The paper focuses on intrusion detection and countermeasures with respect to widely-used operating systems and networks. The design and architecture of an intrusion detection system built from distributed agents is proposed to implement an intelligent system on which data mining can be performed to provide global, temporal views of an entire networked system. A starting point for agent intelligence in the system is the research into the use of machine learning over system call traces from the privileged sendmail program on UNIX. The authors use a rule learning algorithm to classify the system call traces for intrusion detection purposes and show the results.

Original languageEnglish (US)
Title of host publication1998 IEEE Information Technology Conference
Subtitle of host publicationInformation Environment for the Future, IT 1998
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages121-124
Number of pages4
ISBN (Electronic)0780399145, 9780780399143
DOIs
StatePublished - Jan 1 1998
Event1998 IEEE Information Technology Conference, IT 1998 - Syracuse, United States
Duration: Sep 3 1998 → …

Publication series

Name1998 IEEE Information Technology Conference: Information Environment for the Future, IT 1998
Volume1998-September

Other

Other1998 IEEE Information Technology Conference, IT 1998
CountryUnited States
CitySyracuse
Period9/3/98 → …

Fingerprint

Intelligent agents
Intrusion detection
UNIX
Intelligent systems
Learning algorithms
Data mining
Learning systems

All Science Journal Classification (ASJC) codes

  • Safety, Risk, Reliability and Quality
  • Artificial Intelligence
  • Computer Networks and Communications
  • Computer Science Applications
  • Hardware and Architecture
  • Information Systems
  • Software

Cite this

Helmer, G. G., Wong, J. S. K., Honavar, V., & Miller, L. (1998). Intelligent agents for intrusion detection. In 1998 IEEE Information Technology Conference: Information Environment for the Future, IT 1998 (pp. 121-124). [713396] (1998 IEEE Information Technology Conference: Information Environment for the Future, IT 1998; Vol. 1998-September). Institute of Electrical and Electronics Engineers Inc.. https://doi.org/10.1109/IT.1998.713396
Helmer, G. G. ; Wong, J. S.K. ; Honavar, V. ; Miller, L. / Intelligent agents for intrusion detection. 1998 IEEE Information Technology Conference: Information Environment for the Future, IT 1998. Institute of Electrical and Electronics Engineers Inc., 1998. pp. 121-124 (1998 IEEE Information Technology Conference: Information Environment for the Future, IT 1998).
@inproceedings{9f8bb01bcedd4c989ba1302224bb3c1b,
title = "Intelligent agents for intrusion detection",
abstract = "The paper focuses on intrusion detection and countermeasures with respect to widely-used operating systems and networks. The design and architecture of an intrusion detection system built from distributed agents is proposed to implement an intelligent system on which data mining can be performed to provide global, temporal views of an entire networked system. A starting point for agent intelligence in the system is the research into the use of machine learning over system call traces from the privileged sendmail program on UNIX. The authors use a rule learning algorithm to classify the system call traces for intrusion detection purposes and show the results.",
author = "Helmer, {G. G.} and Wong, {J. S.K.} and V. Honavar and L. Miller",
year = "1998",
month = "1",
day = "1",
doi = "10.1109/IT.1998.713396",
language = "English (US)",
series = "1998 IEEE Information Technology Conference: Information Environment for the Future, IT 1998",
publisher = "Institute of Electrical and Electronics Engineers Inc.",
pages = "121--124",
booktitle = "1998 IEEE Information Technology Conference",
address = "United States",

}

Helmer, GG, Wong, JSK, Honavar, V & Miller, L 1998, Intelligent agents for intrusion detection. in 1998 IEEE Information Technology Conference: Information Environment for the Future, IT 1998., 713396, 1998 IEEE Information Technology Conference: Information Environment for the Future, IT 1998, vol. 1998-September, Institute of Electrical and Electronics Engineers Inc., pp. 121-124, 1998 IEEE Information Technology Conference, IT 1998, Syracuse, United States, 9/3/98. https://doi.org/10.1109/IT.1998.713396

Intelligent agents for intrusion detection. / Helmer, G. G.; Wong, J. S.K.; Honavar, V.; Miller, L.

1998 IEEE Information Technology Conference: Information Environment for the Future, IT 1998. Institute of Electrical and Electronics Engineers Inc., 1998. p. 121-124 713396 (1998 IEEE Information Technology Conference: Information Environment for the Future, IT 1998; Vol. 1998-September).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

TY - GEN

T1 - Intelligent agents for intrusion detection

AU - Helmer, G. G.

AU - Wong, J. S.K.

AU - Honavar, V.

AU - Miller, L.

PY - 1998/1/1

Y1 - 1998/1/1

N2 - The paper focuses on intrusion detection and countermeasures with respect to widely-used operating systems and networks. The design and architecture of an intrusion detection system built from distributed agents is proposed to implement an intelligent system on which data mining can be performed to provide global, temporal views of an entire networked system. A starting point for agent intelligence in the system is the research into the use of machine learning over system call traces from the privileged sendmail program on UNIX. The authors use a rule learning algorithm to classify the system call traces for intrusion detection purposes and show the results.

AB - The paper focuses on intrusion detection and countermeasures with respect to widely-used operating systems and networks. The design and architecture of an intrusion detection system built from distributed agents is proposed to implement an intelligent system on which data mining can be performed to provide global, temporal views of an entire networked system. A starting point for agent intelligence in the system is the research into the use of machine learning over system call traces from the privileged sendmail program on UNIX. The authors use a rule learning algorithm to classify the system call traces for intrusion detection purposes and show the results.

UR - http://www.scopus.com/inward/record.url?scp=85015336184&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=85015336184&partnerID=8YFLogxK

U2 - 10.1109/IT.1998.713396

DO - 10.1109/IT.1998.713396

M3 - Conference contribution

AN - SCOPUS:85015336184

T3 - 1998 IEEE Information Technology Conference: Information Environment for the Future, IT 1998

SP - 121

EP - 124

BT - 1998 IEEE Information Technology Conference

PB - Institute of Electrical and Electronics Engineers Inc.

ER -

Helmer GG, Wong JSK, Honavar V, Miller L. Intelligent agents for intrusion detection. In 1998 IEEE Information Technology Conference: Information Environment for the Future, IT 1998. Institute of Electrical and Electronics Engineers Inc. 1998. p. 121-124. 713396. (1998 IEEE Information Technology Conference: Information Environment for the Future, IT 1998). https://doi.org/10.1109/IT.1998.713396