Journal of Information Security

Volume 6, Issue 3 (July 2015)

ISSN Print: 2153-1234   ISSN Online: 2153-1242

Google-based Impact Factor: 3.25  Citations  

Evaluation of Modified Vector Space Representation Using ADFA-LD and ADFA-WD Datasets

HTML  Download Download as PDF (Size: 4994KB)  PP. 250-264  
DOI: 10.4236/jis.2015.63025    6,822 Downloads   9,685 Views  Citations

ABSTRACT

Predicting anomalous behaviour of a running process using system call trace is a common practice among security community and it is still an active research area. It is a typical pattern recognition problem and can be dealt with machine learning algorithms. Standard system call datasets were employed to train these algorithms. However, advancements in operating systems made these datasets outdated and un-relevant. Australian Defence Force Academy Linux Dataset (ADFA-LD) and Australian Defence Force Academy Windows Dataset (ADFA-WD) are new generation system calls datasets that contain labelled system call traces for modern exploits and attacks on various applications. In this paper, we evaluate performance of Modified Vector Space Representation technique on ADFA-LD and ADFA-WD datasets using various classification algorithms. Our experimental results show that our method performs well and it helps accurately distinguishing process behaviour through system calls.

Share and Cite:

Borisaniya, B. and Patel, D. (2015) Evaluation of Modified Vector Space Representation Using ADFA-LD and ADFA-WD Datasets. Journal of Information Security, 6, 250-264. doi: 10.4236/jis.2015.63025.

Cited by

[1] Self-healing hybrid intrusion detection system: an ensemble machine learning approach
Discover Artificial …, 2024
[2] ROSpace: Intrusion Detection Dataset for a ROS2-Based Cyber-Physical System
arXiv preprint arXiv …, 2024
[3] Combining dynamic and static host intrusion detection features using variational long short-term memory recurrent autoencoder
Вестник Санкт-Петербургского …, 2024
[4] Įsibrovimo aptikimas analizuojant kompiuterio lygmens žurnalinius įrašus iš AWSCTD duomenų rinkinio
2023
[5] A New Federated Learning Model for Host Intrusion Detection System Under Non-IID Data
2023 IEEE International …, 2023
[6] Cybersecurity attacks: which dataset should be used to evaluate an intrusion detection system?
Vojnotehnički glasnik, 2023
[7] API-based features representation fusion for malware classification
2023 IEEE 47th Annual Computers, Software …, 2023
[8] Stacking ensemble-based HIDS framework for detecting anomalous system processes in Windows based operating systems using multiple word embedding
Computers & Security, 2023
[9] NLP methods in host-based intrusion detection Systems: A systematic review and future directions
Journal of Network and Computer …, 2023
[10] Numerical feature selection and hyperbolic tangent feature scaling in machine learning-based detection of anomalies in the computer network behavior
Electronics, 2023
[11] A novel hybrid framework for cloud intrusion detection system using system call sequence analysis
Cluster Computing, 2023
[12] Optimizing intrusion detection systems using parallel metric learning
Computers and …, 2023
[13] Intelligent Mechanisms for Monitoring and Intrusion Detection in IoT Devices
2022
[14] Machine Learning Methods leveraging ADFA-LD Dataset for Anomaly Detection in Linux Host Systems
2022 2nd International …, 2022
[15] Interpretability and performance of deep neural network based anomaly detection in cyber security and telecommunications
2022
[16] A Framework for Analysis of Network Traffic Using Predictive Algorithm
… Conference on Computing …, 2022
[17] Computer network intrusion detection using cascade back propagation neural network
2022
[18] Comparison of System Call Sequence Embedding Approaches for Anomaly Detection
Journal of Convergence for Information …, 2022
[19] Creation of a Dataset Modeling the System Calls of Spectrum Sensors Affected by Malware
Bachelor Thesis, 2022
[20] Network intrusion detection via flow-to-image conversion
2022
[21] A Lightweight Host-Based Intrusion Detection System Using N-Gram and Perceptron Model for Internet of Things
2021
[22] An Intrusion Detection System on Fog Architecture
… Conference on Mobile Ad Hoc and …, 2021
[23] Classifier Performance Evaluation for Lightweight IDS Using Fog Computing in IoT Security
2021
[24] НАБОРЫ ДАННЫХ В ИНФОРМАЦИОННОЙ БЕЗОПАСНОСТИ ДЛЯ АЛГОРИТМОВ МАШИННОГО ОБУЧЕНИЯ
2021
[25] Intrusion Detection Based on Sequential Information Preserving Log Embedding Methods and Anomaly Detection Algorithms
2021
[26] GAN based Augmentation for Improving Anomaly Detection Accuracy in Host-based Intrusion Detection Systems
International Journal of Engineering Research and Technology, 2020
[27] A new perspective towards the development of robust data-driven intrusion detection for industrial control systems
2020
[28] Comprehensive Review of Cybercrime Detection Techniques
2020
[29] procmonML: Generating evasion resilient host-based behavioral analytics from tree ensembles
2020
[30] A TfidfVectorizer and Singular Value Decomposition based host intrusion detection system framework for detecting anomalous system processes
2020
[31] A Novel Deep Intrusion Detection Model Based On a Convolutional Neural Network.
2019
[32] A Lightweight Perceptron-Based Intrusion Detection System for Fog Computing
2019
[33] Data security analysis based on Blockchain Recurrence Qualitative Analysis (BRQA)
2019
[34] Deep Learning Approach for Intelligent Intrusion Detection System
2019
[35] SON KULLANICILAR İÇİN ANOMALİ SALDIRI TESPİT SİSTEMLERİ
2019
[36] EVALUATION OF ANOMALY DETECTION APPROACHES USING SYSTEM CALL TRACES ON EMBEDDED LINUX SYSTEMS AND COMPARISON WITH …
2018
[37] COMBINATION OF MULTI-CHANNEL CNN AND BiLSTM FOR HOST-BASED INTRUSION DETECTION
2018
[38] EagleEye: A Novel Visual Anomaly Detection Method
2018
[39] Host-based misuse intrusion detection using PCA feature extraction and kNN classification algorithms
Intelligent Data Analysis, 2018
[40] Sequence Covering for Efficient Host-Based Intrusion Detection
2017
[41] Machine Learning for Host-based Misuse and Anomaly Detection in UNIX Environment
Dissertation, University of Toledo, 2017
[42] Ensemble classifier for misuse detection using N-gram feature vectors through operating system call traces
International Journal of Hybrid Intelligent Systems, 2017
[43] Host based intrusion detection system using frequency analysis of n-gram terms
2017
[44] EVALUATING HOST-BASED INTRUSION DETECTION ON THE ADFA-WD AND ADFA-WD: SAA DATASETS
2017

Copyright © 2026 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.