6 CONCLUSIONS AND FUTURE
WORK
In this paper we present an application of Hidden
Markov Models of processor load behavior for anom-
aly detection. We show experimental evidence sug-
gesting that this approach can be successful to detect
attacks or misuse that directly affects processor per-
formance. As we state in the introduction, system
normality can be defined in terms of several variables
like processor load, memory usage, etc., and then our
method could be more effective if it takes into account
not only processor load but another parameters like
network traffic (Wright et al., 2004).
We found in our case that processor load is close
related with activity cycles of our organization. A
more realistic model of what is the normal behavior
of a system must take under consideration natural and
social cycles of activity.
Finally we agree with (Axelsson, 2000) in the con-
clusion that intrusion detection is a problem far from
been solved.
ACKNOWLEDGEMENTS
The authors wish to thank to FIRA - Banco de M
´
exico
for provide us with experimental data and logistic
support.
Also we wish to tank to our anonymous referees for
their useful and insightful comments.
REFERENCES
Axelsson, S. (2000). The base-rate fallacy and the difficulty
of intrusion detection. ACM Trans. Inf. Syst. Secur.,
3(3):186–205.
Burgess, M. (1998). Computer immunology. In LISA
’98: Proceedings of the 12th Conference on Systems
Administration, pages 283–298, Berkeley, CA, USA.
USENIX Association.
Burgess, M., Haugerud, H., Straumsnes, S., and Reitan, T.
(2002). Measuring system normality. ACM Trans.
Comput. Syst., 20(2):125–160.
Coull, S., Branch, J., Szymanski, B., and Breimer, E.
(2003). Intrusion detection: A bioinformatics ap-
proach. In ACSAC ’03: Proceedings of the 19th
Annual Computer Security Applications Conference,
page 24, Washington, DC, USA. IEEE Computer So-
ciety.
Denning, D. E. (1987). An intrusion-detection model. IEEE
Trans. Softw. Eng., 13(2):222–232.
Forrest, S., Hofmeyr, S. A., and Somayaji, A. (1997). Com-
puter immunology. Commun. ACM, 40(10):88–96.
Forrest, S., Hofmeyr, S. A., Somayaji, A., and Longstaff,
T. A. (1996). A sense of self for unix processes. In SP
’96: Proceedings of the 1996 IEEE Symposium on Se-
curity and Privacy, page 120, Washington, DC, USA.
IEEE Computer Society.
Ghahramani, Z. (2002). An introduction to hidden markov
models and bayesian networks. Hidden Markov mod-
els: applications in computer vision, pages 9–42.
Gosh, A. K., Wanken, J., and Charron, F. (1998). Detecting
anomalous and unknown intrusions against programs.
In ACSAC ’98: Proceedings of the 14th Annual Com-
puter Security Applications Conference, page 259,
Washington, DC, USA. IEEE Computer Society.
Jordan, M. I., Ghahramani, Z., Jaakkola, T. S., and Saul,
L. K. (1999). An introduction to variational methods
for graphical models. Mach. Learn., 37(2):183–233.
Ko, C., Ruschitzka, M., and Levitt, K. (1997). Execution
monitoring of security-critical programs in distributed
systems: a specification-based approach. In SP ’97:
Proceedings of the 1997 IEEE Symposium on Security
and Privacy, page 175, Washington, DC, USA. IEEE
Computer Society.
Lane, T. and Brodley, C. E. (1999). Temporal sequence
learning and data reduction for anomaly detection.
ACM Trans. Inf. Syst. Secur., 2(3):295–331.
Lee, W. and Stolfo, S. J. (2000). A framework for con-
structing features and models for intrusion detection
systems. ACM Trans. Inf. Syst. Secur., 3(4):227–261.
Lee, W., Stolfo, S. J., and Mok, K. W. (1999). Mining in
a data-flow environment: experience in network intru-
sion detection. In KDD ’99: Proceedings of the fifth
ACM SIGKDD international conference on Knowl-
edge discovery and data mining, pages 114–124, New
York, NY, USA. ACM Press.
MacFaden, M., Partain, D., Saperia, J., and Tackabury,
W. (2003). Configuring Networks and Devices
with Simple Network Management Protocol (SNMP),
RFC3512. RFC Editor, United States.
Michael, C. C. and Ghosh, A. (2002). Simple, state-
based approaches to program-based anomaly detec-
tion. ACM Trans. Inf. Syst. Secur., 5(3):203–237.
Presuhn, R. (2002). Management Information Base
(MIB) for the Simple Network Management Protocol
(SNMP), RFC 3418. RFC Editor, United States.
Wagner, D. and Soto, P. (2002). Mimicry attacks on host-
based intrusion detection systems. In CCS ’02: Pro-
ceedings of the 9th ACM conference on Computer and
communications security, pages 255–264, New York,
NY, USA. ACM Press.
Wright, C., Monrose, F., and Masson, G. M. (2004).
Hmm profiles for network traffic classification. In
VizSEC/DMSEC ’04: Proceedings of the 2004 ACM
workshop on Visualization and data mining for com-
puter security, pages 9–15, New York, NY, USA.
ACM Press.
Yin, Q., Zhang, R., and Li, X. (2004). An new intrusion de-
tection method based on linear prediction. In InfoSecu
’04: Proceedings of the 3rd international conference
on Information security, pages 160–165, New York,
NY, USA. ACM Press.
WORKLOAD HIDDEN MARKOV MODEL FOR ANOMALY DETECTION
59