Note that SQL injection attacks include two insuffi-
cient authentication attacks performing through SQL
injection. These attacks cause simultaneously anoma-
lous new values and value combinations.
5.2 Experiments on Standard/Enhanced
Bayesian Classification Rule
Table 2 compares results of standard then enhanced
naive Bayes and TAN classifiers built on training data
and evaluated on testing one.
Table 2: Evaluation of naive Bayes and TAN classifiers us-
ing standard/enhanced Bayesian classification rules.
Standard Bayesian rule Enhanced Bayesian rule
Naive Bayes TAN Naive Bayes TAN
Normal 98.2% 99.9% 91.7% 97.8%
Vulnerability scan 15.8% 44.1% 100% 100%
Buffer overflow 6.7% 20.2% 80% 100%
Input validation 75.0% 100% 100% 100%
Value misinterpretation 100% 0.00% 100% 100%
Flooding 100% 100% 100% 100%
Cross Site Scripting 0.00% 0.00 % 100% 100%
SQL injection 0.00% 0.00% 100 % 100%
Command injection 0.00% 0.00 % 100 % 100%
Total PCC 92.87% 96.24% 96.45% 98.07%
Note that enhanced classification rule evaluated in
Table 2 uses normality/abnormality duality and zero
probabilities (see Rules 1, 2 and 3).
• Experiments on standard Bayesian classification
rule: At first sight, both classifiers achieve good
detection rates regarding their PCCs (Percent of
Correct Classification) but they are ineffective in
detecting novel attacks (attacks in bold in Ta-
ble 2). Confusion matrixes relative to this ex-
perimentation show that naive Bayes and TAN
classifiers misclassified all new attacks and pre-
dicted them Normal. However, results of Table
2 show that TAN classifier performs better than
naive Bayes since it represents some feature de-
pendencies. Furthermore, testing attacks causing
new value combinations of seen anomalous values
(involved separately in different training attacks)
cause false negatives. For instance, testing vul-
nerability scans are not well detected since they
involve new value combinations.
• Experiments on enhanced Bayesian classification
rule: Naive Bayes and TAN classifiers using the
enhanced rule perform significantly better than
with standard rule. More particularly, both the
classifiers succeeded in detecting both novel and
known attacks. Unlike naive Bayes, enhanced
TAN classifier improves detection rates without
triggering higher false alarm rate (see correct clas-
sification rate of Normal class in Table 2. Further-
more, TAN classifier correctly detects and identi-
fies all known and novel attacks.
Results of Table 2 show that significant improvements
can be achieved in detecting novel attacks by enhanc-
ing standard classification rules in order to meet be-
havioral approach requirements.
6 CONCLUSIONS
The main objective of this paper is to overcome one
of the main limitations of behavioral approaches.
We proposed how to enhance standard classification
rules in order to effectively detect both known and
novel attacks. We illustrated our enhancements on
Bayesian classifiers in order to improve detecting
novel attacks involving abnormal behaviors. More
precisely, we have proposed four rules relying on
normality/abnormalityduality relative to audit events,
zero probabilities caused by anomalous evidence oc-
currence and likelihood of attacks having extremely
small prior frequencies. Experiments on http traffic
show the significant improvements achieved by the
enhanced decision rule in comparison with the stan-
dard one. Future work will address handling incom-
plete and uncertain information relative to network
traffic audit events.
REFERENCES
Axelsson, S. (2000). Intrusion detection systems: A sur-
vey and taxonomy. Technical Report 99-15, Chalmers
Univ.
Barbar´a, D., Wu, N., and Jajodia, S. (2001). Detecting
novel network intrusions using bayes estimators. In
Proceedings of the First SIAM Conference on Data
Mining.
Ben-Amor, N., Benferhat, S., and Elouedi, Z. (2003). Naive
bayesian networks in intrusion detection systems. In
ACM, Cavtat-Dubrovnik, Croatia.
Benferhat, S. and Tabia, K. (2005). On the combination of
naive bayes and decision trees for intrusion detection.
In CIMCA/IAWTIC, pages 211–216.
Elkan, C. (2000). Results of the kdd’99 classifier learning.
SIGKDD Explorations, 1(2):63–64.
Friedman, N., Geiger, D., and Goldszmidt, M. (1997).
Bayesian network classifiers. Machine Learning,
29(2-3):131–163.
Ingham, K. L. and Inoue, H. (2007). Comparing anomaly
detection techniques for http. In RAID, pages 42–62.
Kruegel, C., Mutz, D., Robertson, W., and Valeur, F. (2003).
Bayesian event classification for intrusion detection.
ON THE DETECTION OF NOVEL ATTACKS USING BEHAVIORAL APPROACHES
271