Figure 1 shows that novel attacks detection rates
can be improved by exploiting likelihood of attacks
having small prior probabilities. For instance, fixing
the threshold of Rule 4 to 1% significantly improves
detection rates of several attacks since the detection
of these attacks was strongly penalized by their fre-
quencies in training data.
Results of Table 2 and Figure 1 show that significant
improvements can be achieved in detecting novel at-
tacks by enhancing standard classification rules in or-
der to meet anomaly detection requirements.
Note that we carried out other experimentations
2
on
Darpa’99 data set (Lippmann et al., 2000) and con-
cluded that our enhancements allow significantly im-
proving the detection of novel attacks.
7 CONCLUSIONS
In this paper, we proposed enhancements to the stan-
dard Bayesian classification rule in order to effec-
tively detect both known and novel attacks. We firstly
analyzed Bayesian classifiers failure to detect most
novel attacks which they flag normal behaviors. Ac-
cordingly, we proposed to enhance standard Bayesian
classification rule in order to meet anomaly detec-
tion objectives. Our enhancements aim at better han-
dling novel and unusual behaviors and providing a
Bayesian classification rule which better fits anomaly
detection requirements. More precisely, we proposed
enhancements to exploit normality/abnormality dual-
ity relative to audit events as well as zero probabilities
caused by anomalous evidence occurrence and likeli-
hood of attacks having extremely small prior proba-
bilities. Experiments on recent http traffic involving
real data and several Web attacks showed the signifi-
cant improvements achieved by the enhanced classifi-
cation rule in comparison with the standard one.
ACKNOWLEDGEMENTS
This work is supported by MICRAC project
(http://www.irit.fr/MICRAC/).
REFERENCES
Axelsson, S. (2000). Intrusion detection systems: A sur-
vey and taxonomy. Technical Report 99-15, Chalmers
Univ.
2
Because of the limit on the number of pages, we cannot
report the results on Darpa’99 data set
Barbar´a, D., Wu, N., and Jajodia, S. (2001). Detecting
novel network intrusions using bayes estimators. In
Proceedings of the First SIAM Conference on Data
Mining.
Ben-Amor, N., Benferhat, S., and Elouedi, Z. (2003). Naive
bayesian networks in intrusion detection systems. In
ACM, Cavtat-Dubrovnik, Croatia.
Benferhat, S. and Tabia, K. (2005). On the combination of
naive bayes and decision trees for intrusion detection.
In CIMCA/IAWTIC, pages 211–216.
Benferhat, S. and Tabia, K. (2008a). Classification features
for detecting server-side and client-side web attacks.
In 23rd International Security Conference, Italy.
Benferhat, S. and Tabia, K. (2008b). Context-based profil-
ing for anomaly intrusion detection with diagnosis. In
ARES2008 : Third International Conference on Avail-
ability, Reliability and Security, Barcelona, Spain.
Elkan, C. (2000). Results of the kdd’99 classifier learning.
SIGKDD Explorations, 1(2):63–64.
Friedman, N., Geiger, D., and Goldszmidt, M. (1997).
Bayesian network classifiers. Machine Learning,
29(2-3):131–163.
Ingham, K. L. and Inoue, H. (2007). Comparing anomaly
detection techniques for http. In RAID, pages 42–62.
Jensen, F. V. (1996). An Introduction to Bayesian Networks.
UCL press, London.
Kruegel, C., Mutz, D., Robertson, W., and Valeur, F. (2003).
Bayesian event classification for intrusion detection.
Kumar, S. and Spafford, E. H. (1994). An appli-
cation of pattern matching in intrusion detection.
Tech. Rep. CSD–TR–94–013, Department of Com-
puter Scien’ces, Purdue University, West Lafayette.
Lee, W. (1999). A data mining framework for constructing
features and models for intrusion detection systems.
PhD thesis, New York, NY, USA.
Lippmann, R., Haines, J. W., Fried, D. J., Korba, J., and
Das, K. (2000). The 1999 darpa off-line intrusion de-
tection evaluation. Computer Networks, 34(4).
Neumann, P. G. and Porras, P. A. (1999). Experience with
EMERALD to date. pages 73–80.
Quinlan, J. R. (1986). Induction of decision trees. Mach.
Learn., 1(1).
Riancho, A. (2007). w3af - web application attack and audit
framework.
Sebyala, A. A., Olukemi, T., and Sacks, L. (2002). Ac-
tive platform security through intrusion detection us-
ing naive bayesian network for anomaly detection. In
Proceedings of the London Communications Sympo-
sium.
Snort (2002). Snort: The open source network intrusion
detection system. http://www.snort.org.
Tombini, E., Debar, H., Me, L., and Ducasse, M. (2004).
A serial combination of anomaly and misuse idses ap-
plied to http traffic. In ACSAC ’04: Proceedings of the
20th Annual Computer Security Applications Confer-
ence (ACSAC’04), pages 428–437.
Valdes, A. and Skinner, K. (2000). Adaptive, model-based
monitoring for cyber attack detection. In Recent Ad-
vances in Intrusion Detection, pages 80–92.
SECRYPT 2008 - International Conference on Security and Cryptography
20