A Logical Framework for Plan Recognition for Intrusion Detection
نویسنده
چکیده
This document describes the results of our work during the first two years of our PhD. studies. The aim of our PhD. thesis is the development of a methodology for automated intrusion detection based on attack plan recognition, and therefore, the design of a general framework for the characterization and theoretical investigation of the plan recognition problem in adversarial scenarios. In the AI literature, the term plan recognition refers to the process of inferring agent goals from observed actions. Knowing the plan an agent is pursuing is important for several reasons. It allows us to predict actions the agent might take in the future, and aid or hamper the agent by suggesting or even taking action alternatives. Plan recognition is useful in many application areas, such as, for example, discourse analysis in natural language question answering systems, story understanding, intelligent human-computer interfaces, and multi-agent coordination. Another challenging application area, from our perspective, is computer security, in particular intrusion detection. We believe that the ability to recognize intrusion scenarios as soon as they start, in conjunction with the prediction of attacker’s future actions, will help increase the security level of computer systems and limit the damages caused by the intrusion. Given a set of observations, a plan recognition system typically searches a space of possible plan hypotheses for candidate plans and goals that account for the observations. The search space is defined using a plan library, which is an explicit representation of plans potentially executed and goals potentially pursued by the observed agent. The recognizer matches observations to specific plan steps in the library, and tries to infer the plan that the observed agent is actually executing and the sequence of actions that constitute the plan the observed agent tries to follow. Despite the advantage of having a rich expressiveness, the use of a plan library has several limitations. First, plans not appearing in the library cannot be recognized. Moreover, acquiring and encoding the plan library is a
منابع مشابه
Alert correlation and prediction using data mining and HMM
Intrusion Detection Systems (IDSs) are security tools widely used in computer networks. While they seem to be promising technologies, they pose some serious drawbacks: When utilized in large and high traffic networks, IDSs generate high volumes of low-level alerts which are hardly manageable. Accordingly, there emerged a recent track of security research, focused on alert correlation, which ext...
متن کاملA Hybrid Framework for Building an Efficient Incremental Intrusion Detection System
In this paper, a boosting-based incremental hybrid intrusion detection system is introduced. This system combines incremental misuse detection and incremental anomaly detection. We use boosting ensemble of weak classifiers to implement misuse intrusion detection system. It can identify new classes types of intrusions that do not exist in the training dataset for incremental misuse detection. As...
متن کاملToward Using Plan Recognition for Intrusion Detection
This paper identifies some of the assumptions that prevent the effective application of existing plan recognition technology to intrusion detection in computer systems. It then presents a new algorithm for plan recognition that does not have these limitations.
متن کاملPlan Recognition in Intrusion Detection Systems
To be effective, current intrusion detection systems (IDSs) must incorporate artificial intelligence methods for plan recognition. Plan recognition is critical both to predicting the future actions of attackers and planning appropriate responses to their actions. However network security places a new set of requirements on plan recognition. In this paper we present an argument for including pla...
متن کاملLexical Ambiguity and its Impact on Plan Recognition for Intrusion Detection
Viewing intrusion detection as a problem of plan recognition presents unique problems. Real world security domains are highly ambiguous and this creates significant problems for plan recognition. This paper distinguishes three sources of ambiguity: action ambiguity, syntactic ambiguity and attachment ambiguity. Previous work in plan recognition has often conflated these different sources of amb...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2006