Anomaly-Based Intrusion Detection Using Classification Models: An Analysis of System Call Traces
| dc.contributor.advisor | Bérczes, Tamás | |
| dc.contributor.author | Gaskel, Gregory | |
| dc.contributor.department | DE--Természettudományi és Technológiai Kar--Matematikai Intézet | |
| dc.date.accessioned | 2023-04-28T09:06:06Z | |
| dc.date.available | 2023-04-28T09:06:06Z | |
| dc.date.created | 2023-04-28 | |
| dc.description.abstract | In this thesis, we apply classification models to anomaly-based intrusion detection using system call traces. Several feature extraction techniques commonly used for vectorizing system call traces are examined, including the Boolean Model, Simple Vector Space Model, Traditional N-Gram Vector Space Model, and the N-Gram TF-IDF Model. We then propose a novel variable-length feature extraction framework based on the N-Gram TF-IDF Model, whereby n-gram terms of various length are included in the feature set. We then evaluate the performance of each feature extraction approach with the Australian Defense Force Academy Linux Dataset (ADFA-LD) using three classification models: linear discriminant analysis, random forest classification, and logistic regression. By computing performance metrics, including accuracy, precision, recall, F-measure, false positive rate, and area under the curve (AUC), we obtain insight into the trade-off between model complexity and performance. | |
| dc.description.corrector | LB | |
| dc.description.course | Applied Mathematics | |
| dc.description.degree | MSc/MA | |
| dc.format.extent | 38 | |
| dc.identifier.uri | https://hdl.handle.net/2437/351195 | |
| dc.language.iso | en | |
| dc.rights.access | Hozzáférhető a 2022 decemberi felsőoktatási törvénymódosítás értelmében. | |
| dc.subject | cybersecurity | |
| dc.subject | system call traces | |
| dc.subject | intrusion detection | |
| dc.subject | classification models | |
| dc.subject.dspace | DEENK Témalista::Matematika | |
| dc.title | Anomaly-Based Intrusion Detection Using Classification Models: An Analysis of System Call Traces |