Hsiao, S.-W.S.-W.HsiaoYEALI SUNChen, M.C.M.C.ChenZhang, H.H.Zhang2020-02-102020-02-102010https://scholars.lib.ntu.edu.tw/handle/123456789/456090Internet attacks are evolving using evasion techniques such as polymorphism and stealth scanning. Conventional detection systems using signature-based and/or rule-based anomaly detection techniques no longer suffice. It is difficult to predict what form the next malware attack will take and these pose a great challenge to the design of a robust intrusion detection system. We focus on the anomalous behavioral characteristics between attack and victim when they undergo sequences of compromising actions and that are inherent to the classes of vulnerability-exploit attacks. A new approach, Gestalt, is proposed to statefully capture and monitor activities between hosts and progressively assess possible network anomalies by multilevel behavior tracking, cross-level triggering and correlation, and a probabilistic inference model is proposed for intrusion assessment and detection. Such multilevel design provides a collective perspective to reveal more anomalies than individual levels. We show that Gestalt is robust and effective in detecting polymorphic, stealthy variants of known attacks. ©2010 IEEE.Anomaly detection; Attack accessment; Behavioral analysis; Finite state machine; Netwrok service[SDGs]SDG16Anomaly detection; Attack accessment; Behavioral analysis; Finite state machines; Netwrok service; Computer crime; Contour followers; Wireless networks; Wireless telecommunication systems; Intrusion detectionBehavior profiling for robust anomaly detectionconference paper10.1109/WCINS.2010.55418222-s2.0-77957670795https://www.scopus.com/inward/record.uri?eid=2-s2.0-77957670795&doi=10.1109%2fWCINS.2010.5541822&partnerID=40&md5=621d08ba6088e56a260e2a1499861882