<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>EVALUATING HOST-BASED INTRUSION DETECTION ON THE ADFA-WD AND ADFA-WD: SAA DATASETS*</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Simon C.K.</string-name>
          <email>conradsimon@hotmail.com</email>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Sochenkov I.V.</string-name>
          <email>sochenkov_iv@rudn.university</email>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Peoples' Friendship University of Russia</institution>
          ,
          <addr-line>Moscow</addr-line>
          ,
          <country country="RU">Russia</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Simon Conrad Kenyon, 5th year student of the "Fundamental Informatics and Information Technologies, Russian Peoples' Friendship University</institution>
          ,
          <addr-line>Saint Vincent and Grenadini</addr-line>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2010</year>
      </pub-date>
      <volume>6</volume>
      <fpage>409</fpage>
      <lpage>415</lpage>
      <abstract>
        <p>With the growth of the internet and the development of new technologies also originates advancements in methods of cyber-attacks such as zero-day and stealth attacks, a more effective method of network safety is essential for network stability for both personal use and businesses. This research paper will assess anomalous patterns of Normal Pattern and Abnormal Pattern comprised of system calls based on the Dynamic-Link Library. The two datasets assessed are designed on the Windows Operating System on a Host-based Intrusion Detection System; comprised of the Australian Defence force Windows Dataset (ADFA-WD) and Australian Defence Force Academy Windows Dataset: Stealth Attacks Addendum (ADFA-WD:SAA). The development of a binary feature space is developed based on the common vulnerabilities and exposures at the time of the creation of the dataset. The data mining techniques implemented are Support Vector Machine classifier with sigmoid and RBF kernels is compared to the Random Forest classifier. Host-based Intrusion Detection; machine learning; random forest; SVM, RBF; Sigmoid kernel.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>
        Currently, the Web is actively developing in its use, speed and the amount of that can be stored on it. In regard
to the growth of the network, the importance of network security increases, since effective information protection
is becoming one of the main tasks, both for business entities and individuals. With increased network protection,
we reduce the risk of threats to data protection, in particular [
        <xref ref-type="bibr" rid="ref1 ref19">1</xref>
        ]:
      </p>
      <p>1) Violations of the confidentiality: In spite of the fact that currently, there is a "removal of the corporate veil"
in regard to responsibilities of companies, which includes the disclosure of information to shareholders and
transparency of certain data that must be published in open sources. There are such information that should be
inaccessible to competitors (commercial secret) and to some employees (state secret), and personal data as a
whole.</p>
      <p>2) Data Manipulation: Even in a brief moment of a intrusion in a network, data can be manipulated, the victim
or company issues that could be insuperable for the Information System Staff to return to its original state.
Documents that were manipulated due to a hacker who attacked the system can cause mass corruption in data
which can cause an uproar in the inner working of the business be it immediately or years from now.</p>
      <p>3) Data destruction: Data is a priceless commodity for normal users and companies alike hence why the
importance of backup technology has been so widely used. What happens when this important data is destroyed
by a malicious act be it financial data, contracts, raw data, company secrets and the like. Destruction of data can
severely cripples the victim or company involved.</p>
      <p>
        Based on threats mentioned 1) Violations of the confidentiality, 2) Data Manipulation, 3) Data destruction and
the fact that Windows havs the highest market share, it is safe to state that Windows is the most dominant
Operating System (OS) on the market at present making Windows OS an optimal OS to do a synopsis on
vulnerability to cyberattacks. There is a need to create additional tools to ensure network security. Intrusion
detection system (IDS) is traditionally used in one of three forms: 1) Host-based Intrusion Detection System
(HIDS), Network based Intrusion Detection (NIDS), and a hybrid system that is a combination of HIDS and NIDS.
In this research paper, the system calls based on Windows Dynamic-Link Layer (DLL) to investigate in regard of
HIDS. In the present research work, the ability for the system to detect violations of rules established by the IDS
will be analysed due to patterns of system attributes to normal system actions (Normal Pattern) and vulnerable
attacks (Abnormal Pattern) in regard to [
        <xref ref-type="bibr" rid="ref2 ref2 ref20 ref20">2</xref>
        ]:
1) Australian Defence force Windows Dataset (ADFA-WD),
2) Australian Defence Force Academy Windows Dataset: Stealth Attacks Addendum (ADFA-WD:SAA).
      </p>
      <p>ADFA-WD and ADFA-WD:SAA are both datasets that are based on Windows OS HIDS they represent a new
milestone and standard in HIDS in regard to targeting zero-day and stealth attacks on Windows OS.</p>
      <p>
        The goal of this research is to solve the following problems:
1) To identify the accuracy that the HIDS can achieve with the help various machine learning algorithms.
2) The measurement of accuracy that is used is False Negative Rate (FNR), False Alarm Rate (FAR), Detection
Rate (DR), False Positive Rate (FPR) [
        <xref ref-type="bibr" rid="ref2 ref2 ref20 ref20 ref21 ref21 ref22 ref22 ref23 ref23 ref24 ref24 ref3 ref3 ref4 ref4 ref5 ref5 ref6 ref6">2-6</xref>
        ].
      </p>
      <p>3) Getting the highest DR possible while maintaining the lowest FAR possible.</p>
      <p>4) Acquiring a lowest possible processing time for each algorithm.</p>
    </sec>
    <sec id="sec-2">
      <title>2 Related Researches</title>
    </sec>
    <sec id="sec-3">
      <title>2.1 Development of the datasets from Australian Defence Academy</title>
      <p>
        In ADDA-WD, The 12 "zero-day" and stealth attacks vulnerabilities used in respect to the dataset are CVE:
20062961, CVE: 2004-1561, CVE: 2009-3843, CVE: 2008-4250, CVE: 2010-2729, CVE: 2011-4453, CVE: 2012-0003, CVE:
2010-2883, CVE: 2010-0806, EDB-ID: 18367, a virus based attack and Background usage (Normal). These attacks
are used because of the trends identified at the time against threats on Windows [
        <xref ref-type="bibr" rid="ref25 ref7">7</xref>
        ]. The focus of these attacks is
given to the TCP port, web applications, browsers and malicious applications.
      </p>
      <p>ADDA-WD:SAA contains four stealth attack theories: 1) Doppelganger , 2) Chimera Attack , 3) Chameleon
Attack (Network) 4) Chameleon Attack (Malware). All three stealth attack theories provide full interactivity with
the target attacks, and was based on replacing generic, non-stealth shellcode in an existing exploit skeleton with
the various stealth. The focus of these attacks is based on TCP port and on two targeted server programs were
Icecast V2.0 and CesarFTPV0.99g.</p>
      <p>The Dataset was collected on the Windows XP SP2 host. It had configured as FTP server, web server, the
Hotspot, wireless network or Ethernet network. An array of compounds and protocols is the standard working
network, which can become a victim of a cyber- attack.</p>
      <p>
        The purpose of the designed dataset is to provide a contemporary look at modern IDS, when compared with
earlier methods used in the IDS such as KDD99 [
        <xref ref-type="bibr" rid="ref10 ref10 ref11 ref12 ref12 ref28 ref28 ref29 ref30 ref30">10-12</xref>
        ] which are now being used less, even despite the fact that
they are effective.
      </p>
      <p>The idea of creating a standard for Windows IDS was due to the lack of credible modern methods of intrusion
detection and availability of a dataset for OS Windows.</p>
      <p>The choice of audit data: analyzes an array of DLL system calls, as these system calls can reflect the state in
which the HIDS is currently in. The system calls which are used DLL – Kernel32, ntdll, user32, comctl32, ws2_32,
mswsock, Msvcrt, msvcpp,ntoskrnl.
2.2 Types of machine learning algorithms, dedicated to the works of Creech, Borisanya and Patel, V.</p>
    </sec>
    <sec id="sec-4">
      <title>Hadera for Windows Australian Defense Academy</title>
      <p>
        The fundamental work and the design of the datasets were done in the dissertation of G. Creech. The ADFA-WD
and ADFA-WD:SAA who brought to science a new understanding of the IDS on Windows OS [
        <xref ref-type="bibr" rid="ref13 ref13 ref31 ref31">13</xref>
        ]. In that paper he
considered algorithms such as a hidden Markov model (HMM), Extreme Learning Machine (ELM) , support vector
machine (SVM).
      </p>
      <p>
        The joint study by Borisanya and Patel [
        <xref ref-type="bibr" rid="ref14 ref14 ref32 ref32">14</xref>
        ], also devoted to ADFA-WD, considered such algorithms as an
algorithm Naïve Bayes algorithm sequential minimal optimization (SMO), LIBSVM, algorithm
(IBK), as well as algorithms, KMeans, ZeroR, ONeR, JRIP, J48.
      </p>
      <p>
        In a joint paper by Haider J. Creech, G. and J. Xu Hu [
        <xref ref-type="bibr" rid="ref2 ref2 ref20 ref20">2</xref>
        ], which is dedicated to algorithms for data ADFA-WD, the
report focuses on algorithms such as SVM, K Nearest Neighbor (KNN) method, the method of Artificial Neural
Network (ANN), and a method of extreme learning machine algorithm Naïve Bayes.
      </p>
    </sec>
    <sec id="sec-5">
      <title>3 Methodology</title>
      <p>
        KDD99 [
        <xref ref-type="bibr" rid="ref15 ref33">15</xref>
        ] is one of the classic Linux datasets on IDS [
        <xref ref-type="bibr" rid="ref2 ref2 ref20 ref20">2</xref>
        ], which has attack types that have become obsolete in
terms of the approach to the attack type and do not represent the modern day approaches used [
        <xref ref-type="bibr" rid="ref16 ref16 ref34 ref34">16</xref>
        ]. Most of
today's work force and personal computers run Windows OS, which leads to the need for modern IDS dataset for
Windows, such as ADFA-WD (Table 1). The available dataset is in “.ghc” format.
      </p>
      <p>Diagram 1. Data Process:
instant t
VID
V1
V2
V3
V4
V5
V6
V7
V8
V9
V10
V11
V12
V13
VID
V1
V2
V3
V4
V5
V6
V7
V8
V9
V10
V11
V12
V13</p>
      <p>
        Data Design: Dataframes were designed and nam-WedD-T“RAADIFNA” where all data training data was
placed, “ADF-AWD-VALIDATION” where all validation data was pla-cWeDd,-ATATDAFCAK, where all attack data
dataset gathered [
        <xref ref-type="bibr" rid="ref17 ref17 ref35 ref35">17</xref>
        ]. In the ADFA-WD dataset it contains 9 attributes based on the Distinct Dynamic Link Count
(DDLLC) and the primary key. The before mentioned dataset which 9 attributes of were provided by distinct DLL
system calls; Kernel32, ntdll, user32, comctl32, ws2_32, mswsock, msvcrt, msvcpp, ntoskrnl, and then placed in a
table (Figure 1).
      </p>
      <p>Under this conditions the training and testing data contains 12 types of vulnerability attacks, with a binary
classification as 0, and normal activities that are classified as 1. The binary approach is used because of the
similarities between vulnerability attacks due to the attack being too precise to make a distinction in the class of
attacks. All of the 12 vulnerabilities are classified as attacks (anomalies). Any deviation from the normal class type
will be considered an attack. Testing was conducted using data ADFA-WD-VALIDATION, which are then followed
for classification results obtained from the data ADFA-WD-ATTACK.</p>
      <p>Key
1</p>
      <p>Kernel32
30</p>
      <p>Ntdll
1</p>
      <p>User2_32
0</p>
      <sec id="sec-5-1">
        <title>Comctl32 0 Ws2_32 0</title>
      </sec>
      <sec id="sec-5-2">
        <title>Mswsock 0</title>
      </sec>
      <sec id="sec-5-3">
        <title>Msvcrt 0</title>
      </sec>
      <sec id="sec-5-4">
        <title>Msvcpp 0</title>
      </sec>
      <sec id="sec-5-5">
        <title>Ntoskrnl 0</title>
        <p>The choice of classification methods: Classification Algorithm of Support Vector Machines – is a two
rudimentary variation of feature space, aimed at the solution of the problem of binary classification. We decided
to test the ability of two kernel functions to separate the attack and normal classes using the binary features:
Sigmoid and Radial basis function (RBF).</p>
        <p>
          The other machine learning method tested is the Random forest [
          <xref ref-type="bibr" rid="ref18 ref18 ref36 ref36">18</xref>
          ] – a classification algorithm, under which
there is the construction of a plurality of decision trees during a training class and excretion, which is a mode of
individual classes or regression trees.
        </p>
        <p>Construction of Classifiers: The decision parameters were selected for the algorithms. The classification has
been processed using Jupyter Notebook based on the desired parameters for classification.</p>
        <p>Test classification: using ADFA-WD-VALIDATION we can carry out an effective process of comparison of the
classification, which announced the results of predication in comparison with the level of accuracy of predicate
data.</p>
      </sec>
    </sec>
    <sec id="sec-6">
      <title>4 Evaluation and Discussion</title>
    </sec>
    <sec id="sec-7">
      <title>4.1 Problems of acquiring an effective dataset</title>
      <p>Optimization of the algorithm parameters: All weight classes were "balanced" to create a more accurate
representation of the classes in which there would be less samples compared with bulkier class.</p>
      <p>
        Cross-validation and Grid Search optimizes the parameters in order to create a better model for the algorithms
used. Cross-validation k-FOLD = 5 is used for all algorithms scoring parameter "Accuracy". Search parameters of
Grid Search vector: 'C': [
        <xref ref-type="bibr" rid="ref1 ref10 ref10 ref19 ref28 ref28">1,10,100, 1000</xref>
        ], 'gamma': [0.14], 'kernel': ['rbf'], 'decision_function_shape':['ovr'],
'class_weight':['balanced'] and setting method for random forest 'n_estimators': [
        <xref ref-type="bibr" rid="ref10 ref10 ref15 ref23 ref23 ref28 ref28 ref33 ref5 ref5">5,10,15,20,25,30,35,40,45,50</xref>
        ],
'max_depth':[
        <xref ref-type="bibr" rid="ref11 ref13 ref13 ref15 ref17 ref17 ref23 ref23 ref25 ref27 ref27 ref29 ref31 ref31 ref33 ref35 ref35 ref5 ref5 ref7 ref9 ref9">5,7, 9,11,13,15,17,19</xref>
        ],'min_samples_leaf': [
        <xref ref-type="bibr" rid="ref1 ref10 ref10 ref19 ref2 ref2 ref20 ref20 ref21 ref21 ref22 ref22 ref23 ref23 ref24 ref24 ref25 ref26 ref26 ref27 ref27 ref28 ref28 ref3 ref3 ref4 ref4 ref5 ref5 ref6 ref6 ref7 ref8 ref8 ref9 ref9">1,2,3,4,5,6,7,8, 9,10</xref>
        ], 'criterion': ['entropy', 'gini '],'
class_weight ':['balanced '].
      </p>
    </sec>
    <sec id="sec-8">
      <title>Algorithm</title>
      <p>SVM (RBF)
SVM (Sigmoid)
Random forest</p>
    </sec>
    <sec id="sec-9">
      <title>Detection</title>
    </sec>
    <sec id="sec-10">
      <title>Rate (DR)</title>
      <p>68%
71%
82%</p>
    </sec>
    <sec id="sec-11">
      <title>False</title>
      <p>positive Rate
(FPR)
71%
65%
82%</p>
    </sec>
    <sec id="sec-12">
      <title>False-negative Rate (FNR)</title>
    </sec>
    <sec id="sec-13">
      <title>False alarm Rate (FAR) 1% 1%</title>
      <p>10%
36%
33%
46%</p>
    </sec>
    <sec id="sec-14">
      <title>Processing Time (Seconds)</title>
      <p>0.59
0.63
.019</p>
      <p>DR – is a representation of the accuracy of the attack data, calculated from the total amount of exactly predicted
data of the attack, divided by the total number of data in said dataset. FPR represents an estimate of the total
number of normal activities predicted to be an attack, divided by the total number of hectares of normal activities
in this dataset. False Negative Rate is an estimate of the total number of attacks predicted as a normal action,
divided by the total number of attacks in the dataset. FAR is (FPR + FNR)/2</p>
      <p>With supervised learning, we were able to classify the attacks, used on the ADFA-WD and ADFA-WD:SAA. A
binary method implementation is due to similarities in the approach of the attack types. The DR of SVM RBF was
68%, Sigmoid was 71%, Random Forest was 82%, but the FAR was fixed at 33%, 36% and 46%, respectively, as
shown in Table 2 and Table 3, was built through the use of the confusion matrix (Table 4).</p>
      <p>In this paper, we were able to evaluate the system calls made on the DLL of the ADFA-WD. To evaluate the data
a binary classification is implemented due to similarities in attack types making multiclass insufficient for the
evaluation. SVM Algorithms (Sigmoid and RBF) though having a lower DR than Random Forest, it did achieve a
better FAR, balancing the class weight played a key difference in getting an optimal DR and FAR as when looking
at the 12 vulnerabilities and Normal Pattern.</p>
      <p>Исследование частично поддержано Российским фондом фундаментальных исследований,
проект 15-29-06031.</p>
      <p>The research was partially supported by Russian Foundation for Basic Research, project 15-29-06031.</p>
      <p>References</p>
      <p>URL:
// URL: http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html (д
наук, доцент
дружбы</p>
      <p>кафедры
народов,</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <surname>Sundaram</surname>
          </string-name>
          , K. Why is Network Security Important? // Stonecypher, L. (ed.) - 2010 [Jelektronnyj resurs] // URL: http://www.brighthub.com/computing/enterprise-security/articles/69275.aspx (data
          <source>obrashcheniya 15.10</source>
          .
          <year>2017</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <surname>Haider</surname>
          </string-name>
          et al.
          <article-title>Windows Based Datasets for Evaluation of Robustness of Host Based Intrusion Detection Systems (IDS) to Zero-Day and</article-title>
          Stealth Attacks // Future internet 20168,
          <fpage>29</fpage>
          . (
          <year>2016</year>
          )
          <article-title>-</article-title>
          С -18.
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <surname>Burke</surname>
          </string-name>
          et al.
          <article-title>Measurement of the False Positive Rate in a Screening Program for Human Immunodeficiency Virus Infections //</article-title>
          <source>The New England Journal of Medicine.319 - 1988 - С</source>
          .
          <fpage>961</fpage>
          -
          <lpage>964</lpage>
          . doi:
          <volume>10</volume>
          .1056/NEJM198810133191501.
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <surname>Wu</surname>
            <given-names>S.</given-names>
          </string-name>
          and
          <string-name>
            <surname>Banzhaf</surname>
            <given-names>W.</given-names>
          </string-name>
          <article-title>The use of computational intelligence in intrusion detection systems:</article-title>
          A Review // Applied Soft Computing 10 - 2010
          <source>- С</source>
          .
          <fpage>1</fpage>
          -
          <lpage>35</lpage>
          . doi:
          <volume>10</volume>
          .1016/j.asoc.
          <year>2009</year>
          .
          <volume>06</volume>
          .019.
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <surname>Wu</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          and
          <string-name>
            <surname>Yen</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          ,
          <source>Data mining-based intrusion detectors // Expert Systems with Applications 36</source>
          ,
          <string-name>
            <surname>Elsevier</surname>
            <given-names>Ltd</given-names>
          </string-name>
          - 2009
          <source>- С</source>
          .
          <fpage>5605</fpage>
          -
          <lpage>5612</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <surname>Manning</surname>
          </string-name>
          et al. Introduction to Information Retrieval // Cambridge University Press, Cambridge - 2008 -
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <given-names>Common</given-names>
            <surname>Vulnerabilities</surname>
          </string-name>
          and Exposures [Jelektronnyj resurs] // URL: http://cve.mitre.org/data/refs/refmap/ (
          <source>data obrashcheniya 15.10</source>
          .
          <year>2017</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <surname>Limin</surname>
          </string-name>
          , L. Launching
          <string-name>
            <surname>Return-Oriented Programming</surname>
          </string-name>
          Attacks against Randomized Relocatable Executables // In Trust,
          <source>Security and Privacy in Computing and Communications (Trust-Com) // 2011 IEEE 10th International Conference on 2011 - 2011 - С</source>
          .
          <fpage>37</fpage>
          -
          <lpage>44</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <surname>Prandini</surname>
            <given-names>M.</given-names>
          </string-name>
          and
          <string-name>
            <surname>Ramilli</surname>
            <given-names>M.</given-names>
          </string-name>
          <string-name>
            <surname>Return-Oriented</surname>
            <given-names>Programming</given-names>
          </string-name>
          /. Security Privacy, IEEE,
          <volume>10</volume>
          (
          <issue>6</issue>
          ). -
          <fpage>11</fpage>
          .
          <fpage>12</fpage>
          .2012 - С.
          <fpage>8</fpage>
          -
          <lpage>487</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <surname>Mahoney</surname>
            <given-names>M</given-names>
          </string-name>
          and
          <string-name>
            <surname>Chan</surname>
            <given-names>P.</given-names>
          </string-name>
          <article-title>An Analysis of the 1999 DARPA // Lincoln Laboratory Evaluation Data for Network Anomaly Detection</article-title>
          / In Recent Advance in Intrusion Detection volume
          <volume>2820</volume>
          of Lecture Notes in Computer Science. Springer Berlin - Heidelberg. - 2003
          <string-name>
            <surname>- С</surname>
          </string-name>
          .
          <fpage>22</fpage>
          -
          <lpage>0237</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <surname>McHugh J.Testing</surname>
          </string-name>
          <article-title>Intrusion Detection Systems: a critique of the 1998 and 1999 DARPA Intrusion Detection System evaluatio ns as performed by Lincoln Laboratory /</article-title>
          / ACM Trans. Inf. Syst. Secur.,
          <volume>3</volume>
          (
          <issue>4</issue>
          ) -
          <fpage>11</fpage>
          .
          <fpage>2000</fpage>
          - С.
          <fpage>26</fpage>
          -
          <lpage>294</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <surname>Owezarski P.A</surname>
          </string-name>
          <article-title>Database of Anomalous Traffic for Assessing ProfileBased IDS // In Traffic Monitoring and Analysis</article-title>
          , volume
          <volume>6003</volume>
          of Lecture Notes in Computer Science. Springer Berlin // Heidelberg - 2010
          <source>- С</source>
          .
          <fpage>5</fpage>
          -
          <lpage>972</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <surname>Creech</surname>
            <given-names>G</given-names>
          </string-name>
          .
          <article-title>Developing a high-accuracy cross platform Host-Based Intrusion Detection System capable of reliably detecting zero-day attacks //</article-title>
          <source>Ph.D. Dissertation</source>
          , University of New South Wales, Sydney -
          <fpage>2014</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <surname>Borisaniya</surname>
            <given-names>B.</given-names>
          </string-name>
          and
          <string-name>
            <surname>Patel</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          <article-title>Evaluation of Modified Vector Space Representation Using ADFA-LD and ADFA-WD Datasets //</article-title>
          <source>Journal of Information Security</source>
          , Vol.
          <volume>6</volume>
          -
          <fpage>07</fpage>
          .
          <fpage>2015</fpage>
          - С.
          <fpage>250</fpage>
          -
          <lpage>264</lpage>
          ,
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15. KDD Cup 1999 Data.
          <article-title>(</article-title>
          <year>1999</year>
          ) [Jelektronnyj resurs] // URL: http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.
          <source>html (data obrashcheniya 15.10</source>
          .
          <year>2017</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          16.
          <string-name>
            <surname>Creech</surname>
            <given-names>G.</given-names>
          </string-name>
          and
          <article-title>Hu J A semantic approach to host-based intrusion detection systems using contiguous and discontiguous system call patterns /</article-title>
          / IEEE Trans on Computers - 2014
          <source>- С</source>
          .
          <fpage>807</fpage>
          -
          <lpage>819</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          17.
          <string-name>
            <surname>Creech</surname>
            <given-names>G.</given-names>
          </string-name>
          and
          <article-title>Hu J. Generation of a New IDS Test Dataset: Time to Retire the KDD Collection // Wireless Communications</article-title>
          and Networking Conference (WCNC
          <year>2013</year>
          ), Shanghai,
          <fpage>7</fpage>
          -10
          <source>th April 2013 - С</source>
          .
          <fpage>4487</fpage>
          -
          <lpage>4492</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          18.
          <string-name>
            <surname>Breiman</surname>
            ,
            <given-names>L. Random</given-names>
          </string-name>
          <string-name>
            <surname>Forests</surname>
          </string-name>
          .
          <source>Machine Learning</source>
          <year>2001</year>
          .
          <volume>45</volume>
          (
          <issue>1</issue>
          )
          <string-name>
            <surname>- С</surname>
          </string-name>
          . -
          <volume>532</volume>
          . doi:
          <volume>10</volume>
          .1023/A:1010933404324
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          1.
          <string-name>
            <surname>Sundaram</surname>
          </string-name>
          , K. Why is Network Security Important? // Stonecypher, L. (ed.) - 2010 [электронный ресурс] // http://www.brighthub.com/computing/enterprise-security/articles/69275.aspx (датаброащения
          <volume>15</volume>
          .10.
          <year>2017</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          2.
          <string-name>
            <surname>Haider</surname>
          </string-name>
          et al.
          <article-title>Windows Based Datasets for Evaluation of Robustness of Host Based Intrusion Detection Systems (IDS) to Zero-Day and</article-title>
          Stealth Attacks // Future internet 20168,
          <fpage>29</fpage>
          . (
          <year>2016</year>
          )
          <article-title>-</article-title>
          С -18.
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          3.
          <string-name>
            <surname>Burke</surname>
          </string-name>
          et al.
          <article-title>Measurement of the False Positive Rate in a Screening Program for Human Immunodeficiency Virus Infections //</article-title>
          <source>The New England Journal of Medicine.319 - 1988 - С</source>
          .
          <fpage>961</fpage>
          -
          <lpage>964</lpage>
          . doi:
          <volume>10</volume>
          .1056/NEJM198810133191501.
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          4.
          <string-name>
            <surname>Wu</surname>
            <given-names>S.</given-names>
          </string-name>
          and
          <string-name>
            <surname>Banzhaf</surname>
            <given-names>W.</given-names>
          </string-name>
          <article-title>The use of computational intelligence in intrusion detection systems:</article-title>
          A Review // Applied Soft Computing 10 - 2010
          <source>- С</source>
          .
          <fpage>1</fpage>
          -
          <lpage>35</lpage>
          . doi:
          <volume>10</volume>
          .1016/j.asoc.
          <year>2009</year>
          .
          <volume>06</volume>
          .019.
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          5.
          <string-name>
            <surname>Wu</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          and
          <string-name>
            <surname>Yen</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          ,
          <source>Data mining-based intrusion detectors // Expert Systems with Applications 36</source>
          ,
          <string-name>
            <surname>Elsevier</surname>
            <given-names>Ltd</given-names>
          </string-name>
          - 2009
          <source>- С</source>
          .
          <fpage>5605</fpage>
          -
          <lpage>5612</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          6.
          <string-name>
            <surname>Manning</surname>
          </string-name>
          et al. Introduction to Information Retrieval // Cambridge University Press, Cambridge - 2008 -
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          7.
          <string-name>
            <given-names>Common</given-names>
            <surname>Vulnerabilities</surname>
          </string-name>
          and Exposures [электронный ресурс] // URL: http://cve.mitre.org/data/refs/refmap/ (
          <source>дата обращения 15.10</source>
          .
          <year>2017</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          8.
          <string-name>
            <surname>Limin</surname>
          </string-name>
          , L. Launching
          <string-name>
            <surname>Return-Oriented Programming</surname>
          </string-name>
          Attacks against Randomized Relocatable Executables // In Trust,
          <source>Security and Privacy in Computing and Communications (Trust-Com) // 2011 IEEE 10th International Conference on 2011 - 2011 - С</source>
          .
          <fpage>37</fpage>
          -
          <lpage>44</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          9.
          <string-name>
            <surname>Prandini</surname>
            <given-names>M.</given-names>
          </string-name>
          and
          <string-name>
            <surname>Ramilli</surname>
            <given-names>M.</given-names>
          </string-name>
          <string-name>
            <surname>Return-Oriented</surname>
            <given-names>Programming</given-names>
          </string-name>
          /. Security Privacy, IEEE,
          <volume>10</volume>
          (
          <issue>6</issue>
          ). -
          <fpage>11</fpage>
          .
          <fpage>12</fpage>
          .2012 - С.
          <fpage>8</fpage>
          -
          <lpage>487</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          10.
          <string-name>
            <surname>Mahoney</surname>
            <given-names>M</given-names>
          </string-name>
          and
          <string-name>
            <surname>Chan</surname>
            <given-names>P.</given-names>
          </string-name>
          <article-title>An Analysis of the 1999 DARPA // Lincoln Laboratory Evaluation Data for Network Anomaly Detection</article-title>
          / In Recent Advance in Intrusion Detection volume
          <volume>2820</volume>
          of Lecture Notes in Computer Science. Springer Berlin - Heidelberg. - 2003
          <string-name>
            <surname>- С</surname>
          </string-name>
          .
          <fpage>22</fpage>
          -
          <lpage>0237</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref29">
        <mixed-citation>
          11.
          <string-name>
            <surname>McHugh J.Testing</surname>
          </string-name>
          <article-title>Intrusion Detection Systems: a critique of the 1998 and 1999 DARPA Intrusion Detection System evaluations as performed by Lincoln Laboratory /</article-title>
          / ACM Trans. Inf. Syst. Secur.,
          <volume>3</volume>
          (
          <issue>4</issue>
          ) -
          <fpage>11</fpage>
          .
          <fpage>2000</fpage>
          - С.
          <fpage>26</fpage>
          -
          <lpage>294</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref30">
        <mixed-citation>
          12.
          <string-name>
            <surname>Owezarski P.A</surname>
          </string-name>
          <article-title>Database of Anomalous Traffic for Assessing ProfileBased IDS // In Traffic Monitoring and Analysis</article-title>
          , volume
          <volume>6003</volume>
          of Lecture Notes in Computer Science. Springer Berlin // Heidelberg - 2010
          <source>- С</source>
          .
          <fpage>5</fpage>
          -
          <lpage>972</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref31">
        <mixed-citation>
          13.
          <string-name>
            <surname>Creech</surname>
            <given-names>G</given-names>
          </string-name>
          .
          <article-title>Developing a high-accuracy cross platform Host-Based Intrusion Detection System capable of reliably detecting zero-day attacks //</article-title>
          <source>Ph.D. Dissertation</source>
          , University of New South Wales, Sydney -
          <fpage>2014</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref32">
        <mixed-citation>
          14.
          <string-name>
            <surname>Borisaniya</surname>
            <given-names>B.</given-names>
          </string-name>
          and
          <string-name>
            <surname>Patel</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          <article-title>Evaluation of Modified Vector Space Representation Using ADFA-LD and ADFA-WD Datasets //</article-title>
          <source>Journal of Information Security</source>
          , Vol.
          <volume>6</volume>
          -
          <fpage>07</fpage>
          .
          <fpage>2015</fpage>
          - С.
          <fpage>250</fpage>
          -
          <lpage>264</lpage>
          ,
        </mixed-citation>
      </ref>
      <ref id="ref33">
        <mixed-citation>
          15. KDD Cup 1999 Data.
          <article-title>(</article-title>
          <year>1999</year>
          ) [электронный ресурс]
          <source>обращения 15.10</source>
          .
          <year>2017</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref34">
        <mixed-citation>
          16.
          <string-name>
            <surname>Creech</surname>
            <given-names>G.</given-names>
          </string-name>
          and
          <article-title>Hu J A semantic approach to host-based intrusion detection systems using contiguous and discontiguous system call patterns /</article-title>
          / IEEE Trans on Computers - 2014
          <source>- С</source>
          .
          <fpage>807</fpage>
          -
          <lpage>819</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref35">
        <mixed-citation>
          17.
          <string-name>
            <surname>Creech</surname>
            <given-names>G.</given-names>
          </string-name>
          and
          <article-title>Hu J. Generation of a New IDS Test Dataset: Time to Retire the KDD Collection // Wireless Communications</article-title>
          and Networking Conference (WCNC
          <year>2013</year>
          ), Shanghai,
          <fpage>7</fpage>
          -10
          <source>th April 2013 - С</source>
          .
          <fpage>4487</fpage>
          -
          <lpage>4492</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref36">
        <mixed-citation>
          18.
          <string-name>
            <surname>Breiman</surname>
            ,
            <given-names>L. Random</given-names>
          </string-name>
          <string-name>
            <surname>Forests</surname>
          </string-name>
          .
          <source>Machine Learning</source>
          <year>2001</year>
          .
          <volume>45</volume>
          (
          <issue>1</issue>
          )
          <string-name>
            <surname>- С</surname>
          </string-name>
          . -
          <volume>532</volume>
          . doi:
          <volume>10</volume>
          .1023/A:1010933404324
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>