<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">EVALUATING HOST-BASED INTRUSION DETECTION ON THE ADFA-WD AND ADFA-WD</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">Simon</forename><forename type="middle">C K</forename><surname>Sochenkov</surname></persName>
							<affiliation key="aff0">
								<orgName type="institution">Peoples&apos; Friendship University of Russia</orgName>
								<address>
									<settlement>Moscow</settlement>
									<country key="RU">Russia</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Saa</forename><surname>Datasets</surname></persName>
							<affiliation key="aff0">
								<orgName type="institution">Peoples&apos; Friendship University of Russia</orgName>
								<address>
									<settlement>Moscow</settlement>
									<country key="RU">Russia</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">EVALUATING HOST-BASED INTRUSION DETECTION ON THE ADFA-WD AND ADFA-WD</title>
					</analytic>
					<monogr>
						<imprint>
							<date/>
						</imprint>
					</monogr>
					<idno type="MD5">40B67933A6EC139155D047013FF55B27</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2023-03-24T05:24+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<textClass>
				<keywords>
					<term>Host-based Intrusion Detection</term>
					<term>machine learning</term>
					<term>random forest</term>
					<term>SVM, RBF</term>
					<term>Sigmoid kernel</term>
				</keywords>
			</textClass>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>With the growth of the internet and the development of new technologies also originates advancements in methods of cyber-attacks such as zero-day and stealth attacks, a more effective method of network safety is essential for network stability for both personal use and businesses. This research paper will assess anomalous patterns of Normal Pattern and Abnormal Pattern comprised of system calls based on the Dynamic-Link Library. The two datasets assessed are designed on the Windows Operating System on a Host-based Intrusion Detection System; comprised of the Australian Defence force Windows Dataset (ADFA-WD) and Australian Defence Force Academy Windows Dataset: Stealth Attacks Addendum (ADFA-WD:SAA). The development of a binary feature space is developed based on the common vulnerabilities and exposures at the time of the creation of the dataset. The data mining techniques implemented are Support Vector Machine classifier with sigmoid and RBF kernels is compared to the Random Forest classifier.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>Симон К.К., Соченков И.В. </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Ключевые слова</head><p>Хостовая система обнаружения вторжений; машинное обучение; метод случайного леса; метод опорных векторов, радиальная базисная функция; cигмоидное ядро.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Introduction</head><p>Currently, the Web is actively developing in its use, speed and the amount of that can be stored on it. In regard to the growth of the network, the importance of network security increases, since effective information protection is becoming one of the main tasks, both for business entities and individuals. With increased network protection, we reduce the risk of threats to data protection, in particular <ref type="bibr">[1]</ref>:</p><p>1) Violations of the confidentiality: In spite of the fact that currently, there is a "removal of the corporate veil" in regard to responsibilities of companies, which includes the disclosure of information to shareholders and transparency of certain data that must be published in open sources. There are such information that should be inaccessible to competitors (commercial secret) and to some employees (state secret), and personal data as a whole.</p><p>2) Data Manipulation: Even in a brief moment of a intrusion in a network, data can be manipulated, the victim or company issues that could be insuperable for the Information System Staff to return to its original state. Documents that were manipulated due to a hacker who attacked the system can cause mass corruption in data which can cause an uproar in the inner working of the business be it immediately or years from now.</p><p>3) Data destruction: Data is a priceless commodity for normal users and companies alike hence why the importance of backup technology has been so widely used. What happens when this important data is destroyed by a malicious act be it financial data, contracts, raw data, company secrets and the like. Destruction of data can severely cripples the victim or company involved.</p><p>Based on threats mentioned 1) Violations of the confidentiality, 2) Data Manipulation, 3) Data destruction and the fact that Windows havs the highest market share, it is safe to state that Windows is the most dominant Operating System (OS) on the market at present making Windows OS an optimal OS to do a synopsis on vulnerability to cyberattacks. There is a need to create additional tools to ensure network security. Intrusion detection system (IDS) is traditionally used in one of three forms: 1) Host-based Intrusion Detection System (HIDS), Network based Intrusion Detection (NIDS), and a hybrid system that is a combination of HIDS and NIDS. In this research paper, the system calls based on Windows Dynamic-Link Layer (DLL) to investigate in regard of HIDS. In the present research work, the ability for the system to detect violations of rules established by the IDS will be analysed due to patterns of system attributes to normal system actions (Normal Pattern) and vulnerable attacks (Abnormal Pattern) in regard to <ref type="bibr">[2]</ref>:</p><p>1) Australian Defence force Windows Dataset (ADFA-WD), 2) Australian Defence Force Academy Windows Dataset: Stealth Attacks Addendum (ADFA-WD:SAA). ADFA-WD and ADFA-WD:SAA are both datasets that are based on Windows OS HIDS they represent a new milestone and standard in HIDS in regard to targeting zero-day and stealth attacks on Windows OS.</p><p>The goal of this research is to solve the following problems: 1) To identify the accuracy that the HIDS can achieve with the help various machine learning algorithms.</p><p>2) The measurement of accuracy that is used is False Negative Rate (FNR), False Alarm Rate (FAR), Detection Rate (DR), False Positive Rate (FPR) <ref type="bibr">[2]</ref><ref type="bibr">[3]</ref><ref type="bibr">[4]</ref><ref type="bibr">[5]</ref><ref type="bibr">[6]</ref>.</p><p>3) Getting the highest DR possible while maintaining the lowest FAR possible. 4) Acquiring a lowest possible processing time for each algorithm. ADDA-WD:SAA contains four stealth attack theories: 1) Doppelganger , 2) Chimera Attack , 3) Chameleon Attack (Network) 4) Chameleon Attack (Malware). All three stealth attack theories provide full interactivity with the target attacks, and was based on replacing generic, non-stealth shellcode in an existing exploit skeleton with the various stealth. The focus of these attacks is based on TCP port and on two targeted server programs were Icecast V2.0 and CesarFTPV0.99g.</p><p>The Dataset was collected on the Windows XP SP2 host. It had configured as FTP server, web server, the Hotspot, wireless network or Ethernet network. An array of compounds and protocols is the standard working network, which can become a victim of a cyber-attack.</p><p>The purpose of the designed dataset is to provide a contemporary look at modern IDS, when compared with earlier methods used in the IDS such as KDD99 <ref type="bibr">[10]</ref><ref type="bibr">[11]</ref><ref type="bibr">[12]</ref> which are now being used less, even despite the fact that they are effective.</p><p>The idea of creating a standard for Windows IDS was due to the lack of credible modern methods of intrusion detection and availability of a dataset for OS Windows. The choice of audit data: analyzes an array of DLL system calls, as these system calls can reflect the state in which the HIDS is currently in. The system calls which are used DLL -Kernel32, ntdll, user32, comctl32, ws2_32, mswsock, Msvcrt, msvcpp,ntoskrnl.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>2.2</head><p>Types of machine learning algorithms, dedicated to the works of Creech, Borisanya and Patel, V.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Hadera for Windows Australian Defense Academy</head><p>The fundamental work and the design of the datasets were done in the dissertation of G. Creech. The ADFA-WD and ADFA-WD:SAA who brought to science a new understanding of the IDS on Windows OS <ref type="bibr">[13]</ref>. In that paper he considered algorithms such as a hidden Markov model (HMM), Extreme Learning Machine (ELM) , support vector machine (SVM).</p><p>The joint study by Borisanya and Patel <ref type="bibr">[14]</ref>, also devoted to ADFA-WD, considered such algorithms as an algorithm Naïve Bayes algorithm sequential minimal optimization (SMO), LIBSVM, algorithm instant training (IBK), as well as algorithms, KMeans, ZeroR, ONeR, JRIP, J48.</p><p>In a joint paper by Haider J. Creech, G. and J. Xu Hu <ref type="bibr">[2]</ref>, which is dedicated to algorithms for data ADFA-WD, the report focuses on algorithms such as SVM, K Nearest Neighbor (KNN) method, the method of Artificial Neural Network (ANN), and a method of extreme learning machine algorithm Naïve Bayes.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3">Methodology</head><p>KDD99 <ref type="bibr">[15]</ref> is one of the classic Linux datasets on IDS <ref type="bibr">[2]</ref>, which has attack types that have become obsolete in terms of the approach to the attack type and do not represent the modern day approaches used <ref type="bibr">[16]</ref>. Most of today's work force and personal computers run Windows OS, which leads to the need for modern IDS dataset for Windows, such as ADFA-WD (Table <ref type="table" target="#tab_1">1</ref>). The available dataset is in ".ghc" format.  Data Design: Dataframes were designed and named "ADFA-WD-TRAIN" where all data training data was placed, "ADFA-WD-VALIDATION" where all validation data was placed, ADFA-WD-ATTACK, where all attack data dataset gathered <ref type="bibr">[17]</ref>. In the ADFA-WD dataset it contains 9 attributes based on the Distinct Dynamic Link Count (DDLLC) and the primary key. The before mentioned dataset which 9 attributes of were provided by distinct DLL system calls; Kernel32, ntdll, user32, comctl32, ws2_32, mswsock, msvcrt, msvcpp, ntoskrnl, and then placed in a table (Figure <ref type="figure" target="#fig_0">1</ref>).</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Diagram 1. Data Process: Table 1-3 consists of Windows OS vulnerabilities used in the ADFA-WD:</head><p>Under this conditions the training and testing data contains 12 types of vulnerability attacks, with a binary classification as 0, and normal activities that are classified as 1. The binary approach is used because of the similarities between vulnerability attacks due to the attack being too precise to make a distinction in the class of attacks. All of the 12 vulnerabilities are classified as attacks (anomalies). Any deviation from the normal class type will be considered an attack. Testing was conducted using data ADFA-WD-VALIDATION, which are then followed for classification results obtained from the data ADFA-WD-ATTACK.</p><formula xml:id="formula_0">Key Kernel32 Ntdll User2_32 Comctl32 Ws2_32 Mswsock Msvcrt Msvcpp Ntoskrnl 1 30 1 0 0 0 0 0 0 0 Figure 1.</formula></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Gathering the attributes provided by distinct DLL system calls</head><p>The choice of classification methods: Classification Algorithm of Support Vector Machines -is a two rudimentary variation of feature space, aimed at the solution of the problem of binary classification. We decided to test the ability of two kernel functions to separate the attack and normal classes using the binary features: Sigmoid and Radial basis function (RBF).</p><p>The other machine learning method tested is the Random forest <ref type="bibr">[18]</ref> -a classification algorithm, under which there is the construction of a plurality of decision trees during a training class and excretion, which is a mode of individual classes or regression trees.</p><p>Construction of Classifiers: The decision parameters were selected for the algorithms. The classification has been processed using Jupyter Notebook based on the desired parameters for classification.</p><p>Test classification: using ADFA-WD-VALIDATION we can carry out an effective process of comparison of the classification, which announced the results of predication in comparison with the level of accuracy of predicate data.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4">Evaluation and Discussion</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.1">Problems of acquiring an effective dataset</head><p>Optimization of the algorithm parameters: All weight classes were "balanced" to create a more accurate representation of the classes in which there would be less samples compared with bulkier class.</p><p>Cross-validation and Grid Search optimizes the parameters in order to create a better model for the algorithms used. Cross-validation k-FOLD = 5 is used for all algorithms scoring parameter "Accuracy". Search parameters of Grid Search vector: 'C': <ref type="bibr">[1,</ref><ref type="bibr">10,</ref><ref type="bibr">100</ref>, 1000], 'gamma': [0.14], 'kernel': ['rbf'], 'decision_function_shape':['ovr'], 'class_weight':['balanced'] and setting method for random forest 'n_estimators': <ref type="bibr">[5,</ref><ref type="bibr">10,</ref><ref type="bibr">15,</ref><ref type="bibr">20,</ref><ref type="bibr">25,</ref><ref type="bibr">30,</ref><ref type="bibr">35,</ref><ref type="bibr">40,</ref><ref type="bibr">45</ref>,50], 'max_depth': <ref type="bibr">[5,7, 9,11,13,15,17,</ref>  DR -is a representation of the accuracy of the attack data, calculated from the total amount of exactly predicted data of the attack, divided by the total number of data in said dataset. FPR represents an estimate of the total number of normal activities predicted to be an attack, divided by the total number of hectares of normal activities in this dataset. False Negative Rate is an estimate of the total number of attacks predicted as a normal action, divided by the total number of attacks in the dataset. FAR is (FPR + FNR)/2</p><p>With supervised learning, we were able to classify the attacks, used on the ADFA-WD and ADFA-WD:SAA. A binary method implementation is due to similarities in the approach of the attack types. The DR of SVM RBF was 68%, Sigmoid was 71%, Random Forest was 82%, but the FAR was fixed at 33%, 36% and 46%, respectively, as shown in Table <ref type="table" target="#tab_2">2</ref> and Table <ref type="table" target="#tab_3">3</ref>, was built through the use of the confusion matrix (Table <ref type="table" target="#tab_7">4</ref>). In regard to the ADFA-WD:SAA, The classification was done based on original training data of ADFA-WD , with the same DR as ADFA-WD.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Conclusion</head><p>In this paper, we were able to evaluate the system calls made on the DLL of the ADFA-WD. To evaluate the data a binary classification is implemented due to similarities in attack types making multiclass insufficient for the evaluation. SVM Algorithms (Sigmoid and RBF) though having a lower DR than Random Forest, it did achieve a better FAR, balancing the class weight played a key difference in getting an optimal DR and FAR as when looking at the 12 vulnerabilities and Normal Pattern.</p><p>Исследование частично поддержано Российским фондом фундаментальных исследований, проект 15-29-06031.</p><p>The research was partially supported by Russian Foundation for Basic Research, project 15-29-06031.</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head>1</head><label>1</label><figDesc>Development of the datasets from Australian Defence Academy In ADDA-WD, The 12 "zero-day" and stealth attacks vulnerabilities used in respect to the dataset are CVE: 2006-2961, CVE: 2004-1561, CVE: 2009-3843, CVE: 2008-4250, CVE: 2010-2729, CVE: 2011-4453, CVE: 2012-0003, CVE: 2010-2883, CVE: 2010-0806, EDB-ID: 18367, a virus based attack and Background usage (Normal). These attacks are used because of the trends identified at the time against threats on Windows [7]. The focus of these attacks is given to the TCP port, web applications, browsers and malicious applications.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0"><head></head><label></label><figDesc></figDesc><graphic coords="5,95.15,116.62,404.93,201.05" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_1"><head>Table 1 .</head><label>1</label><figDesc>ADFA-WD Attack Data</figDesc><table><row><cell cols="2">VID Vulnerability</cell><cell>Program</cell><cell>Trace Count</cell></row><row><cell>V1</cell><cell cols="2">CVE: 2006-2961 CeasarFTp 0.99g</cell><cell>454</cell></row><row><cell>V2</cell><cell>EDB-ID: 18367</cell><cell>XAMPP Lite v1.7.3</cell><cell>470</cell></row><row><cell>V3</cell><cell cols="2">CVE: 2004-1561 Icecastv2.0</cell><cell>382</cell></row><row><cell>V4</cell><cell cols="2">CVE: 2009-3843 Tomcast v6.0.20</cell><cell>418</cell></row><row><cell>V5</cell><cell cols="2">CVE: 2008-4250 OS SMB</cell><cell>355</cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_2"><head>Table 2 .</head><label>2</label><figDesc>ADFA-WD Validation Data</figDesc><table><row><cell>VID</cell><cell>Vulnerability</cell><cell>Program</cell><cell>Trace Count</cell></row><row><cell>V1</cell><cell>CVE: 2006-2961</cell><cell>CeasarFTp 0.99g</cell><cell>17</cell></row><row><cell>V2</cell><cell>EDB-ID: 18367</cell><cell>XAMPP Lite v1.7.3</cell><cell>105</cell></row><row><cell>V3</cell><cell>CVE: 2004-1561</cell><cell>Icecastv2.0</cell><cell>24</cell></row><row><cell>V4</cell><cell>CVE: 2009-3843</cell><cell>Tomcast v6.0.20</cell><cell>51</cell></row><row><cell>V5</cell><cell>CVE: 2008-4250</cell><cell>OS SMB</cell><cell>17</cell></row><row><cell>V6</cell><cell>CVE: 2010-2729</cell><cell>OS Print Spool</cell><cell>115</cell></row><row><cell>V7</cell><cell>CVE: 2011-4453</cell><cell>pMWiki v2.2.30</cell><cell>18</cell></row><row><cell>V8</cell><cell>CVE: 2012-0003</cell><cell>Wireless Karma</cell><cell>320</cell></row><row><cell>V9</cell><cell>CVE: 2010-2883</cell><cell>Adobe Reader 9.3.0</cell><cell>103</cell></row><row><cell>V10</cell><cell></cell><cell>Backdoor executable</cell><cell>127</cell></row><row><cell>V11</cell><cell>CVE: 2010-0806</cell><cell>IE v 6.0.2900.2180</cell><cell>242</cell></row><row><cell>V12</cell><cell></cell><cell>Infectious Media</cell><cell>610</cell></row><row><cell>V13</cell><cell>Normal</cell><cell>Background</cell><cell>17</cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_3"><head>Table 3 .</head><label>3</label><figDesc>ADFA-WD Training Data</figDesc><table><row><cell>VID</cell><cell>Vulnerability</cell><cell>Program</cell><cell>Trace Count</cell></row><row><cell>V1</cell><cell>CVE: 2006-2961</cell><cell>CeasarFTp 0.99g</cell><cell>22</cell></row><row><cell>V2</cell><cell>EDB-ID: 18367</cell><cell>XAMPP Lite v1.7.3</cell><cell>23</cell></row><row><cell>V3</cell><cell>CVE: 2004-1561</cell><cell>Icecastv2.0</cell><cell>19</cell></row><row><cell>V4</cell><cell>CVE: 2009-3843</cell><cell>Tomcast v6.0.20</cell><cell>20</cell></row><row><cell>V5</cell><cell>CVE: 2008-4250</cell><cell>OS SMB</cell><cell>12</cell></row><row><cell>V6</cell><cell>CVE: 2010-2729</cell><cell>OS Print Spool</cell><cell>29</cell></row><row><cell>V7</cell><cell>CVE: 2011-4453</cell><cell>pMWiki v2.2.30</cell><cell>21</cell></row><row><cell>V8</cell><cell>CVE: 2012-0003</cell><cell>Wireless Karma</cell><cell>28</cell></row><row><cell>V9</cell><cell>CVE: 2010-2883</cell><cell>Adobe Reader 9.3.0</cell><cell>29</cell></row><row><cell>V10</cell><cell></cell><cell>Backdoor executable</cell><cell>23</cell></row><row><cell>V11</cell><cell>CVE: 2010-0806</cell><cell>IE v 6.0.2900.2180</cell><cell>26</cell></row><row><cell>V12</cell><cell></cell><cell>Infectious Media</cell><cell>90</cell></row><row><cell>V13</cell><cell>Normal</cell><cell>Background</cell><cell>13</cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_5"><head>Table 2 .</head><label>2</label><figDesc>Results Data on Windows ADFA-WD</figDesc><table><row><cell>Algorithm</cell><cell>Detection Rate (DR)</cell><cell>False-positive Rate (FPR)</cell><cell>False-negative Rate (FNR)</cell><cell>False Rate (FAR) alarm</cell><cell>Processing Time (Seconds)</cell></row><row><cell>SVM (RBF)</cell><cell>68%</cell><cell>71%</cell><cell>1%</cell><cell>36%</cell><cell>0.59</cell></row><row><cell cols="2">SVM (Sigmoid) 71%</cell><cell>65%</cell><cell>1%</cell><cell>33%</cell><cell>0.63</cell></row><row><cell cols="2">Random forest 82%</cell><cell>82%</cell><cell>10%</cell><cell>46%</cell><cell>.019</cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_6"><head>Table 3 .</head><label>3</label><figDesc>Results Data on Windows ADFA-WD:SAA</figDesc><table><row><cell>Algorithm</cell><cell>Detection Rate</cell><cell>Processing Time</cell></row><row><cell>SVM (RBF)</cell><cell>68%</cell><cell>0.59</cell></row><row><cell>SVM (Sigmoid)</cell><cell>71%</cell><cell>0.63</cell></row><row><cell>Random forest</cell><cell>82%</cell><cell>.019</cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_7"><head>Table 4 .</head><label>4</label><figDesc>Confusion matrix</figDesc><table><row><cell>Actual</cell><cell>Predicated</cell><cell>Predicted</cell></row><row><cell>Classification</cell><cell>Normal</cell><cell>Attack</cell></row><row><cell>Normal</cell><cell>True Negative</cell><cell>False Positive</cell></row><row><cell>Attack</cell><cell>False Negative</cell><cell>True Positive</cell></row></table></figure>
		</body>
		<back>
			<div type="annex">
<div xmlns="http://www.tei-c.org/ns/1.0" />			</div>
			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<monogr>
		<title level="m" type="main">Why is Network Security Important</title>
		<author>
			<persName><forename type="first">K</forename><surname>Sundaram</surname></persName>
		</author>
		<ptr target="http://www.brighthub.com/computing/enterprise-security/articles/69275.aspx(dataobrashcheniya15." />
		<editor>Stonecypher, L.</editor>
		<imprint>
			<date type="published" when="2010-10">2010. 10.2017</date>
		</imprint>
	</monogr>
	<note>Jelektronnyj resurs</note>
</biblStruct>

<biblStruct xml:id="b1">
	<analytic>
		<title level="a" type="main">Windows Based Datasets for Evaluation of Robustness of Host Based Intrusion Detection Systems (IDS) to Zero -Day and Stealth Attacks</title>
		<author>
			<persName><surname>Haider</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Future internet</title>
		<imprint>
			<biblScope unit="volume">20168</biblScope>
			<biblScope unit="page" from="1" to="8" />
			<date type="published" when="2016">2016</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<analytic>
		<title level="a" type="main">Measurement of the False Positive Rate in a Screening Program for Human Immunodeficiency Virus Infections</title>
		<author>
			<persName><surname>Burke</surname></persName>
		</author>
		<idno type="DOI">10.1056/NEJM198810133191501</idno>
	</analytic>
	<monogr>
		<title level="j">The New England Journal of Medicine</title>
		<imprint>
			<biblScope unit="page" from="961" to="964" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<analytic>
		<title level="a" type="main">The use of computational intelligence in intrusion detection systems: A Review</title>
		<author>
			<persName><forename type="first">S</forename><surname>Wu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">W</forename><surname>Banzhaf</surname></persName>
		</author>
		<idno type="DOI">10.1016/j.asoc.2009.06.019</idno>
	</analytic>
	<monogr>
		<title level="j">Applied Soft Computing</title>
		<imprint>
			<biblScope unit="page" from="1" to="35" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<monogr>
		<title level="m" type="main">Data mining-based intrusion detectors // Expert Systems with Applications</title>
		<author>
			<persName><forename type="first">S</forename><surname>Wu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Yen</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2009">2009</date>
			<publisher>Elsevier Ltd</publisher>
			<biblScope unit="volume">36</biblScope>
			<biblScope unit="page" from="5605" to="5612" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<monogr>
		<author>
			<persName><surname>Manning</surname></persName>
		</author>
		<title level="m">Introduction to Information Retrieval</title>
				<meeting><address><addrLine>Cambridge -</addrLine></address></meeting>
		<imprint>
			<publisher>Cambridge University Press</publisher>
			<date type="published" when="2008">2008</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<monogr>
		<ptr target="http://cve.mitre.org/data/refs/refmap/(dataobrashcheniya15.10.2017" />
		<title level="m">Common Vulnerabilities and Exposures</title>
				<imprint/>
	</monogr>
	<note>Jelektronnyj resurs</note>
</biblStruct>

<biblStruct xml:id="b7">
	<analytic>
		<title level="a" type="main">Launching Return-Oriented Programming Attacks against Randomized Relocatable Executables</title>
		<author>
			<persName><forename type="first">L</forename><surname>Limin</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Trust, Security and Privacy in Computing and Communications (Trust-Com) // 2011 IEEE 10th International Conference on 2011 -2011</title>
				<imprint>
			<biblScope unit="page" from="37" to="44" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<analytic>
		<title level="a" type="main">Return-Oriented Programming</title>
		<author>
			<persName><forename type="first">M</forename><surname>Prandini</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Ramilli</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Security Privacy</title>
				<imprint>
			<biblScope unit="volume">10</biblScope>
			<biblScope unit="page" from="84" to="87" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b9">
	<analytic>
		<title level="a" type="main">An Analysis of the 1999 DARPA // Lincoln Laboratory Evaluation Data for Network Anomaly Detection / In Recent Advance in Intrusion Detection</title>
		<author>
			<persName><forename type="first">M</forename><surname>Mahoney</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Chan</forename><forename type="middle">P</forename></persName>
		</author>
	</analytic>
	<monogr>
		<title level="s">Lecture Notes in Computer Science</title>
		<imprint>
			<biblScope unit="volume">2820</biblScope>
			<biblScope unit="page" from="220" to="237" />
			<date type="published" when="2003">2003</date>
			<publisher>Springer</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b10">
	<analytic>
		<title level="a" type="main">Testing Intrusion Detection Systems: a critique of the 1998 and 1999 DARPA Intrusion Detection System evaluatio ns as performed by Lincoln Laboratory</title>
		<author>
			<persName><forename type="first">J</forename><surname>Mchugh</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">ACM Trans. Inf. Syst. Secur</title>
		<imprint>
			<biblScope unit="volume">3</biblScope>
			<biblScope unit="issue">4</biblScope>
			<biblScope unit="page" from="262" to="294" />
			<date type="published" when="2000">2000</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b11">
	<analytic>
		<title level="a" type="main">A Database of Anomalous Traffic for Assessing ProfileBased IDS // In Traffic Monitoring and Analysis</title>
		<author>
			<persName><forename type="first">P</forename><surname>Owezarski</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="s">Lecture Notes in Computer Science</title>
		<imprint>
			<biblScope unit="volume">6003</biblScope>
			<biblScope unit="page" from="59" to="72" />
			<date type="published" when="2010">2010</date>
			<publisher>Springer</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b12">
	<monogr>
		<author>
			<persName><forename type="first">G</forename><surname>Creech</surname></persName>
		</author>
		<title level="m">Developing a high-accuracy cross platform Host-Based Intrusion Detection System capable of reliably detecting zero-day attacks</title>
				<meeting><address><addrLine>Sydney -</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2014">2014</date>
		</imprint>
		<respStmt>
			<orgName>University of New South Wales</orgName>
		</respStmt>
	</monogr>
	<note type="report_type">Ph.D. Dissertation</note>
</biblStruct>

<biblStruct xml:id="b13">
	<analytic>
		<title level="a" type="main">Evaluation of Modified Vector Space Representation Using ADFA-LD and ADFA-WD Datasets</title>
		<author>
			<persName><forename type="first">B</forename><surname>Borisaniya</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Patel</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Journal of Information Security</title>
		<imprint>
			<biblScope unit="volume">6</biblScope>
			<biblScope unit="page" from="250" to="264" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b14">
	<monogr>
		<ptr target="http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html(dataobrashcheniya15.10" />
		<title level="m">KDD Cup 1999 Data</title>
				<imprint>
			<date type="published" when="1999">1999. 2017</date>
		</imprint>
	</monogr>
	<note>Jelektronnyj resurs</note>
</biblStruct>

<biblStruct xml:id="b15">
	<analytic>
		<title level="a" type="main">A semantic approach to host-based intrusion detection systems using contiguous and discontiguous system call patterns</title>
		<author>
			<persName><forename type="first">G</forename><surname>Creech</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Hu</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IEEE Trans on Computers</title>
		<imprint>
			<biblScope unit="page" from="807" to="819" />
			<date type="published" when="2014">2014</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b16">
	<analytic>
		<title level="a" type="main">Generation of a New IDS Test Dataset: Time to Retire the KDD Collection</title>
		<author>
			<persName><forename type="first">G</forename><surname>Creech</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Hu</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">// Wireless Communications and Networking Conference (WCNC 2013)</title>
				<meeting><address><addrLine>Shanghai</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2013-04-10">7-10 th April 2013 -</date>
			<biblScope unit="page" from="4487" to="4492" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b17">
	<analytic>
		<title level="a" type="main">Random Forests</title>
		<author>
			<persName><forename type="first">L</forename><surname>Breiman</surname></persName>
		</author>
		<idno type="DOI">10.1023/A:1010933404324Литература</idno>
	</analytic>
	<monogr>
		<title level="j">Machine Learning</title>
		<imprint>
			<biblScope unit="volume">45</biblScope>
			<biblScope unit="issue">1</biblScope>
			<biblScope unit="page" from="5" to="32" />
			<date type="published" when="2001">2001</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b18">
	<monogr>
		<title level="m" type="main">Why is Network Security Important</title>
		<author>
			<persName><forename type="first">K</forename><surname>Sundaram</surname></persName>
		</author>
		<ptr target="http://www.brighthub.com/computing/enterprise-security/articles/69275.aspx(датаобращения15." />
		<editor>Stonecypher, L.</editor>
		<imprint>
			<date type="published" when="2010-10">2010. 10.2017</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b19">
	<analytic>
		<title level="a" type="main">Windows Based Datasets for Evaluation of Robustness of Host Based Intrusion Detection Systems (IDS) to Zero -Day and Stealth Attacks</title>
		<author>
			<persName><surname>Haider</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Future internet</title>
		<imprint>
			<biblScope unit="volume">20168</biblScope>
			<biblScope unit="page" from="1" to="8" />
			<date type="published" when="2016">2016</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b20">
	<analytic>
		<title level="a" type="main">Measurement of the False Positive Rate in a Screening Program for Human Immunodeficiency Virus Infections</title>
		<author>
			<persName><surname>Burke</surname></persName>
		</author>
		<idno type="DOI">10.1056/NEJM198810133191501</idno>
	</analytic>
	<monogr>
		<title level="j">The New England Journal of Medicine</title>
		<imprint>
			<biblScope unit="page" from="961" to="964" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b21">
	<analytic>
		<title level="a" type="main">The use of computational intelligence in intrusion detection systems: A Review</title>
		<author>
			<persName><forename type="first">S</forename><surname>Wu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">W</forename><surname>Banzhaf</surname></persName>
		</author>
		<idno type="DOI">10.1016/j.asoc.2009.06.019</idno>
	</analytic>
	<monogr>
		<title level="j">Applied Soft Computing</title>
		<imprint>
			<biblScope unit="page" from="1" to="35" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b22">
	<monogr>
		<title level="m" type="main">Data mining-based intrusion detectors // Expert Systems with Applications</title>
		<author>
			<persName><forename type="first">S</forename><surname>Wu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Yen</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2009">2009</date>
			<publisher>Elsevier Ltd</publisher>
			<biblScope unit="volume">36</biblScope>
			<biblScope unit="page" from="5605" to="5612" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b23">
	<monogr>
		<author>
			<persName><surname>Manning</surname></persName>
		</author>
		<title level="m">Introduction to Information Retrieval</title>
				<meeting><address><addrLine>Cambridge -</addrLine></address></meeting>
		<imprint>
			<publisher>Cambridge University Press</publisher>
			<date type="published" when="2008">2008</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b24">
	<monogr>
		<title level="m" type="main">Common Vulnerabilities and Exposures</title>
		<ptr target="http://cve.mitre.org/data/refs/refmap/(датаобращения15.10.2017" />
		<imprint/>
	</monogr>
</biblStruct>

<biblStruct xml:id="b25">
	<analytic>
		<title level="a" type="main">Launching Return-Oriented Programming Attacks against Randomized Relocatable Executables</title>
		<author>
			<persName><forename type="first">L</forename><surname>Limin</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Trust, Security and Privacy in Computing and Communications (Trust-Com) // 2011 IEEE 10th International Conference on 2011 -2011</title>
				<imprint>
			<biblScope unit="page" from="37" to="44" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b26">
	<analytic>
		<title level="a" type="main">Return-Oriented Programming</title>
		<author>
			<persName><forename type="first">M</forename><surname>Prandini</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Ramilli</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Security Privacy</title>
				<imprint>
			<biblScope unit="volume">10</biblScope>
			<biblScope unit="page" from="84" to="87" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b27">
	<analytic>
		<title level="a" type="main">An Analysis of the 1999 DARPA // Lincoln Laboratory Evaluation Data for Network Anomaly Detection / In Recent Advance in Intrusion Detection</title>
		<author>
			<persName><forename type="first">M</forename><surname>Mahoney</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Chan</forename><forename type="middle">P</forename></persName>
		</author>
	</analytic>
	<monogr>
		<title level="s">Lecture Notes in Computer Science</title>
		<imprint>
			<biblScope unit="volume">2820</biblScope>
			<biblScope unit="page" from="220" to="237" />
			<date type="published" when="2003">2003</date>
			<publisher>Springer</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b28">
	<analytic>
		<title level="a" type="main">Testing Intrusion Detection Systems: a critique of the 1998 and 1999 DARPA Intrusion Detection System evaluations as performed by Lincoln Laboratory</title>
		<author>
			<persName><forename type="first">J</forename><surname>Mchugh</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">ACM Trans. Inf. Syst. Secur</title>
		<imprint>
			<biblScope unit="volume">3</biblScope>
			<biblScope unit="issue">4</biblScope>
			<biblScope unit="page" from="262" to="294" />
			<date type="published" when="2000">2000</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b29">
	<analytic>
		<title level="a" type="main">A Database of Anomalous Traffic for Assessing ProfileBased IDS // In Traffic Monitoring and Analysis</title>
		<author>
			<persName><forename type="first">P</forename><surname>Owezarski</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="s">Lecture Notes in Computer Science</title>
		<imprint>
			<biblScope unit="volume">6003</biblScope>
			<biblScope unit="page" from="59" to="72" />
			<date type="published" when="2010">2010</date>
			<publisher>Springer</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b30">
	<monogr>
		<author>
			<persName><forename type="first">G</forename><surname>Creech</surname></persName>
		</author>
		<title level="m">Developing a high-accuracy cross platform Host-Based Intrusion Detection System capable of reliably detecting zero-day attacks</title>
				<meeting><address><addrLine>Sydney -</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2014">2014</date>
		</imprint>
		<respStmt>
			<orgName>University of New South Wales</orgName>
		</respStmt>
	</monogr>
	<note type="report_type">Ph.D. Dissertation</note>
</biblStruct>

<biblStruct xml:id="b31">
	<analytic>
		<title level="a" type="main">Evaluation of Modified Vector Space Representation Using ADFA-LD and ADFA-WD Datasets</title>
		<author>
			<persName><forename type="first">B</forename><surname>Borisaniya</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Patel</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Journal of Information Security</title>
		<imprint>
			<biblScope unit="volume">6</biblScope>
			<biblScope unit="page" from="250" to="264" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b32">
	<monogr>
		<ptr target="http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html(датаобращения15.10" />
		<title level="m">KDD Cup 1999 Data</title>
				<imprint>
			<date type="published" when="1999">1999. 2017</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b33">
	<analytic>
		<title level="a" type="main">A semantic approach to host-based intrusion detection systems using contiguous and discontiguous system call patterns</title>
		<author>
			<persName><forename type="first">G</forename><surname>Creech</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Hu</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IEEE Trans on Computers</title>
		<imprint>
			<biblScope unit="page" from="807" to="819" />
			<date type="published" when="2014">2014</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b34">
	<analytic>
		<title level="a" type="main">Generation of a New IDS Test Dataset: Time to Retire the KDD Collection</title>
		<author>
			<persName><forename type="first">G</forename><surname>Creech</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Hu</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">// Wireless Communications and Networking Conference (WCNC 2013)</title>
				<meeting><address><addrLine>Shanghai</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2013-04-10">7-10 th April 2013 -</date>
			<biblScope unit="page" from="4487" to="4492" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b35">
	<analytic>
		<title level="a" type="main">Random Forests</title>
		<author>
			<persName><forename type="first">L</forename><surname>Breiman</surname></persName>
		</author>
		<idno type="DOI">10.1023/A:1010933404324</idno>
	</analytic>
	<monogr>
		<title level="j">Machine Learning</title>
		<imprint>
			<biblScope unit="volume">45</biblScope>
			<biblScope unit="issue">1</biblScope>
			<biblScope unit="page" from="5" to="32" />
			<date type="published" when="2001">2001</date>
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
