Statistical Process Control for computer intrusion detection

被引:0
|
作者
Ye, N [1 ]
Emran, SM [1 ]
Li, MY [1 ]
Chen, Q [1 ]
机构
[1] Arizona State Univ, Tempe, AZ 85287 USA
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper describes the architecture of a distributed, host-based Intrusion Detection System (IDS) that we have developed at the Information and Systems Assurance Laboratory (ISA), Arizona State University. Hence, we refer to this system as ISA-IDS. ISA-IDS is developed based on Statistical Process Control (SPC). In ISA-IDS we employ two intrusion detection techniques. One is an anomaly detection technique called Chi-square. Another is a misuse detection technique called Clustering. Each technique determines an Intrusion Warning (IW) level for each audit event. The IW levels from different intrusion detection techniques are then combined using a fusion technique into a composite IW level, 0 for normal, I for intrusive, and any value in between to signify the intrusiveness. In this paper we also present the intrusion detection performance of Chi-square and Clustering techniques.
引用
收藏
页码:3 / 14
页数:12
相关论文
共 50 条
  • [1] Statistical Process Control-Based Intrusion Detection and Monitoring
    Park, Yongro
    Baek, Seung Hyun
    Kim, Seong-Hee
    Tsui, Kwok-Leung
    QUALITY AND RELIABILITY ENGINEERING INTERNATIONAL, 2014, 30 (02) : 257 - 273
  • [2] Computer Aided Statistical Process Control
    Qin, XS
    Liu, JY
    Yan, XT
    PROCEEDINGS OF THE 2001 INTERNATIONAL CONFERENCE ON MANAGEMENT SCIENCE AND ENGINEERING, VOLS I AND II, 2001, : 370 - 373
  • [3] An Intrusion Detection System for Wireless Process Control Systems
    Roosta, Tanya
    Nilsson, Dennis K.
    Lindqvist, Ulf
    Valdes, Alfonso
    2008 FIFTH IEEE INTERNATIONAL CONFERENCE ON MOBILE AD-HOC AND SENSOR SYSTEMS, VOLS 1 AND 2, 2008, : 866 - +
  • [4] A Methodology to Teaching Statistical Process Control in Computer Courses
    Costa Furtado, Julio Cezar
    Bezerra Oliveira, Sandro Ronaldo
    PROCEEDINGS OF THE 13TH INTERNATIONAL CONFERENCE ON EVALUATION OF NOVEL APPROACHES TO SOFTWARE ENGINEERING, 2018, : 424 - 431
  • [5] A statistical Framework for Intrusion Detection System
    Kabir, Md Enamul
    Hu, Jiankun
    2014 11TH INTERNATIONAL CONFERENCE ON FUZZY SYSTEMS AND KNOWLEDGE DISCOVERY (FSKD), 2014, : 941 - 946
  • [6] PROPOSAL OF ALGORITHMS FOR STATISTICAL INTRUSION DETECTION
    Cisar, Petar
    Cisar, Sanja Maravic
    Ivkovic, Miodrag
    Milanov, Dusanka
    Markoski, Branko
    METALURGIA INTERNATIONAL, 2012, 17 (05): : 73 - 77
  • [7] Statistical intrusion detection in data networks
    Britos, José Daniel
    IEEE Latin America Transactions, 2007, 5 (05) : 373 - 380
  • [8] Design of the Computer Intrusion Detection System
    Liu, Hui
    PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON MANAGEMENT, EDUCATION, INFORMATION AND CONTROL, 2015, 125 : 747 - 751
  • [9] Mobile agents for computer intrusion detection
    Foo, SY
    Arradondo, M
    PROCEEDINGS OF THE THIRTY-SIXTH SOUTHEASTERN SYMPOSIUM ON SYSTEM THEORY, 2004, : 517 - 521
  • [10] Mobile agents for computer intrusion detection
    Foo, Simon Y.
    Arradondo, Michael
    Proc Annu Southeast Symp Syst Theory, 1600, (517-521):