Statistical Process Control for computer intrusion detection

被引:0
|
作者
Ye, N [1 ]
Emran, SM [1 ]
Li, MY [1 ]
Chen, Q [1 ]
机构
[1] Arizona State Univ, Tempe, AZ 85287 USA
来源
DISCEX'01: DARPA INFORMATION SURVIVABILITY CONFERENCE & EXPOSITION II, VOL I, PROCEEDINGS | 2001年
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper describes the architecture of a distributed, host-based Intrusion Detection System (IDS) that we have developed at the Information and Systems Assurance Laboratory (ISA), Arizona State University. Hence, we refer to this system as ISA-IDS. ISA-IDS is developed based on Statistical Process Control (SPC). In ISA-IDS we employ two intrusion detection techniques. One is an anomaly detection technique called Chi-square. Another is a misuse detection technique called Clustering. Each technique determines an Intrusion Warning (IW) level for each audit event. The IW levels from different intrusion detection techniques are then combined using a fusion technique into a composite IW level, 0 for normal, I for intrusive, and any value in between to signify the intrusiveness. In this paper we also present the intrusion detection performance of Chi-square and Clustering techniques.
引用
收藏
页码:3 / 14
页数:12
相关论文
共 50 条
  • [11] Computer Network Intrusion Detection and Countermeasures
    Xu, Liguo
    Chi, Jingyuan
    3RD INTERNATIONAL CONFERENCE ON SOCIAL SCIENCE, MANAGEMENT AND ECONOMICS (SSME 2017), 2017, : 438 - 443
  • [12] Structural Damage Detection Based on Statistical Process Control
    Sun, Huan-yu
    Zhang, Li-tao
    PROCEEDINGS OF 2018 IEEE 4TH INFORMATION TECHNOLOGY AND MECHATRONICS ENGINEERING CONFERENCE (ITOEC 2018), 2018, : 1545 - 1550
  • [13] Drowsiness Detection Using Multivariate Statistical Process Control
    Antunes, Ana Rita
    Braga, Ana Cristina
    Goncalves, Joaquim
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS, ICCSA 2022 WORKSHOPS, PT I, 2022, 13377 : 571 - 585
  • [14] A Process-Oriented Intrusion Detection Method for Industrial Control Systems
    Colbert, Edward
    Sullivan, Daniel
    Hutchinson, Steve
    Renard, Kenneth
    Smith, Sidney
    PROCEEDINGS OF THE 11TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS 2016), 2016, : 497 - 500
  • [15] Anomaly detection enhanced classification in computer intrusion detection
    Fugate, M
    Gattiker, JR
    PATTERN RECOGNITION WITH SUPPORT VECTOR MACHINES, PROCEEDINGS, 2002, 2388 : 186 - 197
  • [16] An Experimental Evaluation of a Teaching Approach for Statistical Process Control in Computer Courses
    Furtado, Julio
    Bezerra Oliveira, Sandro Ronaldo
    Chaves, Rafael Oliveira
    Telles, Adeildo
    Colares, Adolfo
    INTERNATIONAL JOURNAL OF INFORMATION AND COMMUNICATION TECHNOLOGY EDUCATION, 2021, 17 (01) : 154 - 171
  • [17] Multilayer Statistical Intrusion Detection in Wireless Networks
    Hamdi, Mohamed
    Meddeb-Makhlouf, Amel
    Boudriga, Noureddine
    EURASIP JOURNAL ON ADVANCES IN SIGNAL PROCESSING, 2009,
  • [18] Statistical traffic modeling for network intrusion detection
    Cabrera, JBD
    Ravichandran, B
    Mehra, RK
    8TH INTERNATIONAL SYMPOSIUM ON MODELING, ANALYSIS AND SIMULATION OF COMPUTER AND TELECOMMUNICATION SYSTEMS, PROCEEDINGS, 2000, : 466 - 473
  • [19] A novel statistical technique for intrusion detection systems
    Kabir, Enamul
    Hu, Jiankun
    Wang, Hua
    Zhuo, Guangping
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 79 : 303 - 318
  • [20] Evolving statistical rulesets for network intrusion detection
    Rastegari, Samaneh
    Hingston, Philip
    Lam, Chiou-Peng
    APPLIED SOFT COMPUTING, 2015, 33 : 348 - 359