Statistical Process Control for computer intrusion detection

被引:0
|
作者
Ye, N [1 ]
Emran, SM [1 ]
Li, MY [1 ]
Chen, Q [1 ]
机构
[1] Arizona State Univ, Tempe, AZ 85287 USA
来源
DISCEX'01: DARPA INFORMATION SURVIVABILITY CONFERENCE & EXPOSITION II, VOL I, PROCEEDINGS | 2001年
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper describes the architecture of a distributed, host-based Intrusion Detection System (IDS) that we have developed at the Information and Systems Assurance Laboratory (ISA), Arizona State University. Hence, we refer to this system as ISA-IDS. ISA-IDS is developed based on Statistical Process Control (SPC). In ISA-IDS we employ two intrusion detection techniques. One is an anomaly detection technique called Chi-square. Another is a misuse detection technique called Clustering. Each technique determines an Intrusion Warning (IW) level for each audit event. The IW levels from different intrusion detection techniques are then combined using a fusion technique into a composite IW level, 0 for normal, I for intrusive, and any value in between to signify the intrusiveness. In this paper we also present the intrusion detection performance of Chi-square and Clustering techniques.
引用
收藏
页码:3 / 14
页数:12
相关论文
共 50 条
  • [21] Network Statistics in Function of Statistical Intrusion Detection
    Cisar, Petar
    Cisar, Sanja Maravic
    COMPUTATIONAL INTELLIGENCE IN ENGINEERING, 2010, 313 : 27 - +
  • [22] Statistical Decision Making for Authentication and Intrusion Detection
    Dimitrakakis, Christos
    Mitrokotsa, Aikaterini
    EIGHTH INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND APPLICATIONS, PROCEEDINGS, 2009, : 409 - +
  • [23] Multilayer Statistical Intrusion Detection in Wireless Networks
    Mohamed Hamdi
    Amel Meddeb-Makhlouf
    Noureddine Boudriga
    EURASIP Journal on Advances in Signal Processing, 2009
  • [24] Taxonomy of statistical based anomaly detection techniques for intrusion detection
    Qayyum, A
    Islam, MH
    Jamil, M
    IEEE: 2005 International Conference on Emerging Technologies, Proceedings, 2005, : 270 - 276
  • [25] Research On Computer Intrusion Detection Based On Biotechnology
    Dai, Zun
    PROCEEDINGS OF THE 2017 5TH INTERNATIONAL CONFERENCE ON MECHATRONICS, MATERIALS, CHEMISTRY AND COMPUTER ENGINEERING (ICMMCCE 2017), 2017, 141 : 255 - 257
  • [26] Computer network intrusion detection software development
    Hashim, SJ
    Jumari, K
    Ismail, M
    Elektrik, JK
    Sistem, ED
    Kejuruteraan, F
    IEEE 2000 TENCON PROCEEDINGS, VOLS I-III: INTELLIGENT SYSTEMS AND TECHNOLOGIES FOR THE NEW MILLENNIUM, 2000, : B117 - B123
  • [27] A supervised clustering algorithm for computer intrusion detection
    Li, XY
    Ye, N
    KNOWLEDGE AND INFORMATION SYSTEMS, 2005, 8 (04) : 498 - 509
  • [28] Research on Computer Network Intrusion Detection System
    Sun, Bo
    PROCEEDINGS OF THE 2017 4TH INTERNATIONAL CONFERENCE ON MACHINERY, MATERIALS AND COMPUTER (MACMC 2017), 2017, 150 : 27 - 30
  • [29] A supervised clustering algorithm for computer intrusion detection
    Xiangyang Li
    Nong Ye
    Knowledge and Information Systems, 2005, 8 : 498 - 509