Statistical Process Control for computer intrusion detection

被引:0
|
作者
Ye, N [1 ]
Emran, SM [1 ]
Li, MY [1 ]
Chen, Q [1 ]
机构
[1] Arizona State Univ, Tempe, AZ 85287 USA
来源
DISCEX'01: DARPA INFORMATION SURVIVABILITY CONFERENCE & EXPOSITION II, VOL I, PROCEEDINGS | 2001年
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper describes the architecture of a distributed, host-based Intrusion Detection System (IDS) that we have developed at the Information and Systems Assurance Laboratory (ISA), Arizona State University. Hence, we refer to this system as ISA-IDS. ISA-IDS is developed based on Statistical Process Control (SPC). In ISA-IDS we employ two intrusion detection techniques. One is an anomaly detection technique called Chi-square. Another is a misuse detection technique called Clustering. Each technique determines an Intrusion Warning (IW) level for each audit event. The IW levels from different intrusion detection techniques are then combined using a fusion technique into a composite IW level, 0 for normal, I for intrusive, and any value in between to signify the intrusiveness. In this paper we also present the intrusion detection performance of Chi-square and Clustering techniques.
引用
收藏
页码:3 / 14
页数:12
相关论文
共 50 条
  • [31] Big data technology for computer intrusion detection
    Chen, Ying
    OPEN COMPUTER SCIENCE, 2023, 13 (01)
  • [32] An intelligent tutor for intrusion detection on computer systems
    Rowe, NC
    Schiavo, S
    COMPUTERS & EDUCATION, 1998, 31 (04) : 395 - 404
  • [33] Process performance monitoring and fault detection through multivariate statistical process control
    Morris, AJ
    Martin, EB
    (SAFEPROCESS'97): FAULT DETECTION, SUPERVISION AND SAFETY FOR TECHNICAL PROCESSES 1997, VOLS 1-3, 1998, : 1 - 14
  • [34] Testing and evaluating computer intrusion detection systems
    Durst, R
    Champion, T
    Witten, B
    Miller, E
    Spagnuolo, L
    COMMUNICATIONS OF THE ACM, 1999, 42 (07) : 53 - 61
  • [35] Research on Computer Network Intrusion Detection System
    Xia, Yong
    Lai, Min
    PROCEEDINGS OF THE 2016 6TH INTERNATIONAL CONFERENCE ON MACHINERY, MATERIALS, ENVIRONMENT, BIOTECHNOLOGY AND COMPUTER (MMEBC), 2016, 88 : 165 - 168
  • [36] Modeling computer attacks: An ontology for intrusion detection
    Undercoffer, J
    Joshi, A
    Pinkston, J
    RECENT ADVANCES IN INTRUSION DETECTION, PROCEEDINGS, 2003, 2820 : 113 - 135
  • [38] Human computer interaction based intrusion detection
    Yampolskiy, Roman V.
    INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY, PROCEEDINGS, 2007, : 837 - 842
  • [39] A Survey of Using Process Data and Features of Industrial Control Systems in Intrusion Detection
    Storm, Jon-Martin
    Hagen, Janne
    Toftegaard, Oyvind Anders Arntzen
    2021 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), 2021, : 2170 - 2177
  • [40] Statistical process control based fault detection of CHP units
    Thomson, M
    Twigg, PM
    Majeed, BA
    Ruck, N
    CONTROL ENGINEERING PRACTICE, 2000, 8 (01) : 13 - 20