A Data Analysis-Based Approach for Detecting Intruders

被引:1
|
作者
Beghdad, Rachid [1 ]
Touati, Mohamed [1 ]
Berboucha, Mohamed Seghir [1 ]
机构
[1] Univ Bejaia, Fac Sci, Bejaia 06000, Algeria
来源
INFORMATION SECURITY JOURNAL | 2011年 / 20卷 / 4-5期
关键词
computer systems; linear discriminant analysis; intrusion detection; audit trail analysis; principal components analysis; Electre Tri; anomaly intrusion detection;
D O I
10.1080/19393555.2011.593611
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We introduce a novel anomaly intrusion detection method based on Linear Discriminant Analysis (LDA). This approach searches for those vectors in the underlying space that best discriminate among users' profile classes. The discrimination rules are based on linear combinations of the observed users' profiles, called discriminant factors. This new approach provides for the ability to learn and later determine whether a new profile does or does not correspond to those of known users. Unlike many researchers we used realistic data to learn the behaviors of four students' classes. After that we apply LDA to get an appropriate discrimination between the student classes. Thus one can easily determine if a new student is legitimate or not by projecting its profile onto the profile subspace. Simulations show that our approach outperforms both Principal Components Analysis (PCA) and Electre Tri methods.
引用
收藏
页码:194 / 209
页数:16
相关论文
共 50 条
  • [1] Detecting flaws and intruders with visual data analysis
    Teoh, ST
    Ma, KL
    Wu, SF
    Jankun-Kelly, TJ
    [J]. IEEE COMPUTER GRAPHICS AND APPLICATIONS, 2004, 24 (05) : 27 - 35
  • [2] A data envelopment analysis-based approach for data preprocessing
    Pendharkar, PC
    [J]. IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2005, 17 (10) : 1379 - 1388
  • [3] Clustering Analysis-Based Approach to Detecting Entity Mixture in Knowledge Bases
    Xie, Haihua
    Lu, Xiaoqing
    Tang, Zhi
    [J]. JCDL'18: PROCEEDINGS OF THE 18TH ACM/IEEE JOINT CONFERENCE ON DIGITAL LIBRARIES, 2018, : 395 - 396
  • [4] Data-Flow Analysis-Based Approach of Database Watermarking
    Rani, Sapana
    Kachhap, Preeti
    Halder, Raju
    [J]. ADVANCED COMPUTING AND SYSTEMS FOR SECURITY, VOL 2, 2016, 396 : 153 - 171
  • [5] A data envelopment analysis-based clustering approach under dynamic situations
    Kim, Nam Hyok
    He, Feng
    Zhang, Hongjie
    Hong, Kwon Ryong
    Ri, Kwang-Chol
    [J]. EUROPEAN JOURNAL OF OPERATIONAL RESEARCH, 2023, 311 (01) : 251 - 262
  • [6] Resistance analysis to intruders' evasion of detecting intrusion
    Yang, Jianhua
    Zhang, Yongzhong
    Huang, Shou-Hsuan Stephen
    [J]. INFORMATION SECURITY, PROCEEDINGS, 2006, 4176 : 383 - 397
  • [7] An integrated approach for analysis-based report generation
    Bollen, L
    Harrer, A
    Hoppe, HU
    [J]. IEEE INTERNATIONAL CONFERENCE ON ADVANCED LEARNING TECHNOLOGIES, PROCEEDINGS, 2004, : 1094 - 1095
  • [8] Detecting Intruders on the Nanoscale
    Soennichsen, Carsten
    [J]. SCIENCE, 2011, 332 (6036) : 1389 - 1390
  • [9] Detecting anomalies and intruders
    Prayote, Akara
    Compton, Paul
    [J]. AI 2006: ADVANCES IN ARTIFICIAL INTELLIGENCE, PROCEEDINGS, 2006, 4304 : 1084 - +
  • [10] A Microtopographic Feature Analysis-Based LiDAR Data Processing Approach for the Identification of Chu Tombs
    Wang, Shaohua
    Hu, Qingwu
    Wang, Fengzhu
    Ai, Mingyao
    Zhong, Ruofei
    [J]. REMOTE SENSING, 2017, 9 (09):