期刊文献+

Network-based anomaly intrusion detection with numeric-and-nominal mixed data 被引量:1

Network-based anomaly intrusion detection with numeric-and-nominal mixed data
下载PDF
导出
摘要 Anomaly detection is a key element of intrusion detection systems and a necessary complement of widely used misuse intrusion detection systems. Data sources used by network intrusion detection, like network packets or connections, often contain both numeric and nominal features. Both of these features contain important information for intrusion detection. These two features, on the other hand, have different characteristics. This paper presents a new network based anomaly intrusion detection approach that works well by building profiles for numeric and nominal features in different ways. During training, for each numeric feature, a normal profile is build through statistical distribution inference and parameter estimation, while for each nominal feature, a normal profile is setup through statistical method. These profiles are used as detection models during testing to judge whether a data being tested is benign or malicious. Experiments with the data set of 1999 DARPA (defense advanced research project agency) intrusion detection evaluation show that this approach can detect attacks effectively. Anomaly detection is a key element of intrusion detection systems and a necessary complement of widely used misuse intrusion detection systems. Data sources used by network intrusion detection, like network packets or connections, often contain both numeric and nominal features. Both of these features contain important information for intrusion detection. These two features, on the other hand, have different characteristics. This paper presents a new network based anomaly intrusion detection approach that works well by building profiles for numeric and nominal features in different ways. During training, for each numeric feature, a normal profile is build through statistical distribution inference and parameter estimation, while for each nominal feature, a normal profile is setup through statistical method. These profiles are used as detection models during testing to judge whether a data being tested is benign or malicious. Experiments with the data set of 1999 DARPA (defense advanced research project agency) intrusion detection evaluation show that this approach can detect attacks effectively.
出处 《Journal of Shanghai University(English Edition)》 CAS 2006年第5期415-420,共6页 上海大学学报(英文版)
基金 Project supported by National Natural Science Foundation of China (Grant No .60373088) ,and National Defense Research Foun-dation of China (Grant No .4131605)
关键词 anomaly detection intrusion detection network security anomaly detection, intrusion detection, network security
  • 相关文献

参考文献10

  • 1S.Zanero,S. M. Savaresi.Unsupervised Learning Techniques for an Intrusion Detection System[].Proceedings of the ACM Symposium on Applied Computing.2004
  • 2Khaled,L,Rao,V. NSOM: A real-time network-based intrusion detection system using self-organizing maps . 2002
  • 3Ningning Wu.Audit data analysis and mining[]..2001
  • 4Juan,M,Estevez,T,Pedro,G.N3: A geometrical approach for network intrusion detection at the application layer[].Lecture Notes in Computer Science.2004
  • 5J. McHugh.Testing Intrusion Detection Systems: A Critique of the 1998 and 1999 DARPA Intrusion Detection System Evaluations as Performed by Lincoln Laboratory[].ACM Transactions on Information and System Security.2000
  • 6Liu,C,Wan,J. Probability and Mathematical Statistics . 1999
  • 7George,C C. Applied Probability and Statistical Methods . 1984
  • 8Edwin M K.Outliers and data mining:Findingexceptions in data[]..2002
  • 9Wenke Lee,Dong Xiong.Information-Theoretic Measures for Anomaly Detection[].Proceedings IEEE Symposium on Security and Privacy.2001
  • 10Denning D.An intrusion detection model[].IEEE Transactions on Software Engineering.1987

同被引文献8

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部