By Topic

Multivariate statistical analysis of audit trails for host-based intrusion detection

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

4 Author(s)
Ye, N. ; Arizona State Univ., Tempe, AZ, USA ; Emran, S.M. ; Qiang Chen ; Vilbert, S.

Intrusion detection complements prevention mechanisms, such as firewalls, cryptography, and authentication, to capture intrusions into an information system while they are acting on the information system. Our study investigates a multivariate quality control technique to detect intrusions by building a long-term profile of normal activities in information systems (norm profile) and using the norm profile to detect anomalies. The multivariate quality control technique is based on Hotelling's T2 test that detects both counterrelationship anomalies and mean-shift anomalies. The performance of the Hotelling's T 2 test is examined on two sets of computer audit data: a small data set and a large multiday data set. Both data sets contain sessions of normal and intrusive activities. For the small data set, the Hotelling's T2 test signals all the intrusion sessions and produces no false alarms for the normal sessions. For the large data set, the Hotelling's T2 test signals 92 percent of the intrusion sessions while producing no false alarms for the normal sessions. The performance of the Hotelling's T2 test is also compared with the performance of a more scalable multivariate technique-a chi-squared distance test

Published in:

Computers, IEEE Transactions on  (Volume:51 ,  Issue: 7 )