Network intrusion detection: Evaluating cluster, discriminant, and logit analysis

作者: V KATOS

DOI: 10.1016/J.INS.2007.02.034

关键词:

摘要: This paper evaluates the statistical methodologies of cluster analysis, discriminant and Logit analysis used in examination intrusion detection data. The research is based on a sample 1200 random observations for 42 variables KDD-99 database, that contains 'normal' 'bad' connections. results indicate more effective than or detection. Specifically, according to Kappa statistic makes full use all information contained confusion matrix, (K=0.629) has been ranked first, with second (K=0.583), third (K=0.460).

参考文章(30)
Klaus Robert Müller, Christin Schäfer, Pavel Laskov, Konrad Rieck, Klaus Robert Müller, Visualization of anomaly detection using prediction sensitivity SICHERHEIT 2005 - Sicherheit - Schutz und Zuverlassigkeit, Beitrage der 2. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft fur Informatik e.V. (GI)- 2nd Annual Meeting of the Department of Security of the Society for Informatics - Security. pp. 197- 208 ,(2005)
Richard B. Darlington, Regression and Linear Models ,(1990)
David Dagon, Xinzhou Qin, Guofei Gu, Wenke Lee, Julian Grizzard, John Levine, Henry Owen, HoneyStat: Local Worm Detection Using Honeypots recent advances in intrusion detection. pp. 39- 58 ,(2004) , 10.1007/978-3-540-30143-1_3
E Eskin, Andrew Arnold, Michael Prerau, Leonid Portnoy, Sal Stolfo, A GEOMETRIC FRAMEWORK FOR UNSUPERVISED ANOMALY DETECTION: DETECTING INTRUSIONS IN UNLABELED DATA APPLICATIONS OF DATA MINING IN COMPUTER SECURITY. pp. 0- 0 ,(2002) , 10.7916/D8D50TQT
Sushil Jajodia, Duminda Wijesekera, Recent advances in access control models Das'01 Proceedings of the fifteenth annual working conference on Database and application security. pp. 3- 15 ,(2001) , 10.1007/978-0-387-35587-0_1
M. Asaka, T. Onabura, T. Inoue, S. Goto, Remote attack detection method in IDA: MLSI-based intrusion detection using discriminant analysis symposium on applications and the internet. pp. 64- 73 ,(2002) , 10.1109/SAINT.2002.994451
Kurt M. Fanning, Kenneth O. Cogger, Neural network detection of management fraud using published financial data International Journal of Intelligent Systems in Accounting, Finance & Management. ,vol. 7, pp. 21- 41 ,(1998) , 10.1002/(SICI)1099-1174(199803)7:1<21::AID-ISAF138>3.0.CO;2-K
Menahem Friedman, Mark Last, Yaniv Makover, Abraham Kandel, Anomaly detection in web documents using crisp and fuzzy-based cosine clustering methodology Information Sciences. ,vol. 177, pp. 467- 475 ,(2007) , 10.1016/J.INS.2006.03.006
Aurobindo Sundaram, An introduction to intrusion detection ACM Crossroads Student Magazine. ,vol. 2, pp. 3- 7 ,(1996) , 10.1145/332159.332161