Computer Intrusion Detection Through EWMA for Autocorrelated and Uncorrelated Data

Size: px
Start display at page:

Download "Computer Intrusion Detection Through EWMA for Autocorrelated and Uncorrelated Data"

Transcription

1 IEEE TRANSACTIONS ON RELIABILITY, VOL. 52, NO. 1, MARCH Computer Intrusion Detection Through EWMA for Autocorrelated and Uncorrelated Data Nong Ye, Senior Member, IEEE, Sean Vilbert, and Qiang Chen Abstract Reliability and quality of service from information systems has been threatened by cyber intrusions. To protect information systems from intrusions and thus assure reliability and quality of service, it is highly desirable to develop techniques that detect intrusions. Many intrusions manifest in anomalous changes in intensity of events occurring in information systems. In this study, we apply, test, and compare two EWMA techniques to detect anomalous changes in event intensity for intrusion detection: EWMA for autocorrelated data and EWMA for uncorrelated data. Different parameter settings and their effects on performance of these EWMA techniques are also investigated to provide guidelines for practical use of these techniques. Index Terms Anomaly detection, computer audit data, exponentially weighted moving average (EWMA), information assurance, intrusion detection. ACRONYMS 1 AFRL-Rome U.S. Air Force Research Lab - Rome, NY ASU-ISAL Arizona State University - Information and Systems Assurance Lab. BSM basic security module CPU central processing unit CUSUM cumulative sum DARPA U.S. Defense Advanced Research Projects Agency EWMA exponentially weighted moving average EWMV exponentially weighted moving variance ID identification MIT-LL Massachusetts Inst. of Technology - Lincoln Lab. LCL lower control limit NIDES next-generation intrusion detection expert system OS operating system QoS quality of service SPARC a specific model of Sun work-stations SPC statistical process control UCL upper control limit UNIX UNIX OS for computers, e.g., Sun work-stations WinNT Windows-NT OS for personal computers Manuscript received July 3, 2000; revised May 15, This work was supported in part by the U.S. Defense Advanced Research Project Agency (DARPA)/Air Force Research Laboratory - Rome (AFRL-Rome) under Grant F Responsible Editor: J. H. Lambert. N. Ye is with the Information and Systems Assurance Laboratory, Arizona State University, Tempe, AZ USA ( NongYe@asu.edu). S. Vilbert and Q. Chen are with the Department of Industrial Engineering, Arizona State University, Tempe, AZ USA. Digital Object Identifier /TR The singular and plural of an acronym are always spelled the same. LCL UCL LCL UCL LCL UCL NOTATION time or identification of an observation event intensity by counting the number of events per second parameter in an -period moving average system time of event observation of the smoothed event intensity for event EWMA statistic for observation parameter to determine the EWMA statistic mean of standard deviation of mean of standard deviation of LCL of UCL of 1-step-ahead prediction error standard deviation of estimated standard deviation of LCL of UCL of parameter to determine LCL and UCL LCL of UCL of parameter to determine the smoothed-variance of smoothing constant to determine the. I. INTRODUCTION INTRUSIONS into information systems have presented important threats to reliability and QoS of systems, causing faults and failures in systems, and interrupting services to users [1] [4]. Intrusions can take many forms: denying services by flooding system resources, e.g., communication channels, servers, memory and CPU, rapidly propagating a virus or worm, gaining privileges of root users to perform malicious actions, etc. To protect information systems from intrusions and thus assure reliability and QoS of systems, it is highly desirable to develop techniques that detect intrusions into information systems in real time while intrusive activities are occurring. This paper focuses on intrusion-detection techniques for assuring reliability and QoS of information systems. There are extensive studies on faults and failures in information systems in the reliability community, covering software reliability [5], classification of faults [5], [6], fault detection /03$ IEEE

2 76 IEEE TRANSACTIONS ON RELIABILITY, VOL. 52, NO. 1, MARCH 2003 [7], [8], and fault-tolerant system design [9] [12]. However, intrusions into information systems, which account for many real-world reliability incidents and QoS problems in information systems, have not been widely studied using theories and techniques of quality and reliability engineering. Existing intrusion detection techniques [13] [35] are mostly based on artificial intelligence techniques such as: expert systems, formal logic, artificial neural networks, data mining, pattern matching, etc. A detailed review of existing intrusion detection techniques is in [13]. In general, existing intrusion detection techniques fall into 2 categories: signature-recognition and anomaly-detection [13], [14]. Signature-recognition techniques [15] [20], also referred to as misuse detection in [13], [14], match current activities in an information system with signatures of known intrusions, and signal intrusions when there is a match. Strings, production rules, colored Petri nets, state transition diagrams, decision trees, and cluster structures have been used to represent and store intrusion signatures. Anomaly detection techniques build a profile of activities in an information system in a usual operation condition a norm profile, and detect differences from the norm profile as anomalies or possible intrusions [21] [35]. Strings, formal logic, artificial neural networks, and frequency histograms have been used to represent the norm profile. ASU-ISAL has been investigating intrusions and their impacts on quality/reliability engineering of information systems. Several intrusion detection techniques, have been developed, based on SPC theories and techniques [19] [28]. This paper presents that work on applying one kind of SPC techniques, EWMA, to intrusion detection for monitoring and detecting intrusions that manifest through anomalous changes in intensity of events in an information system. Many intrusions into information systems manifest through the -significantly increased or decreased intensity of events occurring in information systems. For example, in typical denial-of-service attacks, an overwhelming number of service requests can be sent to a server, e.g., a web server, of an information system over a short period of time to deplete the computational resource in the server and thus deny the server s ability to respond to users service requests. Such denial-of-service attacks increase the intensity of events on the server. In many virus or worm attacks through servers, the number of s received over a short period of time also increases abruptly during the attacks. Intruders who have gained super-user privileges can disable many resources in the information system, resulting in the abruptly decreased intensity of events. Therefore, the early detection of -significant changes in the event intensity can help stop many intrusions early to protect information systems and assure reliability and QoS of information systems. The event intensity is the number of events per time unit. It can be considered as a continuous-value variable measuring activities in an information system. Existing work on monitoring a single continuous-value variable of activities (e.g., the intensity of events) for intrusion detection is mainly based on an anomaly detection technique developed for NIDES [33], [34]. This technique divides values of a continuous-value variable into bins, computes the frequency of activities falling into each bin, and uses the frequency histogram of various bins from long-term normal activities as the norm profile to detect large deviations of current activities from the norm profile based on some intuitive statistics (called statistic and statistic). The technique is not robust to the -nonnormality of data. This paper applies EWMA techniques, which are robust to the -nonnormality of data, to intrusion detection for monitoring and detecting -significant changes in the event intensity. Section II reviews a variety of EWMA techniques, and describes 2 EWMA techniques that are investigated in this study (EWMA for autocorrelated data and EWMA for uncorrelated data). Section III gives detailed information about the data of events used in this study, and the application of the EWMA techniques to this set of data for intrusion detection. Section IV presents the testing results, and discusses the effects of various parameter settings for the EWMA techniques on performance of these techniques. II. EWMA TECHNIQUES SPC techniques have typically been used for monitoring and controlling quality of anufacturing processes. SPC techniques can be univariate or multivariate, and detect changes in process mean (mean shifts), process variance (variance changes), relationship among multiple variables (counter-relationship), etc. [36], [37]. This paper focuses on detecting -significant changes of event intensity for intrusion detection. The event intensity is a single variable measuring 1 characteristic of events in an information system. Hence, this paper considers only univariate SPC techniques to detect mean shifts in the event intensity as anomalies or possible intrusions. Shewhart control charts, CUSUM control charts, and EWMA control charts are univariate SPC techniques that are typically used to detect mean shifts [36] [42]. EWMV control charts [37], [43] are designed to detect variance changes, but can also be sensitive to mean shifts. EWMA control charts are robust to the -nonnormality of data [37], [39]. Since the -normality of the intensity of events occurring in an information system can not be guaranteed, only EWMA control charts are considered in this study. EWMA was first suggested in [39]. More recent descriptions of EWMA are in [37], [38]. A description of multivariate EWMA is in [44]. If data contain a sequence of uncorrelated process observations,, then the EWMA control chart plots, computed as [37]: The and of are [37]: (1) (2) (3)

3 YE et al.: COMPUTER INTRUSION DETECTION THROUGH EWMA FOR AUTOCORRELATED AND UNCORRELATED DATA 77 and can be estimated from training data before testing. The LCL and UCL for the EWMA control chart are [37]: UCL (4) For the 5% -significance level,.if falls outside the LCL and UCL, an anomaly is detected and an alarm signal is generated. If data contain a sequence of autocorrelated process observations,, then the EWMA statistic in (1) can be used to provide a 1-step-ahead prediction model of autocorrelated data when the process mean does not drift too quickly [40]. The 1-step-ahead prediction for is. The is [40]: (5) The in (1) can be set by minimizing the sum of squared 1-stepahead prediction errors on the training data [40], or in a different way. The are -independently distributed with the mean, and standard deviation =. The EWMA control-chart plots. The LCL and UCL are [40]: LCL UCL (6) The EWMA control chart on is equivalent to the EWMA control chart on with [40]: LCL UCL (7) for the 5% -significance level; can be estimated by calculating a smoothed variance [40]: (8) Reference [40] suggests that smaller values of are preferred. Other variations of EWMA for autocorrelated data are in [40]. Events in an information system are usually autocorrelated, because users usually carry out a series of related commands in order to complete a given task. Hence, data of event intensity in an information system can be autocorrelated. In this study, both EWMA for autocorrelated data and EWMA for uncorrelated data are applied to data of event intensity in an information system. The 2 EWMA techniques are compared with regard to their performance for intrusion detection. III. APPLICATION This section describes the intrusion-detection problem, including the: data source, observation of event intensity, training data, testing data, application of the EWMA techniques to the intrusion-detection problem. A. Data Source An information system typically consists of host machines (e.g., machines running a UNIX operation system and machines running a Windows NT OS) and communication links connecting those host machines to form a computer network. Two sources of data are widely used to capture events in an information system for intrusion detection: network traffic data, audit trail data (audit data). Network-traffic-data contain data packets traveling over communication links between host machines to capture events over communication networks. Audit-data capture events occurring on a host machine. This study uses audit-data from a UNIX-based host machine (a Sun SPARC 10 work-station with a Solaris OS), and focus on intrusions into a host machine that leave trails in computer audit data. The Solaris OS from Sun Microsystems Inc. has the security facility, BSM which monitors audit events on a host machine. There are over 250 types of BSM auditable events, depending on the version of the Solaris OS. Because there are about 284 types of BSM audit-events on the host machine, 284 event-types are considered in this study. A BSM audit record for each event contains a variety of information, including the time of the event, event type, user ID, group ID, process ID, session ID, system object accessed. This study is concerned with the intensity of events. Hence, only the time-of-audit events are extracted from the audit data and used for intrusion detection. The time unit is seconds. B. Training and Testing Data This study obtains a collection of audit data for usual events from MIT-LL. Those events are generated by simulating activities observed in a real computer network system in a usual operation condition. The audit data contain a sequence of 3019 audit events lasting 580 seconds in time. The intensity of the 3019 audit events ranges from 0 to 135 events/second. The first half of the audit data, consisting of 1613 audit events lasting 381 seconds, is used as the training data. The second half of the audit data, consisting of 1406 audit events lasting 199 seconds, is used for testing. Hence, the number of the usual events in the training data set is similar to the number of the usual events in the testing data set. The data set of the 3019 audit events is divided into 2 halves (for training and for testing) based on the number of audit events, not the time, because other intrusion detection techniques [19] [28] were developed which obtain their observations from the audit data based on the type of individual events, rather than on the time of these events. These different intrusion detection techniques are tested on the same training data and the same testing data for comparison. Added to the 1406 usual events in the testing data set are intrusive events that are generated by simulating a denial-of-service attack. These intrusive events, lasting 10 seconds, are generated by simulating events at a much higher level of event-intensity than that of the usual events. The simulation of the audit events is based on a -normal distribution of the event intensity with mean of 1000 events/second and the standard deviation of 50 events/second. These intrusive events are inserted in the middle of the 1406 usual events. Hence, the testing data contain a total of audit events with 3 segments of data in the sequence: 703 usual events (the first half of the 1406 usual events),

4 78 IEEE TRANSACTIONS ON RELIABILITY, VOL. 52, NO. 1, MARCH 2003 Fig. 1. Observations of k(i), from the training data, using the event intensity needed. Fig. 2. Observations of k(i), from the testing data, using the event intensity needed intrusive events, 703 usual events (the second half of the 1406 usual events). The time gap from the last event in one segment of audit data to the first event in the next segment is 1 second. C. Observation of the Event-Intensity Event-intensity can be measured by counting the number of events per second,. For example, the training data consist of 1613 audit events for 381 seconds, and produce a sequence of 381 observations of the event intensity (number of events per second) as shown in Fig. 1. The testing data consist of audit events for 209 seconds, and produce a sequence of 209 observations of the event intensity as shown in Fig. 2. Figs. 1 and 2 also show the auto-correlation of the observations on the event intensity from the audit data. This study uses the smoothed-event-intensity by smoothing the observations of the event intensity in the recent past as follows: A detailed description of the exponential smoothing method is in [45]. The smoothing reduces the effect of outliers or wild values in the observations of the event-intensity [45]. The smoothing-constant determines the decay rate or the aging weight of the past observations in computing the smoothed-event intensity at the present time. The event-intensity at the present time,, receives a weight of ; the observation at time receives a weight of, and the observation (9) at time receives a weight of. Hence, if the interest is in a long-term trend of past observations, then use a small value of, e.g.,. If the interest is in the short-term trend of the observations in the recent past, then use a large value of, e.g., 0.2. In general, if the exponential smoothing system is to be equivalent to an -period moving average system, then [40], [45]: (10) This study uses the exponential smoothing method to obtain the short-term trend of the observations in the recent past. Hence, 2 values of, 0.2 and 0.3, are used and compared. Events in an information system occur in the interval shorter than 1 second as shown in Figs. 1 and 2. Hence, the measure of the event intensity in terms of the number of events per second is based on the sampling of events every second. However, the data sampling at every second can leave a time gap for intrusive events such as those from a denial-of-service attack to damage the information system before the next data-sample is taken, because a denial-of-service program can generate hundreds or even thousands of events automatically within a second. To prevent this, (9) is transformed into an equivalent form that is used to update the smoothed event intensity at each event : (11) Table I shows the computation of the smoothed-event intensity according to (11) in comparison with the computation of the smoothed-event intensity according to (9), for a given sequence of events. Table I shows that (9) updates the smoothed event intensity for every second, whereas (11) updates the smoothed event intensity for every event but produces the same result of the smoothed event intensity at the end of every second. D. Application of EWMA Techniques to Intrusion Detection Both EWMA for autocorrelated data and EWMA for uncorrelated data are tested to compare their performance for intrusion detection. Application of the EWMA technique for autocorrelated data to intrusion detection takes the 2 steps: 1) Training. Because the training data-set consists of 1613 usual events for 381 seconds, first obtain the sequence of 381 observations of the event intensity by computing the number of events for each second; the average event-intensity of these 381 observations is calculated to become the initial value of the smoothed event intensity,, in (11), and the initial value of the EWMA statistic,, in (1). Then for each audit event in the training data-set, use (11) to obtain the observation of the smoothed-event intensity for, and use (1) to compute the EWMA statistic for. Finally, the average of the 1613 values of is computed and used as for the testing data. The smoothed event intensity for the last event in the training data set,, is used as the initial value of for the testing data. For the 1613 events in the training data-set, the sum of the squared 1-step-ahead prediction errors divided by 1613 is used as the initial value of, for the testing data. 2) Testing. For each audit event in the testing data set, first use (11) to obtain, then (1) to obtain, (8) to compute the estimated, and (7) to compute UCL and LCL. Then find-out if LCL UCL. If not,

5 YE et al.: COMPUTER INTRUSION DETECTION THROUGH EWMA FOR AUTOCORRELATED AND UNCORRELATED DATA 79 TABLE I COMPUTATION OF THE SMOOTHED-EVENT INTENSITY FOR =0:2 TABLE II VARIOUS VALUES FOR PARAMETERS USED IN THE EWMA TECHNIQUE FOR AUTO-CORRELATED DATA an alarm signal is produced on this event; otherwise, no signal is produced. Table II shows various values for the parameters in the above formulas that are investigated for EWMA for autocorrelated data. The reason for using in (11) is given in Section III-C. Reference [40] suggests that the value of for the EWMA statistic in (1) is chosen to minimize the sum of squared 1-step-ahead prediction errors on the training data. This method yields in Table I. For this value, several values of (0.05, 0.001, ) for the smoothed variance in (8) are investigated for comparison. In addition to the, the values (0.05, 0.001, , ) are also investigated for comparison. For each of these additional values, is set to the same level as the value (0.05, 0.001, , or ). In addition to the, the along with similar values of and to those for the is also investigated for comparison. The for all the combinations of parameter values. In addition, the is also investigated for the, the, and the, which yield poor performance as shown in Section IV. Hence, the value is increased from 1.96 to 3 to see if this change of makes any performance difference. The application of the EWMA technique for uncorrelated data to intrusion detection takes the following 2 steps. 1) Training: Because the training data-set consists of 1613 usual events for 381 seconds, first obtain the sequence of 381 observations of the event intensity by computing the number of events for each second. The average event-intensity of these 381 observations is calculated for in (11), and for in (1). Then for each audit event in the training data-set, use (11) to obtain the observation of, and use (1) to compute the EWMA statistic for. Finally, the average of the 1613 values of is computed and used as for the testing data. This average is also used as the estimated in (2) during testing. The for the last event in the training data-set, is used as the initial value of the, for the testing data. The standard deviation of for the training data is used as the estimated in (3) during testing. Equations (2) and (3) are used to compute and. Equation (4) is then used to compute UCL and LCL, which are used during testing. 2) Testing: For each audit event in the testing data-set, first use (11) to obtain, and use (1) to obtain. Then evaluate if [LCL, UCL ]. If not, an alarm signal is produced on this event; otherwise, no signal is produced. As discussed in Section II and shown in Figs. 1 and 2, the data of the event intensity in the information system are autocorrelated. The data of the smoothed event intensity are also autocorrelated because of the smoothing method. Hence, the EWMA technique for uncorrelated data is tested to compare with the EWMA technique for autocorrelated data only for and that yield the best performance for the EWMA technique for autocorrelated data among all the parameter combinations, as shown in Section IV. The value of in (4) is also set to 1.96 at the -significance level of IV. RESULTS AND DISCUSSIONS The test data consist of the sequence: 703 usual events, intrusive events, 703 usual events. For each EWMA technique with a given parameter combination, compute the number of false alarms and the number of hits. A false alarm is a signal on a usual event. A hit is a signal on an intrusive event. Also, check how soon the intrusion is detected by noting the first intrusive event with a signal. Table III shows the: number of hits, number of false alarms, first signaled intrusion event for the 2 EWMA techniques with different combinations of parameter values. The examination on the performance of the EWMA technique for autocorrelated data leads to 5 findings: 1) Table III shows, among all the parameter settings for,, and (highlighted by an underline in Table I) produce the best performance with: 5392 hits out of the intrusive events, no false alarm out of the 1406 usual events,

6 80 IEEE TRANSACTIONS ON RELIABILITY, VOL. 52, NO. 1, MARCH 2003 TABLE III PERFORMANCE RESULTS OF THE 2 EWMA TECHNIQUES WITH DIFFERENT COMBINATIONS OF PARAMETER VALUES (a) (b) Fig. 3. Performance of EWMA for autocorrelated data with =0:2, = =10, L =1:96. (a) Plot of x(i), LCL (i), UCL (i). (b) Plot of signal (i). an early detection at intrusion event #958. Fig. 3 shows more performance details for this parameter setting. 2) For this parameter setting ( and ), signals are not produced for all the intrusive events. Signals are produced only for those early intrusive events. As the center line and the LCL and UCL of the control chart gradually adjust to the smoothed intensity level of the intrusive events, no signals are produced on the later intrusive events. This is acceptable because the early detection of the intrusive events should already trigger actions to stop the later intrusive events. The early detection of the intrusion events is more important than the 100% hit rate for all the intrusive events. 3) For this parameter setting ( and ), changing from 0.2 to 0.3, does not make much performance difference. 4) Larger values of, such as 0.05 and 0.85 (the optimal value for the time-series data of the smoothed event intensity), produce smaller prediction errors, thereby resulting in smaller estimated and smaller in-control ranges as shown in Fig. 4. This produces false alarms on both the first 703 usual events and the last 703 usual events. Even increasing from 1.96 to 3 does not help much in overcoming this difficulty, as shown in Table III. When represents the short-term trend of the event intensity in the recent past, and as the parameters in determining the LCL and UCL should reflect the long-term trend of the event intensity. This is why the parameter setting of,, and produces the good performance on the smoothed event intensity as stated in Finding 1. 5) If and are too small, such as , the center line and the LCL and UCL of the EWMA control chart become too sluggish to update the long-term trend of the smoothed event intensity, thereby resulting in the false alarms in the last 703 usual events when the smoothed event intensity drops after the intrusive events as shown in Fig. 5 and Table III. The performance of the EWMA technique for uncorrelated data is shown in Fig. 6 and Table III. Because the LCL and UCL do not change, there are false alarms on all the last 703 usual events whose smoothed event intensity still carries over the high level of the smoothed event intensity of the intrusive events before these 703 usual events. In summary, it appears from the testing results that both EWMA for autocorrelated data and EWMA for uncorrelated data can work well for detecting intrusions that manifest themselves through -significant changes in the intensity of events occurring in an information system. The advantage

7 YE et al.: COMPUTER INTRUSION DETECTION THROUGH EWMA FOR AUTOCORRELATED AND UNCORRELATED DATA 81 (a) (a) (b) Fig. 4. Performance of EWMA for autocorrelated data with =0:2, = =0:5, L =1:96. (a) Plot of x(i), LCL (i), UCL (i). (b) Plot of signal (i). (a) Fig. 6. Performance of EWMA for uncorrelated data with =0:2, = 10, L =1:96. (a) Plot of z(i), LCL (i), UCL (i). (b) Plot of signal (i). (b) of the EWMA technique for uncorrelated data is that it can detect not only abrupt changes in the event intensity but also small mean shifts through the gradually increased or decreased event intensity [37]. However, if the EWMA technique for uncorrelated data is used, the initial value of the smoothed event intensity needs to be reset after intrusions are detected for preventing the carry-over effect. If EWMA for autocorrelated data is used, the reset of the initial value of the smoothed event intensity is not necessary, because EWMA for autocorrelated data automatically adjusts the LCL and UCL to account for the carry-over effect. Overall, the smoothing constant for computing the smoothed event intensity should not be too small, in order to capture the short-term trend of the event intensity in the recent past. The and for setting the LCL and UCL to reflect the long-term trend of the smoothed-event intensity should be much smaller than the smoothing constant. The for -significance level of 0.05 appears to work well. EWMA for autocorrelated data might not be able to detect small mean shifts through the gradually increased or decreased event intensity. (b) Fig. 5. Performance of EWMA for autocorrelated data with =0:2, = =10, L =1:96. (a) Plot of x(i), LCL (i), UCL (i). (b) Plot of signal (i). ACKNOWLEDGMENT The U.S. Government is authorized to reproduce and distribute reprints for governmental purposes notwithstanding any copyright annotation thereon. The views and conclusions contained herein are those of the authors and should not be interpreted as necessarily representing the official policies or endorsements, either express or implied, of, DARPA/AFRL-Rome, or the U.S. Government.

8 82 IEEE TRANSACTIONS ON RELIABILITY, VOL. 52, NO. 1, MARCH 2003 REFERENCES [1] W. Stallings, Network and Inter-Network Security Principles and Practice: Prentice-Hall, [2] C. Kaufman, R. Perlman, and M. Speciner, Network Security: Private Communication in a Public World: Prentice-Hall, [3] N. Ye, J. Giordano, and J. Feldman, Detecting information warfare attacks: Current state of the art from a process control viewpoint, Communications ACM, vol. 44, Aug [4] T. Escamilla, Intrusion Detection: Network Security Beyond the Firewall: John Wiley and Sons, [5] W. Everett, S. Keene, and A. Nikora, Applying software reliability engineering in the 1990s, IEEE Trans. Rel., vol. 47, pp , Sept [6] A. Thakur and R. K. Iyer, Analyze-NOW An environment for collection and analysis of failures in a network of workstations, IEEE Trans. Rel., vol. 45, no. 4, pp , Dec [7] C. S. Hood and C. Ji, Proactive network-fault detection, IEEE Trans. Rel., vol. 46, no. 3, pp , Sept [8] S. Morasca, Assessment of fault-detection processes: An approach based on reliability techniques, IEEE Trans. Rel., vol. 45, no. 4, pp , Dec [9] C. M. Krishna, Optimal configuration of redundant real-time systems in the face of correlated failure, IEEE Trans. Rel., vol. 44, no. 4, pp , Dec [10] S.-T. Cheng, Topological optimization of a reliable communication work, IEEE Trans. Rel., vol. 47, no. 3, pp , Sept [11] S. N. Chau, L. Alkalai, A. T. Tai, and J. B. Burt, Design of a faulttolerant COTS-based bus architecture, IEEE Trans. Rel., vol. 48, no. 4, pp , Dec [12] H.-M. Sun and S.-P. Shieh, Optimal information-dispersal for increasing the reliability of a distributed service, IEEE Trans. Rel., vol. 46, no. 4, pp , Dec [13] H. Debar, M. Dacier, and A. Wespi, Toward a taxonomy of intrusiondetection systems, Computer Networks, vol. 31, pp , [14] R. Lippmann et al., Evaluating intrusion detection systems: The 1998 DARPA off-line intrusion detection evaluation, in Proc. DARPA Inform. Survivability Conf. Exposition: IEEE Computer Society, 2000, pp [15] D. Anderson, T. Frivold, and A. Valdes, Next-generation Intrusion Detection Expert System (NIDES): A Summary, SRI International, Tech. Rep. SRI-CSL-97-07, [16] G. Vigna, S. Eckmann, and R. Kemmerer, The STAT tool suite, in Proc. DARPA Inform. Survivability Conf. and Exposition: IEEE Computer Society, 2000, pp [17] S. Kumar, Classification and Detection of Computer Intrusions, Ph.D. dissertation, Department of Computer Science, Purdue University, Indiana, USA, [18] W. Lee, S. J. Stolfo, and K. Mok. Mining in a data-flow environment: Experience in network intrusion detection. presented at Proc. 5th ACM SIGKDD Int. Conf. Knowledge Discovery and Data Mining. [Online]. Available: sal/jam/project/. [19] N. Ye and X. Li, A scalable clustering technique for intrusion signature recognition, in Proc. 2nd IEEE SMC Inform. Assurance Workshop, [20] N. Ye, X. Li, and S. M. Emran, Decision trees for signature recognition and state classification, in Proc. 1st IEEE SMC Inform. Assurance and Security Workshop, [21] N. Ye et al., Probabilistic techniques for intrusion detection based on computer audit data, IEEE Trans. Syst., Man, and Cybern., vol. 31, no. 4, [22] N. Ye, S. M. Emran, X. Li, and Q. Chen, Statistical process control techniques for an intrusion detection system, in Proc. 2nd DARPA Inform. Survivability Conf. and Exposition, [23] S. M. Emran and N. Ye, Robustness of Canberra metric in computer intrusion detection, in Proc. 2nd IEEE SMC Inform. Assurance Workshop, [24] N. Ye, Q. Chen, and S. M. Emran, Computer intrusion detection based on statistical distributions of distance metrics, in Proc. Southern Conf. Computing, [25] N. Ye, A Markov chain model of temporal behavior for anomaly detection, in Proc. 1st IEEE SMC Inform. Assurance and Security Workshop, [26] N. Ye, Q. Zhong, and M. Xu, Probabilistic networks with undirected links for anomaly detection, in Proc. 1st IEEE SMC Inform. Assurance and Security Workshop, [27] N. Ye, Q. Chen, and S. M. Emran, Hotelling s T2 multivariate profiling for anomaly detection, in Proc. 1st IEEE SMC Inform. Assurance and Security Workshop, [28] N. Ye and Q. Chen, An anomaly detection technique based on a chisquare statistic for detecting intrusions into information systems, Qual. Rel. Eng. Int., vol. 17, no. 2, pp , Mar./Apr [29] D. E. Denning, An intrusion-detection model, IEEE Trans. Software Eng., vol. 13, no. 2, pp , [30] A. K. Ghosh, A. Schwatzbard, and M. Shatz. Learning program behavior profiles for intrusion detection. presented at Proc. 1st USENIX Workshop on Intrusion Detection and Network Monitoring. [Online]. Available: anup/. [31] S. Forrest, S. A. Hofmeyr, and A. Somayaji, Computer immunology, Communications ACM, vol. 40, no. 10, pp , Oct [32] C. Ko, G. Fink, and K. Levitt, Execution monitoring of security-critical programs in distributed systems: A specification-based approach, in Proc IEEE Symp. Security and Privacy: IEEE Computer Society, 1997, pp [33] H. S. Javitz and A. Valdes, The SRI statistical anomaly detector, in Proc IEEE Symp. Res. Security and Privacy: IEEE Computer Society, [34] H. S. Javitz and A. Valdes, The NIDES statistical component description of justification, SRI International, Tech. Rep. A010, [35] Y. Jou et al., Design and implementation of a scalable intrusion detection system for the protection of network infrastructure, in Proc. DARPA Inform. Survivability Conf. Exposition: IEEE Computer Society, 2000, pp [36] T. P. Ryan, Statistical Methods for Quality Improvement: John Wiley and Sons, [37] D. C. Montgomery, Introduction to Statistical Quality Control: John Wiley and Sons, [38] J. S. Hunter, The exponentially weighted moving average, J. Qual. Technol., vol. 18, pp , [39] S. W. Roberts, Control chart tests based on geometric moving averages, Technometrics, vol. 1, pp , [40] D. C. Montgomery and C. M. Mastrangelo, Some statistical process control methods for autocorrelated data, J. Qual. Technol., vol. 23, no. 3, pp , July [41] C. M. Borror, D. C. Montgomery, and C. G. Runger, Robustness of the EWMA control charts to nonnormality, J. Qual. Technol., vol. 31, no. 3, pp , [42] S. H. Steiner, EWMA control charts with time-varying control limits and fast initial response, J. Qual. Technol., vol. 31, no. 1, pp , [43] J. F. MacGregor and T. J. Harris, The exponentially weighted moving variance, J. Qual. Technol., vol. 25, no. 1, pp , [44] S. S. Prabhu and G. C. Runger, Designing a multivariate EWMA control chart, J. Qual. Technol., vol. 29, no. 1, pp. 8 15, Jan [45] D. C. Montgomery, L. A. Johnson, and J. S. Gardiner, Forecasting and Time Series Analysis: McGraw-Hill, Nong Ye received the B.S. in Computer Science from Peking University, Beijing, the M.S. in Computer Science from the Chinese Academy of Sciences, Beijing, and the Ph.D. in Industrial Engineering from Purdue University, West Lafayette, IN. Since 2002, Dr. Ye has been a Professor with the Department of Industrial Engineering, Arizona State University, Tempe. Her research interests are in assuring quality/reliability and preventing faults and errors in information systems, human machine systems, and manufacturing systems. Dr. Ye is a Senior Member of the IEEE and of the Institute of Industrial Engineers. Sean Vilbert received the M.S. in 1999 in Industrial Engineering from Arizona State University. Qiang Chen received the B.S. in 1993 and the M.S. in 1999 in Manufacturing Engineering from Beijing University of Aeronautics and Astronautics (BUAA). Since 1999, he has studied in the Department of Industrial Engineering, Arizona State University; and received the Ph.D. in 2001 in Industrial Engineering from Arizona State University. From , he worked as an Information Management Engineer in Beijing Aircraft Maintenance and Engineering Company. His research interests include intrusion detection, data noise cancellation, and knowledge discovery.

Technical Aspects of Intrusion Detection Techniques

Technical Aspects of Intrusion Detection Techniques Technical Aspects of Intrusion Detection Techniques Final Year Project 2003-04 Project Plan Version 0.2 28th, November 2003 By Cheung Lee Man 2001572141 Computer Science and Information Systems Supervisor

More information

Denial of Service (DoS) Attack Detection by Using Fuzzy Logic over Network Flows

Denial of Service (DoS) Attack Detection by Using Fuzzy Logic over Network Flows Denial of Service (DoS) Attack Detection by Using Fuzzy Logic over Network Flows S. Farzaneh Tabatabaei 1, Mazleena Salleh 2, MohammadReza Abbasy 3 and MohammadReza NajafTorkaman 4 Faculty of Computer

More information

Modeling System Calls for Intrusion Detection with Dynamic Window Sizes

Modeling System Calls for Intrusion Detection with Dynamic Window Sizes Modeling System Calls for Intrusion Detection with Dynamic Window Sizes Eleazar Eskin Computer Science Department Columbia University 5 West 2th Street, New York, NY 27 eeskin@cs.columbia.edu Salvatore

More information

Applying Residual Control Charts to Identify the False Alarms in a TFT-LCD Manufacturing Process

Applying Residual Control Charts to Identify the False Alarms in a TFT-LCD Manufacturing Process Appl. Math. Inf. Sci. 7, No. 4, 1459-1464 (2013) 1459 Applied Mathematics & Information Sciences An International Journal http://dx.doi.org/10.12785/amis/070426 Applying Residual Control Charts to Identify

More information

A PROCESS CONTROL AND DIAGNOSIS APPROACH TO INDICATIONS AND WARNING OF ATTACKS ON COMPUTER NETWORKS

A PROCESS CONTROL AND DIAGNOSIS APPROACH TO INDICATIONS AND WARNING OF ATTACKS ON COMPUTER NETWORKS AFRL-IF-RS-TR-2001-197 Final Technical Report October 2001 A PROCESS CONTROL AND DIAGNOSIS APPROACH TO INDICATIONS AND WARNING OF ATTACKS ON COMPUTER NETWORKS Arizona State University Nong Ye APPROVED

More information

Control Charts. An Introduction to Statistical Process Control

Control Charts. An Introduction to Statistical Process Control An Introduction to Statistical Process Control Course Content Prerequisites Course Objectives What is SPC? Control Chart Basics Out of Control Conditions SPC vs. SQC Individuals and Moving Range Chart

More information

Means for Intrusion Detection. Intrusion Detection. INFO404 - Lecture 13. Content

Means for Intrusion Detection. Intrusion Detection. INFO404 - Lecture 13. Content Intrusion Detection INFO404 - Lecture 13 21.04.2009 nfoukia@infoscience.otago.ac.nz Content Definition Network vs. Host IDS Misuse vs. Behavior Based IDS Means for Intrusion Detection Definitions (1) Intrusion:

More information

Effective Intrusion Type Identification with Edit Distance for HMM-Based Anomaly Detection System

Effective Intrusion Type Identification with Edit Distance for HMM-Based Anomaly Detection System Effective Intrusion Type Identification with Edit Distance for HMM-Based Anomaly Detection System Ja-Min Koo and Sung-Bae Cho Dept. of Computer Science, Yonsei University, Shinchon-dong, Seodaemoon-ku,

More information

Approach Using Genetic Algorithm for Intrusion Detection System

Approach Using Genetic Algorithm for Intrusion Detection System Approach Using Genetic Algorithm for Intrusion Detection System 544 Abhijeet Karve Government College of Engineering, Aurangabad, Dr. Babasaheb Ambedkar Marathwada University, Aurangabad, Maharashtra-

More information

Modeling System Calls for Intrusion Detection with Dynamic Window Sizes

Modeling System Calls for Intrusion Detection with Dynamic Window Sizes Modeling System Calls for Intrusion Detection with Dynamic Window Sizes Eleazar Eskin Computer Science Department Columbia University 5 West 2th Street, New York, NY 27 eeskin@cs.columbia.edu Salvatore

More information

Bayesian Learning Networks Approach to Cybercrime Detection

Bayesian Learning Networks Approach to Cybercrime Detection Bayesian Learning Networks Approach to Cybercrime Detection N S ABOUZAKHAR, A GANI and G MANSON The Centre for Mobile Communications Research (C4MCR), University of Sheffield, Sheffield Regent Court, 211

More information

Security Technologies for Dynamic Collaboration

Security Technologies for Dynamic Collaboration Special Issue Advanced Technologies Driving Dynamic Collaboration Featuring System Technologies Security Technologies for Dynamic Collaboration By Hiroshi MIYAUCHI,* Ayako KOMATSU, Masato KAWATSU and Masashi

More information

Analytical Techniques for Anomaly Detection Through Features, Signal-Noise Separation and Partial-Value Association

Analytical Techniques for Anomaly Detection Through Features, Signal-Noise Separation and Partial-Value Association Proceedings of Machine Learning Research 77:20 32, 2017 KDD 2017: Workshop on Anomaly Detection in Finance Analytical Techniques for Anomaly Detection Through Features, Signal-Noise Separation and Partial-Value

More information

Hybrid Feature Selection for Modeling Intrusion Detection Systems

Hybrid Feature Selection for Modeling Intrusion Detection Systems Hybrid Feature Selection for Modeling Intrusion Detection Systems Srilatha Chebrolu, Ajith Abraham and Johnson P Thomas Department of Computer Science, Oklahoma State University, USA ajith.abraham@ieee.org,

More information

Pyrite or gold? It takes more than a pick and shovel

Pyrite or gold? It takes more than a pick and shovel Pyrite or gold? It takes more than a pick and shovel SEI/CERT -CyLab Carnegie Mellon University 20 August 2004 John McHugh, and a cast of thousands Pyrite or Gold? Failed promises Data mining and machine

More information

EVALUATIONS OF THE EFFECTIVENESS OF ANOMALY BASED INTRUSION DETECTION SYSTEMS BASED ON AN ADAPTIVE KNN ALGORITHM

EVALUATIONS OF THE EFFECTIVENESS OF ANOMALY BASED INTRUSION DETECTION SYSTEMS BASED ON AN ADAPTIVE KNN ALGORITHM EVALUATIONS OF THE EFFECTIVENESS OF ANOMALY BASED INTRUSION DETECTION SYSTEMS BASED ON AN ADAPTIVE KNN ALGORITHM Assosiate professor, PhD Evgeniya Nikolova, BFU Assosiate professor, PhD Veselina Jecheva,

More information

Efficient Network Intrusion Detection System Navaneethakrishnan.P a*,theivanathan.g b

Efficient Network Intrusion Detection System Navaneethakrishnan.P a*,theivanathan.g b World Journal of Technology, Engineering and Research, Volume 2, Issue 1 (2017) 168-173 Contents available at WJTER World Journal of Technology, Engineering and Research Journal Homepage: www.wjter.com

More information

Communication Pattern Anomaly Detection in Process Control Systems

Communication Pattern Anomaly Detection in Process Control Systems Communication Pattern Anomaly Detection in Process Control Systems Sponsored by the Department of Energy National SCADA Test Bed Program Managed by the National Energy Technology Laboratory The views herein

More information

UNCOVERING OF ANONYMOUS ATTACKS BY DISCOVERING VALID PATTERNS OF NETWORK

UNCOVERING OF ANONYMOUS ATTACKS BY DISCOVERING VALID PATTERNS OF NETWORK UNCOVERING OF ANONYMOUS ATTACKS BY DISCOVERING VALID PATTERNS OF NETWORK Dr G.Charles Babu Professor MRE College Secunderabad, India. charlesbabu26@gmail.com N.Chennakesavulu Assoc.Professor Wesley PG

More information

WITH THE proliferation and ubiquity of handheld devices

WITH THE proliferation and ubiquity of handheld devices IEEE TRANSACTIONS ON RELIABILITY, VOL. 54, NO. 1, MARCH 2005 115 On Failure Recoverability of Client-Server Applications in Mobile Wireless Environments Ing-Ray Chen, Member, IEEE, Baoshan Gu, Sapna E.

More information

COMPARISON OF THE ACCURACY OF BIVARIATE REGRESSION AND BOX PLOT ANALYSIS IN DETECTING DDOS ATTACKS

COMPARISON OF THE ACCURACY OF BIVARIATE REGRESSION AND BOX PLOT ANALYSIS IN DETECTING DDOS ATTACKS International Journal of Electronics and Communication Engineering & Technology (IJECET) Volume 6, Issue 12, Dec 2015, pp. 43-48, Article ID: IJECET_06_12_007 Available online at http://www.iaeme.com/ijecetissues.asp?jtype=ijecet&vtype=6&itype=12

More information

DNA Intrusion Detection Methodology. James T. Dollens, Ph.D Cox Road Roswell, GA (678)

DNA Intrusion Detection Methodology. James T. Dollens, Ph.D Cox Road Roswell, GA (678) DNA Intrusion Detection Methodology by James T. Dollens, Ph.D. 1675 Cox Road Roswell, GA 30075 JTDDGC@aol.com (678) 576-3759 Copyright 2001, 2004 James T. Dollens Page 1 of 1 Introduction Computer viruses,

More information

Network Traffic Anomaly Detection based on Ratio and Volume Analysis

Network Traffic Anomaly Detection based on Ratio and Volume Analysis 190 Network Traffic Anomaly Detection based on Ratio and Volume Analysis Hyun Joo Kim, Jung C. Na, Jong S. Jang Active Security Technology Research Team Network Security Department Information Security

More information

Formulation of a Heuristic Rule for Misuse and Anomaly Detection for U2R Attacks in Solaris TM Operating System Environment

Formulation of a Heuristic Rule for Misuse and Anomaly Detection for U2R Attacks in Solaris TM Operating System Environment Formulation of a Heuristic Rule for Misuse and Anomaly Detection for U2R Attacks in Solaris TM Operating System Environment Maheshkumar Sabhnani EECS Dept, University of Toledo Toledo, Ohio 43606 USA Gursel

More information

A Rule-Based Intrusion Alert Correlation System for Integrated Security Management *

A Rule-Based Intrusion Alert Correlation System for Integrated Security Management * A Rule-Based Intrusion Correlation System for Integrated Security Management * Seong-Ho Lee 1, Hyung-Hyo Lee 2, and Bong-Nam Noh 1 1 Department of Computer Science, Chonnam National University, Gwangju,

More information

Intrusion Detection Systems (IDS)

Intrusion Detection Systems (IDS) Intrusion Detection Systems (IDS) Presented by Erland Jonsson Department of Computer Science and Engineering Intruders & Attacks Cyber criminals Activists State-sponsored organizations Advanced Persistent

More information

Social Behavior Prediction Through Reality Mining

Social Behavior Prediction Through Reality Mining Social Behavior Prediction Through Reality Mining Charlie Dagli, William Campbell, Clifford Weinstein Human Language Technology Group MIT Lincoln Laboratory This work was sponsored by the DDR&E / RRTO

More information

Basic Concepts in Intrusion Detection

Basic Concepts in Intrusion Detection Technology Technical Information Services Security Engineering Roma, L Università Roma Tor Vergata, 23 Aprile 2007 Basic Concepts in Intrusion Detection JOVAN GOLIĆ Outline 2 Introduction Classification

More information

Effect of Principle Component Analysis and Support Vector Machine in Software Fault Prediction

Effect of Principle Component Analysis and Support Vector Machine in Software Fault Prediction International Journal of Computer Trends and Technology (IJCTT) volume 7 number 3 Jan 2014 Effect of Principle Component Analysis and Support Vector Machine in Software Fault Prediction A. Shanthini 1,

More information

DDoS Attacks Detection Using GA based Optimized Traffic Matrix

DDoS Attacks Detection Using GA based Optimized Traffic Matrix 2011 Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing DDoS Attacks Detection Using GA based Optimized Traffic Matrix Je Hak Lee yitsup2u@gmail.com Dong

More information

Intrusion Detection Using Data Mining Technique (Classification)

Intrusion Detection Using Data Mining Technique (Classification) Intrusion Detection Using Data Mining Technique (Classification) Dr.D.Aruna Kumari Phd 1 N.Tejeswani 2 G.Sravani 3 R.Phani Krishna 4 1 Associative professor, K L University,Guntur(dt), 2 B.Tech(1V/1V),ECM,

More information

DUE TO advances in information-communication technology,

DUE TO advances in information-communication technology, IEEE TRANSACTIONS ON SYSTEMS, MAN, AND CYBERNETICS PART B: CYBERNETICS, VOL. 36, NO. 3, JUNE 2006 559 Evolutionary Neural Networks for Anomaly Detection Based on the Behavior of a Program Sang-Jun Han

More information

Lecture Notes on Critique of 1998 and 1999 DARPA IDS Evaluations

Lecture Notes on Critique of 1998 and 1999 DARPA IDS Evaluations Lecture Notes on Critique of 1998 and 1999 DARPA IDS Evaluations Prateek Saxena March 3 2008 1 The Problems Today s lecture is on the discussion of the critique on 1998 and 1999 DARPA IDS evaluations conducted

More information

Intrusion Detection Systems

Intrusion Detection Systems Intrusion Detection Systems Dr. Ahmad Almulhem Computer Engineering Department, KFUPM Spring 2008 Ahmad Almulhem - Network Security Engineering - 2008 1 / 15 Outline 1 Introduction Overview History 2 Types

More information

Introduction to IA Class Notes. 2 Copyright 2018 M. E. Kabay. All rights reserved. 4 Copyright 2018 M. E. Kabay. All rights reserved.

Introduction to IA Class Notes. 2 Copyright 2018 M. E. Kabay. All rights reserved. 4 Copyright 2018 M. E. Kabay. All rights reserved. IDS & IPD CSH6 Chapter 27 Intrusion Detection & Intrusion Prevention Devices Rebecca Gurley Bace Topics Security Behind the Firewall Main Concepts Intrusion Prevention Information Sources Analysis Schemes

More information

Flow-based Anomaly Intrusion Detection System Using Neural Network

Flow-based Anomaly Intrusion Detection System Using Neural Network Flow-based Anomaly Intrusion Detection System Using Neural Network tational power to analyze only the basic characteristics of network flow, so as to Intrusion Detection systems (KBIDES) classify the data

More information

Detection of Anomalies using Online Oversampling PCA

Detection of Anomalies using Online Oversampling PCA Detection of Anomalies using Online Oversampling PCA Miss Supriya A. Bagane, Prof. Sonali Patil Abstract Anomaly detection is the process of identifying unexpected behavior and it is an important research

More information

α - CUT FUZZY CONTROL CHARTS FOR BOTTLE BURSTING STRENGTH DATA

α - CUT FUZZY CONTROL CHARTS FOR BOTTLE BURSTING STRENGTH DATA International Journal of Electronics, Communication & Instrumentation Engineering Research and Development (IJECIERD ISSN 2249-684X Vol. 2 Issue 4 Dec 2012 17-30 TJPRC Pvt. Ltd., α - CUT FUZZY CONTROL

More information

International Research Journal of Engineering and Technology (IRJET) e-issn: Volume: 03 Issue: 04 Apr p-issn:

International Research Journal of Engineering and Technology (IRJET) e-issn: Volume: 03 Issue: 04 Apr p-issn: Online rating malicious user identification and calculating original score using detective TATA N.D.Sowmiya 1, S.Santhi 2 1 PG student, Department of computer science and engineering, Valliammai engineering

More information

Online Intrusion Alert Based on Aggregation and Correlation

Online Intrusion Alert Based on Aggregation and Correlation Online Intrusion Alert Based on Aggregation and Correlation Kunchakarra Anusha 1, K.V.D.Sagar 2 1 Pursuing M.Tech(CSE), Nalanda Institute of Engineering & Technology,Siddharth Nagar, Sattenapalli, Guntur.,

More information

A S T U D Y I N U S I N G N E U R A L N E T W O R K S F O R A N O M A L Y A N D M I S U S E D E T E C T I O N

A S T U D Y I N U S I N G N E U R A L N E T W O R K S F O R A N O M A L Y A N D M I S U S E D E T E C T I O N The following paper was originally published in the Proceedings of the 8 th USENIX Security Symposium Washington, D.C., USA, August 23 26, 1999 A S T U D Y I N U S I N G N E U R A L N E T W O R K S F O

More information

A study on fuzzy intrusion detection

A study on fuzzy intrusion detection A study on fuzzy intrusion detection J.T. Yao S.L. Zhao L. V. Saxton Department of Computer Science University of Regina Regina, Saskatchewan, Canada S4S 0A2 E-mail: [jtyao,zhao200s,saxton]@cs.uregina.ca

More information

Intrusion Detection System

Intrusion Detection System Intrusion Detection System Marmagna Desai March 12, 2004 Abstract This report is meant to understand the need, architecture and approaches adopted for building Intrusion Detection System. In recent years

More information

Measuring the Vulnerability of Interconnection. Networks in Embedded Systems. University of Massachusetts, Amherst, MA 01003

Measuring the Vulnerability of Interconnection. Networks in Embedded Systems. University of Massachusetts, Amherst, MA 01003 Measuring the Vulnerability o Interconnection Networks in Embedded Systems V. Lakamraju, Z. Koren, I. Koren, and C. M. Krishna Department o Electrical and Computer Engineering University o Massachusetts,

More information

ADAPTIVE NETWORK ANOMALY DETECTION USING BANDWIDTH UTILISATION DATA

ADAPTIVE NETWORK ANOMALY DETECTION USING BANDWIDTH UTILISATION DATA 1st International Conference on Experiments/Process/System Modeling/Simulation/Optimization 1st IC-EpsMsO Athens, 6-9 July, 2005 IC-EpsMsO ADAPTIVE NETWORK ANOMALY DETECTION USING BANDWIDTH UTILISATION

More information

Fuzzy Intrusion Detection

Fuzzy Intrusion Detection Fuzzy Intrusion Detection John E. Dickerson, Jukka Juslin, Ourania Koukousoula, Julie A. Dickerson Electrical and Computer Engineering Department Iowa State University Ames, IA, USA {jedicker,juslin,koukouso,julied}@iastate.edu

More information

Statistical Anomaly Intrusion Detection System

Statistical Anomaly Intrusion Detection System Statistical Anomaly Intrusion Detection System -Midterm Project By Sheng Li Presentation Outline What is statistical anomaly IDS? Methods Evaluating Benchmarking Case-studies NIDES, AAFID, JiNao Conclusions

More information

Clustering of Windows Security Events by means of Frequent Pattern Mining

Clustering of Windows Security Events by means of Frequent Pattern Mining Clustering of Windows Security Events by means of Frequent Pattern Mining Rosa Basagoiti 1, Urko Zurutuza 1, Asier Aztiria 1, Guzmán Santafé 2 and Mario Reyes 2 1 Mondragon University, Mondragon, Spain

More information

ANALYSIS AND EVALUATION OF DISTRIBUTED DENIAL OF SERVICE ATTACKS IDENTIFICATION METHODS

ANALYSIS AND EVALUATION OF DISTRIBUTED DENIAL OF SERVICE ATTACKS IDENTIFICATION METHODS ANALYSIS AND EVALUATION OF DISTRIBUTED DENIAL OF SERVICE ATTACKS IDENTIFICATION METHODS Saulius Grusnys, Ingrida Lagzdinyte Kaunas University of Technology, Department of Computer Networks, Studentu 50,

More information

APPLICATION OF INTRUSION DETECTION SOFTWARE TO PROTECT TELEMETRY DATA IN OPEN NETWORKED COMPUTER ENVIRONMENTS.

APPLICATION OF INTRUSION DETECTION SOFTWARE TO PROTECT TELEMETRY DATA IN OPEN NETWORKED COMPUTER ENVIRONMENTS. APPLICATION OF INTRUSION DETECTION SOFTWARE TO PROTECT TELEMETRY DATA IN OPEN NETWORKED COMPUTER ENVIRONMENTS. Item Type text; Proceedings Authors Kalibjian, Jeffrey R. Publisher International Foundation

More information

INTRUSION DETECTION SYSTEM USING BIG DATA FRAMEWORK

INTRUSION DETECTION SYSTEM USING BIG DATA FRAMEWORK INTRUSION DETECTION SYSTEM USING BIG DATA FRAMEWORK Abinesh Kamal K. U. and Shiju Sathyadevan Amrita Center for Cyber Security Systems and Networks, Amrita School of Engineering, Amritapuri, Amrita Vishwa

More information

Systematic Detection And Resolution Of Firewall Policy Anomalies

Systematic Detection And Resolution Of Firewall Policy Anomalies Systematic Detection And Resolution Of Firewall Policy Anomalies 1.M.Madhuri 2.Knvssk Rajesh Dept.of CSE, Kakinada institute of Engineering & Tech., Korangi, kakinada, E.g.dt, AP, India. Abstract: In this

More information

Data Mining Based Online Intrusion Detection

Data Mining Based Online Intrusion Detection International Journal of Engineering Research and Development e-issn: 2278-067X, p-issn: 2278-800X, www.ijerd.com Volume 3, Issue 12 (September 2012), PP. 59-63 Data Mining Based Online Intrusion Detection

More information

Intrusions Detection System Based on Ubiquitous Network Nodes

Intrusions Detection System Based on Ubiquitous Network Nodes Intrusions Detection System Based on Ubiquitous Network Nodes Lynda Sellami Djilali Idoughi Abderrahmane Baadache Department of Computer Science Laboratory of Applied Mathematics Laboratory of Modeling

More information

Intrusion Detection by Combining and Clustering Diverse Monitor Data

Intrusion Detection by Combining and Clustering Diverse Monitor Data Intrusion Detection by Combining and Clustering Diverse Monitor Data TSS/ACC Seminar April 5, 26 Atul Bohara and Uttam Thakore PI: Bill Sanders Outline Motivation Overview of the approach Feature extraction

More information

Evolutionary Algorithm Approaches for Detecting Computer Network Intrusion (Extended Abstract)

Evolutionary Algorithm Approaches for Detecting Computer Network Intrusion (Extended Abstract) Evolutionary Algorithm Approaches for Detecting Computer Network Intrusion (Extended Abstract) Kevin P. Anchor, Paul D. Williams, Gregg H. Gunsch, and Gary B. Lamont Department of Electrical and Computer

More information

FAME: A NOVEL FRAMEWORK FOR POLICY MANAGEMENT IN FIREWALL

FAME: A NOVEL FRAMEWORK FOR POLICY MANAGEMENT IN FIREWALL FAME: A NOVEL FRAMEWORK FOR POLICY MANAGEMENT IN FIREWALL A.Krishna Mohan Associate professor Dept. CSE (IT) UCEK JNTU Kakinada Abstract: In this paper investigate the problem of discovering the set of

More information

EFFECTIVE INTRUSION DETECTION AND REDUCING SECURITY RISKS IN VIRTUAL NETWORKS (EDSV)

EFFECTIVE INTRUSION DETECTION AND REDUCING SECURITY RISKS IN VIRTUAL NETWORKS (EDSV) Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 8, August 2014,

More information

Anomaly Detection in Cyber Networks using Graph-node Role-dynamics and NetFlow Bayesian Normalcy Modeling

Anomaly Detection in Cyber Networks using Graph-node Role-dynamics and NetFlow Bayesian Normalcy Modeling Anomaly Detection in Cyber Networks using Graph-node Role-dynamics and NetFlow Bayesian Normalcy Modeling Anthony Palladino, PhD, Senior Research Scientist Christopher Thissen, PhD, Research Scientist

More information

Introduction to Security

Introduction to Security IS 2150 / TEL 2810 Introduction to Security James Joshi Professor, SIS Lecture 12 2016 Intrusion Detection, Auditing System Firewalls & VPN 1 Intrusion Detection 2 Intrusion Detection/Response Denning:

More information

CARDS: A DISTRIBUTED SYSTEM FOR DETECTING COORDINATED ATTACKS

CARDS: A DISTRIBUTED SYSTEM FOR DETECTING COORDINATED ATTACKS CARDS: A DISTRIBUTED SYSTEM FOR DETECTING COORDINATED ATTACKS Jiahai Yang, Peng Ning, X. Sean Wang, and Sushil Jajodia Center for Secure Information Systems George Mason University Fairfax, VA 22030, USA

More information

Applying Real-Time Scheduling Techniques to Software Processes: A Position Paper

Applying Real-Time Scheduling Techniques to Software Processes: A Position Paper To Appear in Proc. of the 8th European Workshop on Software Process Technology.19-21 June 2001. Witten, Germany. Applying Real-Time Scheduling Techniques to Software Processes: A Position Paper Aaron G.

More information

Firewalls, Tunnels, and Network Intrusion Detection

Firewalls, Tunnels, and Network Intrusion Detection Firewalls, Tunnels, and Network Intrusion Detection 1 Intrusion Detection Systems Intrusion Actions aimed at compromising the security of the target (confidentiality, integrity, availability of computing/networking

More information

Multivariate Correlation Analysis based detection of DOS with Tracebacking

Multivariate Correlation Analysis based detection of DOS with Tracebacking 1 Multivariate Correlation Analysis based detection of DOS with Tracebacking Jasheeda P Student Department of CSE Kathir College of Engineering Coimbatore jashi108@gmail.com T.K.P.Rajagopal Associate Professor

More information

Detection and Analysis of Threats to the Energy Sector (DATES)

Detection and Analysis of Threats to the Energy Sector (DATES) Detection and Analysis of Threats to the Energy Sector (DATES) Sponsored by the Department of Energy National SCADA Test Bed Program Managed by the National Energy Technology Laboratory The views herein

More information

An advanced data leakage detection system analyzing relations between data leak activity

An advanced data leakage detection system analyzing relations between data leak activity An advanced data leakage detection system analyzing relations between data leak activity Min-Ji Seo 1 Ph. D. Student, Software Convergence Department, Soongsil University, Seoul, 156-743, Korea. 1 Orcid

More information

DNS Query Access and Backscattering SMTP Distributed Denial-of-Service Attack

DNS Query Access and Backscattering SMTP Distributed Denial-of-Service Attack DNS Query Access and Backscattering SMTP Distributed Denial-of-Service Attack Yasuo Musashi, Ryuichi Matsuba, and Kenichi Sugitani Center for Multimedia and Information Technologies, Kumamoto University,

More information

Web Gate Keeper: Detecting Encroachment in Multi-tier Web Application

Web Gate Keeper: Detecting Encroachment in Multi-tier Web Application Web Gate Keeper: Detecting Encroachment in Multi-tier Web Application Sanaz Jafari Prof.Dr.Suhas H. Patil (GUIDE) ABSTRACT The Internet services and different applications become vital part of every person

More information

CIP-014. JEA Compliance Approach. FRCC Fall Compliance Workshop Presenter Daniel Mishra

CIP-014. JEA Compliance Approach. FRCC Fall Compliance Workshop Presenter Daniel Mishra CIP-014 JEA Compliance Approach FRCC Fall Compliance Workshop Presenter Daniel Mishra Acronyms & Terminologies DHS Department of Homeland Security JEA It s not an acronym JSO Jacksonville Sheriff's Office

More information

Systems and Network Security (NETW-1002)

Systems and Network Security (NETW-1002) Systems and Network Security (NETW-1002) Dr. Mohamed Abdelwahab Saleh IET-Networks, GUC Spring 2017 Course Outline Basic concepts of security: Attacks, security properties, protection mechanisms. Basic

More information

A SYSTEM FOR DETECTION AND PRVENTION OF PATH BASED DENIAL OF SERVICE ATTACK

A SYSTEM FOR DETECTION AND PRVENTION OF PATH BASED DENIAL OF SERVICE ATTACK A SYSTEM FOR DETECTION AND PRVENTION OF PATH BASED DENIAL OF SERVICE ATTACK P.Priya 1, S.Tamilvanan 2 1 M.E-Computer Science and Engineering Student, Bharathidasan Engineering College, Nattrampalli. 2

More information

ProCurve Network Immunity

ProCurve Network Immunity ProCurve Network Immunity Hans-Jörg Elias Key Account Manager hans-joerg.elias@hp.com 2007 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.

More information

Ensemble of Soft Computing Techniques for Intrusion Detection. Ensemble of Soft Computing Techniques for Intrusion Detection

Ensemble of Soft Computing Techniques for Intrusion Detection. Ensemble of Soft Computing Techniques for Intrusion Detection Global Journal of Computer Science and Technology Network, Web & Security Volume 13 Issue 13 Version 1.0 Year 2013 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals

More information

A NEW APPROACH TO INTRUSION DETECTION SYSTEM

A NEW APPROACH TO INTRUSION DETECTION SYSTEM A NEW APPROACH TO INTRUSION DETECTION SYSTEM 1 A. KARTIT, 2 A. SAIDI, 3 F. BEZZAZI, 4 M. EL MARRAKI, 5 A. RADI 1,2,3,4,5 Laboratoire de Recherche en Informatique et Télécommunications, Faculty of Sciences,

More information

Combining Cross-Correlation and Fuzzy Classification to Detect Distributed Denial-of-Service Attacks*

Combining Cross-Correlation and Fuzzy Classification to Detect Distributed Denial-of-Service Attacks* Combining Cross-Correlation and Fuzzy Classification to Detect Distributed Denial-of-Service Attacks* Wei Wei 1, Yabo Dong 1, Dongming Lu 1, and Guang Jin 2 1 College of Compute Science and Technology,

More information

Fault Detection of Computer Communication Networks Using an Expert System

Fault Detection of Computer Communication Networks Using an Expert System American Journal of Applied Sciences 2 (10): 1407-1411, 2005 ISSN 1546-9239 2005 Science Publications Fault Detection of Computer Communication Networks Using an Expert System 1 Ibrahiem M.M. El Emary

More information

INTRUSION DETECTION AND CORRELATION. Challenges and Solutions

INTRUSION DETECTION AND CORRELATION. Challenges and Solutions INTRUSION DETECTION AND CORRELATION Challenges and Solutions Advances in Information Security Sushil Jajodia Consulting editor Center for Secure Information Systems George Mason University Fairfax, VA

More information

IMPROVED SHEWHART CHART USING MULTISCALE REPRESENTATION. A Thesis MOHAMMED ZIYAN SHERIFF

IMPROVED SHEWHART CHART USING MULTISCALE REPRESENTATION. A Thesis MOHAMMED ZIYAN SHERIFF IMPROVED SHEWHART CHART USING MULTISCALE REPRESENTATION A Thesis by MOHAMMED ZIYAN SHERIFF Submitted to the Office of Graduate and Professional Studies of Texas A&M University in partial fulfillment of

More information

A STUDY OF ANOMALY INTRUSION DETECTION USING MACHINE LEARNING TECHNIQUES

A STUDY OF ANOMALY INTRUSION DETECTION USING MACHINE LEARNING TECHNIQUES A STUDY OF ANOMALY INTRUSION DETECTION USING MACHINE LEARNING TECHNIQUES Zakiya Malek, Dr. Bhushan Trivedi GLS Institute of Technology Abstract-In the era of information systems and internet there is more

More information

Department of Electronic and Electrical Engineering, Loughborough University

Department of Electronic and Electrical Engineering, Loughborough University SMDS PEFOMANCE MONITOING : TAFFIC GENEATION, INFOMATION POCESSING & ANALYSIS Omar Bashir, Iain Phillips & David Parish + Abstract Many aspects of the performance of data communication networks can be determined

More information

M. Xie, G. Y. Hong and C. Wohlin, "A Study of Exponential Smoothing Technique in Software Reliability Growth Prediction", Quality and Reliability

M. Xie, G. Y. Hong and C. Wohlin, A Study of Exponential Smoothing Technique in Software Reliability Growth Prediction, Quality and Reliability M. Xie, G. Y. Hong and C. Wohlin, "A Study of Exponential Smoothing Technique in Software Reliability Growth Prediction", Quality and Reliability Engineering International, Vol.13, pp. 247-353, 1997. 1

More information

SCENARIO BASED ADAPTIVE PREPROCESSING FOR STREAM DATA USING SVM CLASSIFIER

SCENARIO BASED ADAPTIVE PREPROCESSING FOR STREAM DATA USING SVM CLASSIFIER SCENARIO BASED ADAPTIVE PREPROCESSING FOR STREAM DATA USING SVM CLASSIFIER P.Radhabai Mrs.M.Priya Packialatha Dr.G.Geetha PG Student Assistant Professor Professor Dept of Computer Science and Engg Dept

More information

DDoS Detection in SDN Switches using Support Vector Machine Classifier

DDoS Detection in SDN Switches using Support Vector Machine Classifier Joint International Mechanical, Electronic and Information Technology Conference (JIMET 2015) DDoS Detection in SDN Switches using Support Vector Machine Classifier Xue Li1, a *, Dongming Yuan2,b, Hefei

More information

INTEGRATING DATA MINING TECHNIQUES WITH INTRUSION DETECTION METHODS

INTEGRATING DATA MINING TECHNIQUES WITH INTRUSION DETECTION METHODS 3 INTEGRATING DATA MINING TECHNIQUES WITH INTRUSION DETECTION METHODS Ravi Mukkamala, Jason Gagnon and Sushil Jajodia Abstract Keywords: Intrusion detection systems like NIDES depend on the ability to

More information

Performance Degradation Assessment and Fault Diagnosis of Bearing Based on EMD and PCA-SOM

Performance Degradation Assessment and Fault Diagnosis of Bearing Based on EMD and PCA-SOM Performance Degradation Assessment and Fault Diagnosis of Bearing Based on EMD and PCA-SOM Lu Chen and Yuan Hang PERFORMANCE DEGRADATION ASSESSMENT AND FAULT DIAGNOSIS OF BEARING BASED ON EMD AND PCA-SOM.

More information

An attack-norm separation approach for detecting cyber attacks

An attack-norm separation approach for detecting cyber attacks Inf Syst Front (2006) 8:163 177 DOI 10.1007/s10796-006-8731-y An attack-norm separation approach for detecting cyber attacks Nong Ye Toni Farley Deepak Lakshminarasimhan Received: 28 July 2004 / Revised:

More information

Evidence Gathering for Network Security and Forensics DFRWS EU Dinil Mon Divakaran, Fok Kar Wai, Ido Nevat, Vrizlynn L. L.

Evidence Gathering for Network Security and Forensics DFRWS EU Dinil Mon Divakaran, Fok Kar Wai, Ido Nevat, Vrizlynn L. L. Evidence Gathering for Network Security and Forensics DFRWS EU 2017 Dinil Mon Divakaran, Fok Kar Wai, Ido Nevat, Vrizlynn L. L. Thing Talk outline Context and problem Objective Evidence gathering framework

More information

AN EFFICIENT DESIGN OF VLSI ARCHITECTURE FOR FAULT DETECTION USING ORTHOGONAL LATIN SQUARES (OLS) CODES

AN EFFICIENT DESIGN OF VLSI ARCHITECTURE FOR FAULT DETECTION USING ORTHOGONAL LATIN SQUARES (OLS) CODES AN EFFICIENT DESIGN OF VLSI ARCHITECTURE FOR FAULT DETECTION USING ORTHOGONAL LATIN SQUARES (OLS) CODES S. SRINIVAS KUMAR *, R.BASAVARAJU ** * PG Scholar, Electronics and Communication Engineering, CRIT

More information

CE Advanced Network Security

CE Advanced Network Security CE 817 - Advanced Network Security Lecture 5 Mehdi Kharrazi Department of Computer Engineering Sharif University of Technology Acknowledgments: Some of the slides are fully or partially obtained from other

More information

Internet Threat Detection System Using Bayesian Estimation

Internet Threat Detection System Using Bayesian Estimation Internet Threat Detection System Using Bayesian Estimation Masaki Ishiguro 1 Hironobu Suzuki 2 Ichiro Murase 1 Hiroyuki Ohno 3 Abstract. We present an Internet security threat detection system 4 using

More information

Fast Fuzzy Clustering of Infrared Images. 2. brfcm

Fast Fuzzy Clustering of Infrared Images. 2. brfcm Fast Fuzzy Clustering of Infrared Images Steven Eschrich, Jingwei Ke, Lawrence O. Hall and Dmitry B. Goldgof Department of Computer Science and Engineering, ENB 118 University of South Florida 4202 E.

More information

A Data Mining Approach for Intrusion Detection System Using Boosted Decision Tree Approach

A Data Mining Approach for Intrusion Detection System Using Boosted Decision Tree Approach A Data Mining Approach for Intrusion Detection System Using Boosted Decision Tree Approach 1 Priyanka B Bera, 2 Ishan K Rajani, 1 P.G. Student, 2 Professor, 1 Department of Computer Engineering, 1 D.I.E.T,

More information

Redundancy Resolution by Minimization of Joint Disturbance Torque for Independent Joint Controlled Kinematically Redundant Manipulators

Redundancy Resolution by Minimization of Joint Disturbance Torque for Independent Joint Controlled Kinematically Redundant Manipulators 56 ICASE :The Institute ofcontrol,automation and Systems Engineering,KOREA Vol.,No.1,March,000 Redundancy Resolution by Minimization of Joint Disturbance Torque for Independent Joint Controlled Kinematically

More information

A Modified Weibull Distribution

A Modified Weibull Distribution IEEE TRANSACTIONS ON RELIABILITY, VOL. 52, NO. 1, MARCH 2003 33 A Modified Weibull Distribution C. D. Lai, Min Xie, Senior Member, IEEE, D. N. P. Murthy, Member, IEEE Abstract A new lifetime distribution

More information

EWMA Based Two-Stage Dataset Shift-Detection in Non-stationary Environments

EWMA Based Two-Stage Dataset Shift-Detection in Non-stationary Environments EWMA Based Two-Stage Dataset Shift-Detection in Non-stationary Environments Haider Raza, Girijesh Prasad, Yuhua Li To cite this version: Haider Raza, Girijesh Prasad, Yuhua Li. EWMA Based Two-Stage Dataset

More information

MINI-PAPER A Gentle Introduction to the Analysis of Sequential Data

MINI-PAPER A Gentle Introduction to the Analysis of Sequential Data MINI-PAPER by Rong Pan, Ph.D., Assistant Professor of Industrial Engineering, Arizona State University We, applied statisticians and manufacturing engineers, often need to deal with sequential data, which

More information

Specification-based Intrusion Detection. Michael May CIS-700 Fall 2004

Specification-based Intrusion Detection. Michael May CIS-700 Fall 2004 Specification-based Intrusion Detection Michael May CIS-700 Fall 2004 Overview Mobile ad hoc networking (MANET) new area of protocols Some old networking solutions work (TCP/IP) but things change with

More information

User Scope. Runtime. Commands

User Scope. Runtime. Commands A COMPREHENSIVE SIMULATION PLATFORM FOR INTRUSION DETECTION IN DISTRIBUTED SYSTEMS K. Mantha, R. Chinchani & S. Upadhyaya K. Kwiat Department of Computer Science & Engineering Air Force Research Laboratory

More information

Learning Algorithms in the Detection of Unused Functionalities in SOA Systems

Learning Algorithms in the Detection of Unused Functionalities in SOA Systems Learning Algorithms in the Detection of Unused Functionalities in SOA Systems Ilona Bluemke and Marcin Tarka Institute of Computer Science, Warsaw University of Technology, Nowowiejska 15/19, 00-665 Warsaw,

More information

Computer Based Image Algorithm For Wireless Sensor Networks To Prevent Hotspot Locating Attack

Computer Based Image Algorithm For Wireless Sensor Networks To Prevent Hotspot Locating Attack Computer Based Image Algorithm For Wireless Sensor Networks To Prevent Hotspot Locating Attack J.Anbu selvan 1, P.Bharat 2, S.Mathiyalagan 3 J.Anand 4 1, 2, 3, 4 PG Scholar, BIT, Sathyamangalam ABSTRACT:

More information