Multivariate Statistical Analysis of Audit Trails for Host-Based Intrusion Detection

نویسندگان

  • Nong Ye
  • Syed Masum Emran
  • Qiang Chen
  • Sean Vilbert
چکیده

ÐIntrusion detection complements prevention mehcanisms, such as firewalls, cryptography, and authentication, to capture intrusions into an information system while they are acting on the information system. Our study investigates a multivariate quality control technique to detect intrusions by building a long-term profile of normal activities in information systems (norm profile) and using the norm profile to detect anomalies. The multivariate quality control technique is based on Hotelling's T test that detects both counterrelationship anomalies and mean-shift anomalies. The performance of the Hotelling's T test is examined on two sets of computer audit data: a small data set and a large multiday data set. Both data sets contain sessions of normal and intrusive activities. For the small data set, the Hotelling's T test signals all the intrusion sessions and produces no false alarms for the normal sessions. For the large data set, the Hotelling's T test signals 92 percent of the intrusion sessions while producing no false alarms for the normal sessions. The performance of the Hotelling's T test is also compared with the performance of a more scalable multivariate techniqueÐa chi-squared distance test. Index TermsÐComputer security, intrusion detection, multivariate statistical analysis, chi-square test, and Hotelling's T test.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Network Audit System for Host-based Intrusion Detection (NASHID) CERIAS

Recent work has shown that conventional operating system audit trails are insufficient to detect low-level network attacks. Because audit trails are typically based upon system calls or application sources, operations in the network protocol stack go unaudited. Earlier work has determined the audit data needed to detect low-level network attacks. In this paper we describe an implementation of a...

متن کامل

Host-Based Intrusion Detection Using Self-Organizing Maps

Hierarchical SOMs are applied to the problem of host based intrusion detection on computer networks. Unlike systems based on operating system audit trails, the approach operates on real-time data without extensive off-line training and with minimal expert knowledge. Specific recommendations are made regarding the representation of time, network parameters and SOM architecture.

متن کامل

Using Program Behavior Pro les for Intrusion Detection

Intrusion detection and response has traditionally been performed at the network and host levels That is intrusion monitors will typically analyze network packet logs or host machine audit logs for signs of intrusion activity More often than not commercial o the shelf COTS intrusion detection tools use ngerprints of known intrusions to detect their presence in these audit trails Both these appr...

متن کامل

Audit Trail Based on Process Mining and Log

An audit trail is an evidence of all procedures that take place in a system and across a network; it provides an outline of user/system events so that safety measures events can be associated to the actions of a specie individual or system element. Audit trails can be inspected for the existence or nonexistence of confident patterns. Audit trails can be used for measuring security issues, acces...

متن کامل

Identification of Host Audit Data to Detect Attacks on Low-level IP Vulnerabilities

Conventional host-based and network-based intrusion and misuse detection systems have concentrated on detecting network-based and internal attacks, but little work has addressed host-based detection of low-level network attacks. A major reason for this is the misuse detection system’s dependence on audit data and the absence of low-level network data in audit trails. This work defines low-level...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • IEEE Trans. Computers

دوره 51  شماره 

صفحات  -

تاریخ انتشار 2002