Remote attack detection method in IDA: MLSI-based intrusion detection using discriminant analysis

被引:3
作者
Asaka, M [1 ]
Onabura, T [1 ]
Inoue, T [1 ]
Goto, S [1 ]
机构
[1] Informat Technol Promot Agency, Software Technol Ctr, Bunkyo Ku, Tokyo, Japan
来源
2002 SYMPOSIUM ON APPLICATIONS AND THE INTERNET (SAINT 2002), PROCEEDINGS | 2002年
关键词
D O I
10.1109/SAINT.2002.994451
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In order to detect intrusions, IDA (Intrusion Detection Agent system) initially monitors system, logs ill order to discover all MLSI - which is all certain event Which ill many cases occurs during an intrusion. If all,MLSI is found. then IDA Judges whether the MLSI is accompanied by all intrusion. We adopt discriminant analysis to analyze information after IDA detects,in MLSI in a remote attack. Discriminant analysis provides a classification function that allows IDA to,separate intrusive activities from non-intrusive activities. Using discriminant analysis. we call detect intrusions by analyzing only a part of system calls occurring Oil, a host machine. and we can determine whether all unknown sample is all intrusion. In this paper, we explain in detail how we perform discriminant analysis to detect intrusions, and evaluate the classification function. We also describe how to extract a sample from system logs, which is necessary to implement the discriminant analysis function in IDA.
引用
收藏
页码:64 / 73
页数:10
相关论文
共 16 条
[1]  
[Anonymous], 1999, APPL MULTIVARIATE AN
[2]  
Asaka M., 1999, Systems and Computers in Japan, V30, P31, DOI 10.1002/(SICI)1520-684X(199902)30:2<31::AID-SCJ4>3.0.CO
[3]  
2-F
[4]  
Asaka M, 1999, IEICE T COMMUN, VE82B, P1826
[5]  
Asaka M, 2001, IEICE T INF SYST, VE84D, P570
[6]   AN ANALYSIS OF TRANSFORMATIONS [J].
BOX, GEP ;
COX, DR .
JOURNAL OF THE ROYAL STATISTICAL SOCIETY SERIES B-STATISTICAL METHODOLOGY, 1964, 26 (02) :211-252
[7]   AN INTRUSION-DETECTION MODEL [J].
DENNING, DE .
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 1987, 13 (02) :222-232
[8]   The statistical utilization of multiple measurements [J].
Fisher, RA .
ANNALS OF EUGENICS, 1938, 8 :376-386
[9]  
FORREST S, 1996, P IEEE S COMP SEC PR
[10]  
HOFMEYR SA, 1998, COMPUTER SECURITY, V6, P151