Multivariate statistical analysis of audit trails for host-based intrusion detection

被引:157
作者
Ye, N
Emran, SM
Chen, Q
Vilbert, S
机构
[1] Arizona State Univ, Tempe, AZ 85287 USA
[2] Motorola Inc, Schaumburg, IL 60173 USA
关键词
computer security; intrusion detection; multivariate statistical analysis; chi-square test; Hotelling's T-2 test;
D O I
10.1109/TC.2002.1017701
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Intrusion detection complements prevention mehcanisms, such as firewalls, cryptography, and authentication, to capture intrusions into an information system while they are acting on the information system. Our study investigates a multivariate quality control technique to detect intrusions by building a long-term profile of normal activities in information systems (norm profile) and using the norm profile to detect anomalies. The multivariate quality control technique is based on Hotelling's T-2 test that detects both counterrelationship anomalies and mean-shift anomalies. The performance of the Hotelling's T-2 test is examined on two sets of computer audit data: a small data set and a large multiday data set. Both data sets contain sessions of normal and intrusive activities. For the small data set, the Hotelling's T-2 test signals all the intrusion sessions and produces no false alarms for the normal sessions. For the large data set, the Hotelling's T-2 test signals 92 percent of the intrusion sessions while producing no false alarms for the normal sessions. The performance of the Hotelling's T-2 test is also compared with the performance of a more scalable multivariate technique-a chi-squared distance test.
引用
收藏
页码:810 / 820
页数:11
相关论文
共 28 条
  • [1] Anderson D., 1995, SRICSL9707
  • [2] [Anonymous], 1999, APPL MULTIVARIATE AN
  • [3] [Anonymous], 1995, NETWORK SECURITY PRI
  • [4] Power comparisons for a Hotelling's T2 statistic
    Chou, YM
    Mason, RL
    Young, JC
    [J]. COMMUNICATIONS IN STATISTICS-SIMULATION AND COMPUTATION, 1999, 28 (04) : 1031 - 1050
  • [5] *DARPA, 2000, P DARPA INF SURV C E
  • [6] Towards a taxonomy of intrusion-detection systems
    Debar, H
    Dacier, M
    Wespi, A
    [J]. COMPUTER NETWORKS-THE INTERNATIONAL JOURNAL OF COMPUTER AND TELECOMMUNICATIONS NETWORKING, 1999, 31 (08): : 805 - 822
  • [7] AN INTRUSION-DETECTION MODEL
    DENNING, DE
    [J]. IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 1987, 13 (02) : 222 - 232
  • [8] Escamilla T., 1998, Intrusion detection: network security beyond the firewall
  • [10] Computer immunology
    Forrest, S
    Hofmeyr, SA
    Somayaji, A
    [J]. COMMUNICATIONS OF THE ACM, 1997, 40 (10) : 88 - 96