Multivariate statistical analysis of audit trails for host-based intrusion detection

被引:158
作者
Ye, N
Emran, SM
Chen, Q
Vilbert, S
机构
[1] Arizona State Univ, Tempe, AZ 85287 USA
[2] Motorola Inc, Schaumburg, IL 60173 USA
关键词
computer security; intrusion detection; multivariate statistical analysis; chi-square test; Hotelling's T-2 test;
D O I
10.1109/TC.2002.1017701
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Intrusion detection complements prevention mehcanisms, such as firewalls, cryptography, and authentication, to capture intrusions into an information system while they are acting on the information system. Our study investigates a multivariate quality control technique to detect intrusions by building a long-term profile of normal activities in information systems (norm profile) and using the norm profile to detect anomalies. The multivariate quality control technique is based on Hotelling's T-2 test that detects both counterrelationship anomalies and mean-shift anomalies. The performance of the Hotelling's T-2 test is examined on two sets of computer audit data: a small data set and a large multiday data set. Both data sets contain sessions of normal and intrusive activities. For the small data set, the Hotelling's T-2 test signals all the intrusion sessions and produces no false alarms for the normal sessions. For the large data set, the Hotelling's T-2 test signals 92 percent of the intrusion sessions while producing no false alarms for the normal sessions. The performance of the Hotelling's T-2 test is also compared with the performance of a more scalable multivariate technique-a chi-squared distance test.
引用
收藏
页码:810 / 820
页数:11
相关论文
共 28 条
[1]  
Anderson D., 1995, SRICSL9707
[2]  
[Anonymous], 1999, APPL MULTIVARIATE AN
[3]  
[Anonymous], 1995, NETWORK SECURITY PRI
[4]   Power comparisons for a Hotelling's T2 statistic [J].
Chou, YM ;
Mason, RL ;
Young, JC .
COMMUNICATIONS IN STATISTICS-SIMULATION AND COMPUTATION, 1999, 28 (04) :1031-1050
[5]  
*DARPA, 2000, P DARPA INF SURV C E
[6]   Towards a taxonomy of intrusion-detection systems [J].
Debar, H ;
Dacier, M ;
Wespi, A .
COMPUTER NETWORKS-THE INTERNATIONAL JOURNAL OF COMPUTER AND TELECOMMUNICATIONS NETWORKING, 1999, 31 (08) :805-822
[7]   AN INTRUSION-DETECTION MODEL [J].
DENNING, DE .
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 1987, 13 (02) :222-232
[8]  
Escamilla T., 1998, Intrusion detection: network security beyond the firewall
[10]   Computer immunology [J].
Forrest, S ;
Hofmeyr, SA ;
Somayaji, A .
COMMUNICATIONS OF THE ACM, 1997, 40 (10) :88-96