Abstract
In order to detect intrusions, IDA (Intrusion Detection Agent system) initially monitors system logs in order to discover an MLSI - which is a certain event which in many cases occurs during an intrusion. If an MLSI is found, then IDA judges whether the MLSI is accompanied by an intrusion. We adopt discriminant analysis to analyze information after IDA detects an MLSI in a remote attack. Discriminant analysis provides a classification function that allows IDA to separate intrusive activities from nonintrusive activities. Using discriminant analysis, we can detect intrusions by analyzing only a part of the system calls occurring on a host machine, and we can determine whether an unknown sample is an intrusion. In this paper, we explain in detail how we perform discriminant analysis to detect intrusions, and evaluate the classification function. We also describe how to extract a sample from system logs, which is necessary to implement the discriminant analysis function in IDA.
Original language | English |
---|---|
Pages (from-to) | 50-62 |
Number of pages | 13 |
Journal | Electronics and Communications in Japan, Part I: Communications (English translation of Denshi Tsushin Gakkai Ronbunshi) |
Volume | 86 |
Issue number | 4 |
DOIs | |
Publication status | Published - 2003 Apr |
Keywords
- Computer security
- Discriminant analysis
- Intrusion detection agent (IDA)
- Marks left by suspected intruders (MLSI)
- Remote attack detection
ASJC Scopus subject areas
- Computer Networks and Communications
- Electrical and Electronic Engineering