Remote attack detection method in IDA: MLSI-based intrusion detection with discriminant analysis

Midori Asaka*, Takefumi Onabuta, Tadashi Inoue, Shunji Okazawa, Shigeki Goto

*Corresponding author for this work

    Research output: Contribution to journalArticlepeer-review

    Abstract

    In order to detect intrusions, IDA (Intrusion Detection Agent system) initially monitors system logs in order to discover an MLSI - which is a certain event which in many cases occurs during an intrusion. If an MLSI is found, then IDA judges whether the MLSI is accompanied by an intrusion. We adopt discriminant analysis to analyze information after IDA detects an MLSI in a remote attack. Discriminant analysis provides a classification function that allows IDA to separate intrusive activities from nonintrusive activities. Using discriminant analysis, we can detect intrusions by analyzing only a part of the system calls occurring on a host machine, and we can determine whether an unknown sample is an intrusion. In this paper, we explain in detail how we perform discriminant analysis to detect intrusions, and evaluate the classification function. We also describe how to extract a sample from system logs, which is necessary to implement the discriminant analysis function in IDA.

    Original languageEnglish
    Pages (from-to)50-62
    Number of pages13
    JournalElectronics and Communications in Japan, Part I: Communications (English translation of Denshi Tsushin Gakkai Ronbunshi)
    Volume86
    Issue number4
    DOIs
    Publication statusPublished - 2003 Apr

    Keywords

    • Computer security
    • Discriminant analysis
    • Intrusion detection agent (IDA)
    • Marks left by suspected intruders (MLSI)
    • Remote attack detection

    ASJC Scopus subject areas

    • Computer Networks and Communications
    • Electrical and Electronic Engineering

    Fingerprint

    Dive into the research topics of 'Remote attack detection method in IDA: MLSI-based intrusion detection with discriminant analysis'. Together they form a unique fingerprint.

    Cite this