TY - JOUR
T1 - A new intrusion detection method based on discriminant analysis
AU - Asaka, Midori
AU - Onabuta, Takefumi
AU - Inoue, Tadashi
AU - Okazawa, Shunji
AU - Goto, Shigeki
PY - 2001/5
Y1 - 2001/5
N2 - Many methods have been proposed to detect intrusions; for example, the pattern matching method on known intrusion patterns and the statistical approach to detecting deviation from normal activities. We investigated a new method for detecting intrusions based on the number of system calls during a user's network activity on a host machine. This method attempts to separate intrusions from normal activities by using discriminant analysis, a kind of multivariate analysis. We can detect intrusions by analyzing only 11 system calls occurring on a host machine by discriminant analysis with the Mahalanobis' distance, and can also tell whether an unknown sample is an intrusion. Our approach is a lightweight intrusion detection method, given that it requires only 11 system calls for analysis. Moreover, our approach does not require user profiles or a user activity database in order to detect intrusions. This paper explains our new method for the separation of intrusions and normal behavior by discriminant analysis, and describes the classification method by which to identify an unknown behavior.
AB - Many methods have been proposed to detect intrusions; for example, the pattern matching method on known intrusion patterns and the statistical approach to detecting deviation from normal activities. We investigated a new method for detecting intrusions based on the number of system calls during a user's network activity on a host machine. This method attempts to separate intrusions from normal activities by using discriminant analysis, a kind of multivariate analysis. We can detect intrusions by analyzing only 11 system calls occurring on a host machine by discriminant analysis with the Mahalanobis' distance, and can also tell whether an unknown sample is an intrusion. Our approach is a lightweight intrusion detection method, given that it requires only 11 system calls for analysis. Moreover, our approach does not require user profiles or a user activity database in order to detect intrusions. This paper explains our new method for the separation of intrusions and normal behavior by discriminant analysis, and describes the classification method by which to identify an unknown behavior.
KW - Discriminant analysis
KW - Intrusion detection
KW - Multivariate analysis
KW - Network security
KW - System call
UR - http://www.scopus.com/inward/record.url?scp=0035338003&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=0035338003&partnerID=8YFLogxK
M3 - Article
AN - SCOPUS:0035338003
SN - 0916-8532
VL - E84-D
SP - 570
EP - 577
JO - IEICE Transactions on Information and Systems
JF - IEICE Transactions on Information and Systems
IS - 5
ER -