Algorithm enhancement for host-based intrusion detection system using discriminant analysis

Algorithms for building detection models are usually classified into two categories: misuse detection and anomaly detection. Misuse detection algorithms model know attack behavior. They compare sensor data to attack patterns learned from the training data. Anomaly detection algorithms model normal b...

Full description

Saved in:
Bibliographic Details
Main Author: Dahlan, Dahliyusmanto
Format: Thesis
Language:English
Published: 2004
Subjects:
Online Access:http://eprints.utm.my/id/eprint/3202/1/DahliyusmantoMFC2004.pdf
http://eprints.utm.my/id/eprint/3202/
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Universiti Teknologi Malaysia
Language: English
id my.utm.3202
record_format eprints
spelling my.utm.32022018-06-26T07:56:19Z http://eprints.utm.my/id/eprint/3202/ Algorithm enhancement for host-based intrusion detection system using discriminant analysis Dahlan, Dahliyusmanto QA75 Electronic computers. Computer science Algorithms for building detection models are usually classified into two categories: misuse detection and anomaly detection. Misuse detection algorithms model know attack behavior. They compare sensor data to attack patterns learned from the training data. Anomaly detection algorithms model normal behavior. Anomaly detection models compare sensor data to normal patterns learned from the training data by using statistical method and try to detect activity that deviates from normal activity. Although Anomaly IDS might be complete, its accuracy is questionable since this approach suffers from a high false positive alarm rate and misclassification. This thesis expects an enhancement algorithm to be able to reduce a false positive alarm and misclassification rate. This research investigated a discriminant analysis method for detecting intrusions based on number of system calls during an activity on host machine. This method attempts to separate intrusions from normal activities. This research detects intrusions by analyzing at least system call occurring on activities, and can also tell whether an activity is an intrusion. The focus of this analysis is on original observations that performed a detecting outlier and power transformation to transform not normally distributed data to near normality. The correlation of each system calls are examined using coefficient correlations of each selected system call variables. This approach is a lightweight intrusion detection method, given that requires only nine system calls that are strongly correlated to intrusions for analysis. Moreover, this approach does not require user profiles or a user activity database in order to detect intrusions. Lastly, this method can reduce a high false positive alarm rate and misclassification for detecting process. 2004-07-20 Thesis NonPeerReviewed application/pdf en http://eprints.utm.my/id/eprint/3202/1/DahliyusmantoMFC2004.pdf Dahlan, Dahliyusmanto (2004) Algorithm enhancement for host-based intrusion detection system using discriminant analysis. Masters thesis, Universiti Teknologi Malaysia.
institution Universiti Teknologi Malaysia
building UTM Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider Universiti Teknologi Malaysia
content_source UTM Institutional Repository
url_provider http://eprints.utm.my/
language English
topic QA75 Electronic computers. Computer science
spellingShingle QA75 Electronic computers. Computer science
Dahlan, Dahliyusmanto
Algorithm enhancement for host-based intrusion detection system using discriminant analysis
description Algorithms for building detection models are usually classified into two categories: misuse detection and anomaly detection. Misuse detection algorithms model know attack behavior. They compare sensor data to attack patterns learned from the training data. Anomaly detection algorithms model normal behavior. Anomaly detection models compare sensor data to normal patterns learned from the training data by using statistical method and try to detect activity that deviates from normal activity. Although Anomaly IDS might be complete, its accuracy is questionable since this approach suffers from a high false positive alarm rate and misclassification. This thesis expects an enhancement algorithm to be able to reduce a false positive alarm and misclassification rate. This research investigated a discriminant analysis method for detecting intrusions based on number of system calls during an activity on host machine. This method attempts to separate intrusions from normal activities. This research detects intrusions by analyzing at least system call occurring on activities, and can also tell whether an activity is an intrusion. The focus of this analysis is on original observations that performed a detecting outlier and power transformation to transform not normally distributed data to near normality. The correlation of each system calls are examined using coefficient correlations of each selected system call variables. This approach is a lightweight intrusion detection method, given that requires only nine system calls that are strongly correlated to intrusions for analysis. Moreover, this approach does not require user profiles or a user activity database in order to detect intrusions. Lastly, this method can reduce a high false positive alarm rate and misclassification for detecting process.
format Thesis
author Dahlan, Dahliyusmanto
author_facet Dahlan, Dahliyusmanto
author_sort Dahlan, Dahliyusmanto
title Algorithm enhancement for host-based intrusion detection system using discriminant analysis
title_short Algorithm enhancement for host-based intrusion detection system using discriminant analysis
title_full Algorithm enhancement for host-based intrusion detection system using discriminant analysis
title_fullStr Algorithm enhancement for host-based intrusion detection system using discriminant analysis
title_full_unstemmed Algorithm enhancement for host-based intrusion detection system using discriminant analysis
title_sort algorithm enhancement for host-based intrusion detection system using discriminant analysis
publishDate 2004
url http://eprints.utm.my/id/eprint/3202/1/DahliyusmantoMFC2004.pdf
http://eprints.utm.my/id/eprint/3202/
_version_ 1643643757640286208