Anomaly Detection Based on Chi-Square Statistic Technology in Computer Information System

Article Preview

Abstract:

Algorithm and principle of anomaly detection technique based on a chi-square statistic was designed. In order to verify the effect of principle and algorithm, testing data of sample of Windows7 and Mac OS system was presented and compared. The results of this study show that chi-square technology achieves the 0% false alarm rate and the 100% detection rate for abnormal intrusion scenarios. All intrusion scenarios are detected at the first or second audit event.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

1046-1049

Citation:

Online since:

November 2013

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] K. C, FINK G, LEVITT K: Execution monitoring of security critical programs in distributed systems: A specification-based approach, Proceedings of the 1997 IEEE Symposium on Security and Privacy[C], Oakland, CA: IEEE Computer Society Press1997. 134–144.

DOI: 10.1109/secpri.1997.601332

Google Scholar

[2] JAVITZ HS, VALDES A: The SRI statistical anomaly detector, " Proceedings of the 1991 IEEE Symposium on Research in Security and Privacy, Oakland, CA: IEEE Computer Society Press, (1991).

DOI: 10.1109/risp.1991.130799

Google Scholar

[3] JOU Y, GONH F, etc.: Design and implementation of a scalable intrusion detection system for the protection of network infrastructure, Proceedings of the DARPA Information Survivability Conference and Exposition. Los Alamitos, CA: IEEE Computer Society, 2000; 69–83.

DOI: 10.1109/discex.2000.821510

Google Scholar

[4] FORREST S, HOFMEYR SA, SOMAYAJI A: Computer immunology. Communications of the ACM, 1997, 40(10): 88–96.

DOI: 10.1145/262793.262811

Google Scholar

[5] D.C. MONTGOMERY: Introduction to statistical quality control, Fourth Edition. New York. John Wiley & Sons, (2001).

Google Scholar

[6] WangFeng-Yu,Cao Shou-Feng ,etc.: Method of Detecting Application-Layer DDOS Based on the Out-Linking Behavior of Web Community, Journal of Software, 2013(6): 1263-1273.

DOI: 10.3724/sp.j.1001.2013.04274

Google Scholar