Technique for Denial-of-Service Intrusion Detection Using Non-Subsampled Shearlet Transform

Article Preview

Abstract:

In this paper, an efficient anomaly analysis method that is proved to be more efficient and less complex than the existing techniques has been proposed. The approach relies on monitoring the security state by using a set of accurate metrics. The Non-Subsampled Shearlet Transform (NSST) is used to decompose these metrics. Attacks are viewed as singularities that arise in some specific points of time. Therefore, the anomaly detection process is performed through processing the signals representing the metrics. Experimental results indicate that the proposed technique is effective and promising.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

2515-2518

Citation:

Online since:

January 2015

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2015 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] S. Northcutt and J. Novak. Network Intrusion Detection, SAMS, third ed., ISBN: 0735712654, (2002).

Google Scholar

[2] L. A. Gordon, M. P. Loeb, W. Lucyshyn and R. Richardson, 10th annual CSI/FBI computer crime and security survey, Computer Security Institute (2005).

Google Scholar

[3] Australian Crime and Security Survey, ISBN: 1-864-99800-8.

Google Scholar

[4] Worldwide ISP Security Report, Arbor Networks, September (2005).

Google Scholar

[5] G. Easley, D. Labate and W. Q. Lim. Sparse directional image representation using the discrete shearlet transforms, Applied and Computational Harmonic Analysis, 25, 25-46 (2008).

DOI: 10.1016/j.acha.2007.09.003

Google Scholar