Abstract
An intrusion detection system (IDS) detects the malicious activities, running in the system that may be a single system or a networked system. Furthermore, the intrusion-based systems monitor the data in a system against the suspicious activities and also secure the entire network. Detection of malicious attacks with kee** acceptability of low false alarm rate is a challenging task in intrusion detection. In this paper, we analyze the three statistical approaches namely principal component analysis (PCA), linear discriminant analysis (LDA), and naive Bayes classifier (NBC), employed in host-based intrusion detection systems (HIDS) and we detect the accuracy rate using these approaches.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Singh, S., Silakari, S.: Generalized Discriminant Analysis Algorithm for Feature Reduction in Cyber-Attack Detection System. ar**v preprint ar**v:0911.0787 (2009)
Tan, Z., Jamdagni, A., He, X., Nanda, P.: Network intrusion detection based on LDA for payload feature selection. In: IEEE GLOBECOM Workshops, pp. 1545–1549 (2010)
He, X., Yan, S., Hu, Y., Niyogi, P., Zhang, H.J.: Face recognition using Laplacian faces. IEEE Trans. Pattern Anal. Mach. Intell. 27(3), 328–340 (2005)
Aydın, M.A., Zaim, A.H., Ceylan, K.G.: A hybrid intrusion detection system design for computer network security. Comput. Electr. Eng. 35(3), 517–526 (2009)
Gascon, H., Orfila, A., Blasco, J.: Analysis of update delays in signature-based network intrusion detection systems. Comput. Secur. 30(8), 613–624 (2011)
Moskovitch, R., Pluderman, S., Gus, I., Stopel, D., Feher, C., Parmet, Y., Elovici, Y.: Host based intrusion detection using machine learning. In: IEEE Intelligence and Security Informatics, pp. 107–114 (2007)
Delac, K., Grgic, M., Grgic, S.: Independent comparative study of PCA, ICA, and LDA on the FERET data set. Int. J. Imaging Syst. Technol. 15(5), 252–260 (2005)
Kasliwal, B., Bhatia, S., Saini, S., Kumar, C.A.: A hybrid anomaly detection model using G-LDA. In: IEEE International Advance Computing Conference (IACC), 2014, pp. 288–293 (2014)
Patcha, A., Park, J.M.: An overview of anomaly detection techniques: existing solutions and latest technological trends. Comput. Netw. 51(12), 3448–3470 (2007)
Mechtri, L., Tolba, F.D., Ghoualmi, N.: Intrusion detection using principal component analysis. In: Second International Conference on Engineering Systems Management and Its Applications (ICESMA), 2010, pp. 1–6 (2010)
Labib, K., Vemuri, V.R.: An application of principal component analysis to the detection and visualization of computer network attacks. Ann. Télécommun. 61(1–2), 218–234 (2006)
Om, H., Hazra, T.: Statistical techniques in anomaly intrusion detection system. Int. J. Adv. Eng. Technol. 5(1), 387–398 (2012)
Hsu, C.C., Huang, Y.P., Chang, K.W.: Extended Naive Bayes classifier for mixed data. Expert Syst. Appl. 35(3), 1080–1083 (2008)
Imran, H.M., Abdullah, A.B., Hussain, M., Palaniappan, S., Ahmad, I.: Intrusions detection based on optimum features subset and efficient dataset selection. Int. J. Eng. Innovative Technol. 2, 265–270 (2012)
MartÃnez, A.M., Kak, A.C.: PCA versus LDA. IEEE Trans. Pattern Anal. Mach. Intell. 23(2), 228–233 (2001)
Mukherjee, S., Sharma, N.: Intrusion detection using naive Bayes classifier with feature reduction. Procedia Technol. 4, 119–128 (2012)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer India
About this paper
Cite this paper
Gautam, S.K., Om, H. (2016). Host-Based Intrusion Detection Using Statistical Approaches. In: Das, S., Pal, T., Kar, S., Satapathy, S., Mandal, J. (eds) Proceedings of the 4th International Conference on Frontiers in Intelligent Computing: Theory and Applications (FICTA) 2015. Advances in Intelligent Systems and Computing, vol 404. Springer, New Delhi. https://doi.org/10.1007/978-81-322-2695-6_40
Download citation
DOI: https://doi.org/10.1007/978-81-322-2695-6_40
Published:
Publisher Name: Springer, New Delhi
Print ISBN: 978-81-322-2693-2
Online ISBN: 978-81-322-2695-6
eBook Packages: EngineeringEngineering (R0)