Presentation | 2007-05-18 Proposal of the cyber attack detection model based on multivariate analysis Yuto SAKAI, Koichiro RINSAKA, Tadashi DOHI, |
---|---|
PDF Download Page | PDF download Page Link |
Abstract(in Japanese) | (See Japanese page) |
Abstract(in English) | In many computer network systems, in order to secure an information security, the intrusion detection systems (IDS) are installed. The present paper proposes the framework for detecting illegal access using the audit data observed on the host machine. More precisely, many types of audit events cluster into fewer groups through both the qualification method IV and the cluster analysis. Our aim is improving the cyber-attack detection accuracy in the case where attack activities are intermingled with normal activities. In the simulation experiments, we show the effectiveness of the proposed method as compared with the existing cyber-attack detection method based on the Markov chain. |
Keyword(in Japanese) | (See Japanese page) |
Keyword(in English) | illegal access / statistical attack detection / multivariate analysis / quantification method / cluster analysis |
Paper # | R2007-8 |
Date of Issue |
Conference Information | |
Committee | R |
---|---|
Conference Date | 2007/5/11(1days) |
Place (in Japanese) | (See Japanese page) |
Place (in English) | |
Topics (in Japanese) | (See Japanese page) |
Topics (in English) | |
Chair | |
Vice Chair | |
Secretary | |
Assistant |
Paper Information | |
Registration To | Reliability(R) |
---|---|
Language | JPN |
Title (in Japanese) | (See Japanese page) |
Sub Title (in Japanese) | (See Japanese page) |
Title (in English) | Proposal of the cyber attack detection model based on multivariate analysis |
Sub Title (in English) | |
Keyword(1) | illegal access |
Keyword(2) | statistical attack detection |
Keyword(3) | multivariate analysis |
Keyword(4) | quantification method |
Keyword(5) | cluster analysis |
1st Author's Name | Yuto SAKAI |
1st Author's Affiliation | Department of Information Engineering, Graduate School of Engineering, Hiroshima University() |
2nd Author's Name | Koichiro RINSAKA |
2nd Author's Affiliation | Faculty of Business Administration, Kobe Gakuin University |
3rd Author's Name | Tadashi DOHI |
3rd Author's Affiliation | Department of Information Engineering, Graduate School of Engineering, Hiroshima University |
Date | 2007-05-18 |
Paper # | R2007-8 |
Volume (vol) | vol.107 |
Number (no) | 43 |
Page | pp.pp.- |
#Pages | 6 |
Date of Issue |