Skip to main content

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 404))

  • 813 Accesses

Abstract

An intrusion detection system (IDS) detects the malicious activities, running in the system that may be a single system or a networked system. Furthermore, the intrusion-based systems monitor the data in a system against the suspicious activities and also secure the entire network. Detection of malicious attacks with keeping acceptability of low false alarm rate is a challenging task in intrusion detection. In this paper, we analyze the three statistical approaches namely principal component analysis (PCA), linear discriminant analysis (LDA), and naive Bayes classifier (NBC), employed in host-based intrusion detection systems (HIDS) and we detect the accuracy rate using these approaches.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Singh, S., Silakari, S.: Generalized Discriminant Analysis Algorithm for Feature Reduction in Cyber-Attack Detection System. arXiv preprint arXiv:0911.0787 (2009)

  2. Tan, Z., Jamdagni, A., He, X., Nanda, P.: Network intrusion detection based on LDA for payload feature selection. In: IEEE GLOBECOM Workshops, pp. 1545–1549 (2010)

    Google Scholar 

  3. He, X., Yan, S., Hu, Y., Niyogi, P., Zhang, H.J.: Face recognition using Laplacian faces. IEEE Trans. Pattern Anal. Mach. Intell. 27(3), 328–340 (2005)

    Article  Google Scholar 

  4. Aydın, M.A., Zaim, A.H., Ceylan, K.G.: A hybrid intrusion detection system design for computer network security. Comput. Electr. Eng. 35(3), 517–526 (2009)

    Article  MATH  Google Scholar 

  5. Gascon, H., Orfila, A., Blasco, J.: Analysis of update delays in signature-based network intrusion detection systems. Comput. Secur. 30(8), 613–624 (2011)

    Article  Google Scholar 

  6. Moskovitch, R., Pluderman, S., Gus, I., Stopel, D., Feher, C., Parmet, Y., Elovici, Y.: Host based intrusion detection using machine learning. In: IEEE Intelligence and Security Informatics, pp. 107–114 (2007)

    Google Scholar 

  7. Delac, K., Grgic, M., Grgic, S.: Independent comparative study of PCA, ICA, and LDA on the FERET data set. Int. J. Imaging Syst. Technol. 15(5), 252–260 (2005)

    Article  Google Scholar 

  8. Kasliwal, B., Bhatia, S., Saini, S., Kumar, C.A.: A hybrid anomaly detection model using G-LDA. In: IEEE International Advance Computing Conference (IACC), 2014, pp. 288–293 (2014)

    Google Scholar 

  9. Patcha, A., Park, J.M.: An overview of anomaly detection techniques: existing solutions and latest technological trends. Comput. Netw. 51(12), 3448–3470 (2007)

    Article  Google Scholar 

  10. Mechtri, L., Tolba, F.D., Ghoualmi, N.: Intrusion detection using principal component analysis. In: Second International Conference on Engineering Systems Management and Its Applications (ICESMA), 2010, pp. 1–6 (2010)

    Google Scholar 

  11. Labib, K., Vemuri, V.R.: An application of principal component analysis to the detection and visualization of computer network attacks. Ann. Télécommun. 61(1–2), 218–234 (2006)

    Article  Google Scholar 

  12. Om, H., Hazra, T.: Statistical techniques in anomaly intrusion detection system. Int. J. Adv. Eng. Technol. 5(1), 387–398 (2012)

    Google Scholar 

  13. Hsu, C.C., Huang, Y.P., Chang, K.W.: Extended Naive Bayes classifier for mixed data. Expert Syst. Appl. 35(3), 1080–1083 (2008)

    Article  Google Scholar 

  14. Imran, H.M., Abdullah, A.B., Hussain, M., Palaniappan, S., Ahmad, I.: Intrusions detection based on optimum features subset and efficient dataset selection. Int. J. Eng. Innovative Technol. 2, 265–270 (2012)

    Google Scholar 

  15. Martínez, A.M., Kak, A.C.: PCA versus LDA. IEEE Trans. Pattern Anal. Mach. Intell. 23(2), 228–233 (2001)

    Article  Google Scholar 

  16. Mukherjee, S., Sharma, N.: Intrusion detection using naive Bayes classifier with feature reduction. Procedia Technol. 4, 119–128 (2012)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sunil Kumar Gautam .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer India

About this paper

Cite this paper

Gautam, S.K., Om, H. (2016). Host-Based Intrusion Detection Using Statistical Approaches. In: Das, S., Pal, T., Kar, S., Satapathy, S., Mandal, J. (eds) Proceedings of the 4th International Conference on Frontiers in Intelligent Computing: Theory and Applications (FICTA) 2015. Advances in Intelligent Systems and Computing, vol 404. Springer, New Delhi. https://doi.org/10.1007/978-81-322-2695-6_40

Download citation

  • DOI: https://doi.org/10.1007/978-81-322-2695-6_40

  • Published:

  • Publisher Name: Springer, New Delhi

  • Print ISBN: 978-81-322-2693-2

  • Online ISBN: 978-81-322-2695-6

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics