Abstract
A set of discrete points obtained from audit records on a behavior session is processed with Fourier transform. The criterion of selecting Fourier transform coefficients is introduced, and is used to find a unified value from the set of coefficients. This unified value is compared with a threshold to determine whether the session is abnormal. Finally simple test results are reported.
Similar content being viewed by others
References
R. Lippmann, et al., The 1999 DARPA off-line intrusion detection evaluation, Computer Networks, 34(2000)4, 579–595.
Herve Debar, Marc Dacier, Andreas Wespi, Towards a taxonomy of intrusion-detection systems, Computer Networks, 31(1999)8, 805–822.
B. Harris, R. Hunt, TCP/IP security threats and attack methods, Computer Communications, 22(1999)10, 885–897.
Koral Ilgum, Rchard A. Kemmerer, et al., State transition analysis: A rule-based intrusion detection approach, IEEE Trans. on Software Engineering, 21(1995)3, 181–199.
Nicholas J. Puketza, Kui Zhang, Mandy Chung, Biswanath Mukherjee, Ronald A. Olsson, A methodology for testing intrusion detection system, IEEE Trans. on Software Engineering, 22(1996)10, 719–729.
Kwok Yan, Lucas Hui, Siu-Leung Chung, Multivariate data analysis software for enhancing system security, J. Systems and Software, 31(1995)3, 267–275.
P. Helman, G. Liepins, Statistical foundation of audit trail analysis for the detection of computer misuse, IEEE Trans. on Software Engineering, 19(1993)9, 886–902.
Yong Xiang, Steve Liu, Peter Sun, On the defense of the distributed denial of service attacks: An on-off feedback control approach, IEEE Trans. on Systems, Man, and Cybernetics-part A: Systems and Humans, 31(2001)4, 282–293.
Nong Ye, Xiangyang Li, Qiang Chen, Syed Masum Emran, Mingming Xu, Probabilistic techniques for intrusion detection based on computer audit data, IEEE Trans. on Systems, Man, and Cybernetics-part A: Systems and Humans, 31(2001)4, 266–274.
Nong Ye, Syed Masum Emran, Qiang Chen, Sean Vibert, Multivariate statistical analysis of audit trails for host-based intrusion detection, IEEE Trans. on Computers, 51(2002)7, 810–819.
Verwoerd Theuns, et al., Intrusion detection techniques and approaches, Computer Communications, 25(2002)15, 1356–2365.
Helmer Guy, et al., Automated discovery of concise predictive rules for intrusion detection, J. Systems and Software, 60(2002)3, 165–170.
Shiuh-pyng Shieh, Virgil D. Gligor, On a pattern-oriented model for intrusion detection, IEEE Trans. on Knowledge and Data Engineering, 9(1997)4, 661–667.
B. Balajinath, S. V. Raghavan, Intrusion detection through learning behavior model, Computer Communications, 24(2001)8, 1202–1212.
Lam Kwok-yan, L. Hui, S. L. Chung, Data reduction method for intrusion detection, J. Systems and Software, 33(1996)1, 101–108.
A. P. Kosoresow, S. A. Hofmeyr, Intrusion detection via system call traces, IEEE Software, 14(1997)5, 35–42.
Erland Jonsson, Tomas Olovsson, A quantitative model of the security intrusion process based on attacker behavior, IEEE Trans. on Software Engineering, 23(1997)4, 235–245.
Yue Bing, Fu Hongjuan, et al., The method of perfecting the audit information in intrusion detection system, Chinese J. Computers, 25(2002)7, 772–777 (in Chinese).
Denning, An intrusion detection model, IEEE Trans. on Software Engineering, 13(1987)2, 222–232.
Author information
Authors and Affiliations
Additional information
Supported by the Tianjin Natural Science Fund (003700211) and 863 High Technology Plan (2002AA142010)
About this article
Cite this article
Yue, B., Zhao, Y., Xu, Z. et al. An anomaly intrusion detection method using fourier transform. J. of Electron.(China) 21, 135–139 (2004). https://doi.org/10.1007/BF02687828
Received:
Revised:
Issue Date:
DOI: https://doi.org/10.1007/BF02687828