Skip to main content
Log in

An anomaly intrusion detection method using fourier transform

  • Papers
  • Published:
Journal of Electronics (China)

Abstract

A set of discrete points obtained from audit records on a behavior session is processed with Fourier transform. The criterion of selecting Fourier transform coefficients is introduced, and is used to find a unified value from the set of coefficients. This unified value is compared with a threshold to determine whether the session is abnormal. Finally simple test results are reported.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. R. Lippmann, et al., The 1999 DARPA off-line intrusion detection evaluation, Computer Networks, 34(2000)4, 579–595.

    Article  Google Scholar 

  2. Herve Debar, Marc Dacier, Andreas Wespi, Towards a taxonomy of intrusion-detection systems, Computer Networks, 31(1999)8, 805–822.

    Article  Google Scholar 

  3. B. Harris, R. Hunt, TCP/IP security threats and attack methods, Computer Communications, 22(1999)10, 885–897.

    Article  Google Scholar 

  4. Koral Ilgum, Rchard A. Kemmerer, et al., State transition analysis: A rule-based intrusion detection approach, IEEE Trans. on Software Engineering, 21(1995)3, 181–199.

    Article  Google Scholar 

  5. Nicholas J. Puketza, Kui Zhang, Mandy Chung, Biswanath Mukherjee, Ronald A. Olsson, A methodology for testing intrusion detection system, IEEE Trans. on Software Engineering, 22(1996)10, 719–729.

    Article  Google Scholar 

  6. Kwok Yan, Lucas Hui, Siu-Leung Chung, Multivariate data analysis software for enhancing system security, J. Systems and Software, 31(1995)3, 267–275.

    Article  Google Scholar 

  7. P. Helman, G. Liepins, Statistical foundation of audit trail analysis for the detection of computer misuse, IEEE Trans. on Software Engineering, 19(1993)9, 886–902.

    Article  Google Scholar 

  8. Yong Xiang, Steve Liu, Peter Sun, On the defense of the distributed denial of service attacks: An on-off feedback control approach, IEEE Trans. on Systems, Man, and Cybernetics-part A: Systems and Humans, 31(2001)4, 282–293.

    Article  Google Scholar 

  9. Nong Ye, Xiangyang Li, Qiang Chen, Syed Masum Emran, Mingming Xu, Probabilistic techniques for intrusion detection based on computer audit data, IEEE Trans. on Systems, Man, and Cybernetics-part A: Systems and Humans, 31(2001)4, 266–274.

    Article  Google Scholar 

  10. Nong Ye, Syed Masum Emran, Qiang Chen, Sean Vibert, Multivariate statistical analysis of audit trails for host-based intrusion detection, IEEE Trans. on Computers, 51(2002)7, 810–819.

    Article  Google Scholar 

  11. Verwoerd Theuns, et al., Intrusion detection techniques and approaches, Computer Communications, 25(2002)15, 1356–2365.

    Article  Google Scholar 

  12. Helmer Guy, et al., Automated discovery of concise predictive rules for intrusion detection, J. Systems and Software, 60(2002)3, 165–170.

    Article  Google Scholar 

  13. Shiuh-pyng Shieh, Virgil D. Gligor, On a pattern-oriented model for intrusion detection, IEEE Trans. on Knowledge and Data Engineering, 9(1997)4, 661–667.

    Article  Google Scholar 

  14. B. Balajinath, S. V. Raghavan, Intrusion detection through learning behavior model, Computer Communications, 24(2001)8, 1202–1212.

    Article  Google Scholar 

  15. Lam Kwok-yan, L. Hui, S. L. Chung, Data reduction method for intrusion detection, J. Systems and Software, 33(1996)1, 101–108.

    Article  Google Scholar 

  16. A. P. Kosoresow, S. A. Hofmeyr, Intrusion detection via system call traces, IEEE Software, 14(1997)5, 35–42.

    Article  Google Scholar 

  17. Erland Jonsson, Tomas Olovsson, A quantitative model of the security intrusion process based on attacker behavior, IEEE Trans. on Software Engineering, 23(1997)4, 235–245.

    Article  Google Scholar 

  18. Yue Bing, Fu Hongjuan, et al., The method of perfecting the audit information in intrusion detection system, Chinese J. Computers, 25(2002)7, 772–777 (in Chinese).

    Google Scholar 

  19. Denning, An intrusion detection model, IEEE Trans. on Software Engineering, 13(1987)2, 222–232.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Additional information

Supported by the Tianjin Natural Science Fund (003700211) and 863 High Technology Plan (2002AA142010)

About this article

Cite this article

Yue, B., Zhao, Y., Xu, Z. et al. An anomaly intrusion detection method using fourier transform. J. of Electron.(China) 21, 135–139 (2004). https://doi.org/10.1007/BF02687828

Download citation

  • Received:

  • Revised:

  • Issue Date:

  • DOI: https://doi.org/10.1007/BF02687828

Key words

Navigation