Skip to main content

Network Intrusion Detection

  • Chapter
  • First Online:
Book cover Handbook of Computational Statistics

Part of the book series: Springer Handbooks of Computational Statistics ((SHCS))

  • 11k Accesses

Abstract

Attacks against computers and the Internet are in the news every week. These primarily take the form of malicious code such as viruses and worms, or denial of service attacks. Less commonly reported are attacks which gain access to computers, either for the purpose of producing damage (such as defacing web sites or deleting data) or for the opportunities such access provides to the attacker, such as access to bank accounts or control systems of power stations. In a perspectives article in Science (Wulf and Jones 2009) the authors argue that computer systems are getting less secure, not more, and that traditional models of security based on perimeter defenses are not working.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 259.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 329.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  • Amoroso, E.: Intrusion Detection: An Introduction to Internet Surveillance, Correlation, Trace Back, Traps, and Response. Intrusion.net Books, Sparta, New Jersey (1999)

    Google Scholar 

  • Anderson, D., Lunt, T.F., Javitz, H., Tamaru, A., Valdes, A.: Detecting unusual program behavior using the statistical component of the next-generation intrusion detection expert system (nides). Technical Report SRI-CSL-95-06, SRI International (1995)

    Google Scholar 

  • anonymous: Maximum Security. Sams.net Publishing, Indianapolis, IN (1997)

    Google Scholar 

  • Bace, R.G.: Intrusion Detection. MacMillan Technical Publishing, Indianapolis, IN (2000)

    Book  Google Scholar 

  • Benczúr, A.A., Csalogáy, K., Sarlós, T., Uher, M.: Spamrank – fully automatic link spam detection. In Proceedings of the First International Workshop on Adversarial Information Retrieval on the Web, pp. 25–38 (2005)

    Google Scholar 

  • Bleha, S., Slivinsky, C., Hussien, B.: Computer-access security systems using keystroke dynamics. IEEE Trans. Pattern Anal. Mach. Intell. 12(12), 1217–1222 (1990)

    Article  Google Scholar 

  • DeVault, K., Tucey, N., Marchette, D.: Analyzing process table and window title data for user identification in a windows environment. Technical Report NSWCDD/TR-03/122, Naval Surface Warfare Center (2003)

    Google Scholar 

  • Early, J.P., Brodley, C.E.: Behavioral authentication of server flows. In The 19th Annual Computer Security Applications Conference, pp. 49–55 (2003)

    Google Scholar 

  • Escamilla, T.: Intrusion Detection: Network Security Beyond the Firewall. Wiley, New York (1998)

    Google Scholar 

  • Forrest, S., Hofmeyr, S.A.: Immunology as information processing. In: Segel, L.A., Cohen, I. (eds.) Design Prinicples for the Immune System and Other Distributed Autonomous Systems, Santa Fe Institute Studies in the Sciences of Complexity. Oxford University Press, Oxford, UK, 361–387, (2000) Also available at www.cs.unm.edu/~forrest/ism_papers.htm.

  • Forrest, S., Perelson, A.S., Allen, L., Cherukuri, R.: Self-nonself discrimination in a computer. In 1994 IEEE Symposium on Research in Security and Privacy, pp. 202–212. Los Alamitos, CA (1994); Also available at www.cs.unm.edu/~forrest/isa_papers.htm.

  • Forrest, S., Hofmeyr, S.A., Somayaji, A.: Computer immunology. Comm. ACM 40, 88–96 (1997)

    Google Scholar 

  • Giles, K., Marchette, D.J., Priebe, C.E.: A backscatter characterization of denial-of-service attacks. In Proceedings of the Joint Statistical Meetings, CDROM (2003)

    Google Scholar 

  • Glaz, J., Naus, J., Wallenstein, S.: Scan Statistics. Springer, New York (2010)

    Book  Google Scholar 

  • Karonski, M., Singer, K., Scheinerman, E.: Random intersection graphs: the subgraph problem. Combinator. Probab. Comput. 8, 131–159 (1999)

    Article  MATH  Google Scholar 

  • Kephart, J.O., White, S.R.: Directed-graph epidemiological models of computer viruses. In Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy, pp. 343–359 (1991)

    Google Scholar 

  • Kephart, J.O., White, S.R.: Measuring and modeling computer virus prevalence. In Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy, pp. 2–15 (1993)

    Google Scholar 

  • Lin, D.-T.: Computer-access authentication with neural network based keystroke identity verification. In International Conference on Neural Networks, pp. 174–178 (1997)

    Google Scholar 

  • Marchette, D.J.: Computer Intrusion Detection and Network Monitoring: A Statistical Viewpoint. Springer, New York (2001)

    MATH  Google Scholar 

  • Marchette, D.J.: A study of denial of service attacks on the internet. In Proceedings of the Army Conference on Applied Statistics (2002); 41–40, available at http://www.armyconference.org/ACAS00-02/Master02.pdf

  • Marchette, D.J.: Passive detection of denial of service attacks on the internet. In: Chen, W. (eds.) Statistical Methods in Computer Security. Marcel Dekker; 183–211.

    Google Scholar 

  • Marchette, D.J.: Profiling users by their network activity. In Proceedings of the Joint Statistical Meetings 219–228 (2003).

    Google Scholar 

  • Marchette, D.J.: Random Graphs for Statistical Pattern Recognition. Wiley, New York (2004)

    MATH  Google Scholar 

  • Maxion, R.A.: Masquerade detection using enriched command lines. In International conference on dependable systems and networks(DNS-03). IEEE Computer Society Press, Washington, DC (2003)

    Google Scholar 

  • Maxion, R.A., Townsend, T.N.: Masquerade detection using truncated command lines. In International conference on dependable systems and networks(DNS-02). IEEE Computer Society Press, Washington, DC (2002)

    Google Scholar 

  • Moore, D., Voelker, G.M., Savage, S.: Infering Internet denial-of-service activity. In Proceedings of the 2001 USENIX Security Symposium, pp. 9–22 (2001). Available on the web at www.usenix.org/publications/library/proceedings/sec01/moore.html USENIX Security ’01.

  • Northcutt, S., Novak, J., McLaclan, D.: Network Intrusion Detection. An Analyst’s Handbook. New Riders, Indianapolis, IN (2001)

    Google Scholar 

  • Obaidat, M.S., Sadoun, B.: Verification of computer users using keystroke dynamics. IEEE Trans. Syst. Man Cybernetics 27(2), 261–269 (1997)

    Article  Google Scholar 

  • Oshima, S., Nakshima, T., Nishikido, Y.: Extraction of characteristics of anomaly accessed IP packets using chi-square method. In Complex, Intelligent and Softawre Intensive Systems, CISIS ’09, pp. 287–292 (2009)

    Google Scholar 

  • Priebe, C.E.: Adaptive mixture density estimation. J. Am. Stat. Assoc. 89, 796–806 (1994)

    Article  MathSciNet  MATH  Google Scholar 

  • Priebe, C.E., Conroy, J.M., Marchette, D.J., Park, Y.: Scan statistics on enron graphs. Comput. Math. Organ. Theor. 11, 229–247 (2005)

    Article  MATH  Google Scholar 

  • Priebe, C.E., Park, Y., Marchette, D.J., Conroy, J.M., Grothendieck, J., Gorin, A.L.: Statistical inference on attributed random graphs: Fusion of graph features and content: An experiment on time series of enron graphs. Comput. Stat. Data Anal. 54, 1766–1776 (2010)

    Article  MathSciNet  Google Scholar 

  • Proctor, P.E.: The Practical Intrusion Detection Handbook. Prentice-Hall, Englewood Cliffs, NJ (2001)

    Google Scholar 

  • Robinson, J.A., Liang, V.M., Chambers, J.A.M., MacKenzie, C.L.: Computer user verification using login string keystroke dynamics. IEEE Trans. Syst. Man Cybernetics 28(2), 236–241 (1998)

    Article  Google Scholar 

  • Sasaki, M., Shinnou, H.: Spam detection using text clustering. International Conference on Cyberworlds. 0, 316–319 (2005); http://doi.ieeecomputersociety.org/10.1109/CW.2005.83.

  • Schonlau, M., DuMouchel, W., Ju, W.-H., Karr, A.F., Theus, M., Vardi, Y.: Computer intrusion: Detecting masquerades. Stat. Sci. 16, 58–74 (2001)

    MathSciNet  MATH  Google Scholar 

  • Song, D.X., Wagner, D., Tian, X.: Timing analysis of keystrokes and timing attacks on SSH. In Proceedings of the 10th USENIX Security Symposium (2001); http://www.usenix.org/publications/library/proceedings/sec01/song.html.

  • Stevens, W.R.: TCP/IP Illustrated, Volume 1: The Protocols. Addison-Wesley, Reading, MA (1994)

    Google Scholar 

  • Tan, K.M.C., Maxion, R.A.: “Why 6?” defining the operational limits of stide, an anomaly-based intrusion detector. In IEEE Symposium on Security and Privacy. IEEE Computer Society Press, Washington, DC (2002)

    Google Scholar 

  • Wegman, E.J., Davies, H.I.: Remarks on some recursive estimators of a probability density. Ann. Stat. 7, 316–327 (1979)

    Article  MathSciNet  MATH  Google Scholar 

  • Wegman, E.J., Dorfman, A.: Visualizing cereal world. Technical Report TR 178, George Mason University, Center for Computational Statistics (2001)

    Google Scholar 

  • Wegman, E.J., Marchette, D.J.: On some techniques for streaming data: a case study of Internet packet headers. JCGS (2003), 12(4), 893–914.

    MathSciNet  Google Scholar 

  • Wierman, J.C., Marchette, D.J.: Modeling computer virus prevalence with a susceptible-infected-susceptible model with reintroduction. Computational Statistics and Data Analysis (2004), 45(1), 3–23.

    Article  MathSciNet  MATH  Google Scholar 

  • Wilhelm, A.F.X., Wegman, E.J., Symanzik, J.: Visual clustering and classification: The oronsay particle size data set revisited. Comput. Stat. 109–146 (1999)

    Google Scholar 

  • Wright, C.V., Ballard, L., Monrose, F., Masson, G.M.: Language identification of encrypted voip traffic: Alejandra y roberto or alice and bob? In SS’07: Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium, pp. 1–12, Berkeley, CA, USA (2007); USENIX Association.

    Google Scholar 

  • Wulf, W.A., Jones, A.K.: Reflections on cybersecurity. Science 326, 943–944 (2009)

    Google Scholar 

  • Yamato, H.: Sequential estimation of a continuous probability density function and the mode. Bulletin Math. Stat. 14, 1–12 (1971)

    MathSciNet  MATH  Google Scholar 

  • Ye, N., Emran, S.M., Chen, Q., Vilbert, S.: Multivariate statistical analysis of audit trails for host-based intrusion detection. IEEE Trans. Comput. 51, 810–820 (2002)

    Article  Google Scholar 

  • Zhou, B., Shi, Q., Merabti, M.: Intrusion detection in pervasive networks based on a chi-square statistic test. In Computer Software and Applications Conference, COMPSAC ’06, vol. 2, pp. 203–208 (2006)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to David J. Marchette .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Marchette, D.J. (2012). Network Intrusion Detection. In: Gentle, J., Härdle, W., Mori, Y. (eds) Handbook of Computational Statistics. Springer Handbooks of Computational Statistics. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-21551-3_38

Download citation

Publish with us

Policies and ethics