File Download
There are no files associated with this item.
Links for fulltext
(May Require Subscription)
- Scopus: eid_2-s2.0-0029478394
- WOS: WOS:A1995TG01800007
- Find via
Supplementary
- Citations:
- Appears in Collections:
Article: Multivariate data analysis software for enhancing system security
Title | Multivariate data analysis software for enhancing system security |
---|---|
Authors | |
Issue Date | 1995 |
Publisher | Elsevier Inc. The Journal's web site is located at http://www.elsevier.com/locate/jss |
Citation | The Journal Of Systems And Software, 1995, v. 31 n. 3, p. 267-275 How to Cite? |
Abstract | This article describes an intrusion detection technique that aims to enhance the security of computing systems. The idea of intrusion detection is based on the hypothesis that computer users are typically involved in specific types of activity, and the set of programs they use will normally reflect that activity. Hence, security violations could be detected from abnormal patterns of system usage. Intrusion detection almost invariably involves two components: system monitoring and data analysis. In general, system monitoring records everything that each user performs in the system. Monitoring information is analyzed by use of some data analysis technique to abstract user behavior patterns from the audit log. Although the concept of system monitoring is widely supported in today's computer systems (at least for accounting purposes), the provision of tools for analyzing monitoring information is not sufficient. We present a multivariate data analysis technique that is a nice mathematical tool for the analysis of user behavior patterns in intrusion detection. Our system records all user activities in each login session; abnormal sessions are identified when the monitoring data are analyzed. Data analysis involves two steps: analysis of correlations and classification of behavior patterns. Analysis of correlations, which is based on standardized principal components analysis, partitions the set of user sessions into groups such that sessions within the same group are closely correlated and hence governed by the same behavior pattern. Classification of behavior patterns is automated by a cluster recognition technique. To visualize analysis results, the multivariate data set is summarized by factor analysis. © 1995. |
Persistent Identifier | http://hdl.handle.net/10722/152254 |
ISSN | 2023 Impact Factor: 3.7 2023 SCImago Journal Rankings: 1.160 |
ISI Accession Number ID |
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Lam, KY | en_US |
dc.contributor.author | Hui, L | en_US |
dc.contributor.author | Chung, SL | en_US |
dc.date.accessioned | 2012-06-26T06:36:46Z | - |
dc.date.available | 2012-06-26T06:36:46Z | - |
dc.date.issued | 1995 | en_US |
dc.identifier.citation | The Journal Of Systems And Software, 1995, v. 31 n. 3, p. 267-275 | en_US |
dc.identifier.issn | 0164-1212 | en_US |
dc.identifier.uri | http://hdl.handle.net/10722/152254 | - |
dc.description.abstract | This article describes an intrusion detection technique that aims to enhance the security of computing systems. The idea of intrusion detection is based on the hypothesis that computer users are typically involved in specific types of activity, and the set of programs they use will normally reflect that activity. Hence, security violations could be detected from abnormal patterns of system usage. Intrusion detection almost invariably involves two components: system monitoring and data analysis. In general, system monitoring records everything that each user performs in the system. Monitoring information is analyzed by use of some data analysis technique to abstract user behavior patterns from the audit log. Although the concept of system monitoring is widely supported in today's computer systems (at least for accounting purposes), the provision of tools for analyzing monitoring information is not sufficient. We present a multivariate data analysis technique that is a nice mathematical tool for the analysis of user behavior patterns in intrusion detection. Our system records all user activities in each login session; abnormal sessions are identified when the monitoring data are analyzed. Data analysis involves two steps: analysis of correlations and classification of behavior patterns. Analysis of correlations, which is based on standardized principal components analysis, partitions the set of user sessions into groups such that sessions within the same group are closely correlated and hence governed by the same behavior pattern. Classification of behavior patterns is automated by a cluster recognition technique. To visualize analysis results, the multivariate data set is summarized by factor analysis. © 1995. | en_US |
dc.language | eng | en_US |
dc.publisher | Elsevier Inc. The Journal's web site is located at http://www.elsevier.com/locate/jss | en_US |
dc.relation.ispartof | The Journal of Systems and Software | en_US |
dc.title | Multivariate data analysis software for enhancing system security | en_US |
dc.type | Article | en_US |
dc.identifier.email | Hui, L:hui@cs.hku.hk | en_US |
dc.identifier.authority | Hui, L=rp00120 | en_US |
dc.description.nature | link_to_subscribed_fulltext | en_US |
dc.identifier.scopus | eid_2-s2.0-0029478394 | en_US |
dc.identifier.volume | 31 | en_US |
dc.identifier.issue | 3 | en_US |
dc.identifier.spage | 267 | en_US |
dc.identifier.epage | 275 | en_US |
dc.identifier.isi | WOS:A1995TG01800007 | - |
dc.publisher.place | United States | en_US |
dc.identifier.scopusauthorid | Lam, KY=7403657062 | en_US |
dc.identifier.scopusauthorid | Hui, L=8905728300 | en_US |
dc.identifier.scopusauthorid | Chung, SL=7404292662 | en_US |
dc.identifier.issnl | 0164-1212 | - |