A methodology to detect intrusion using system call based on discriminant analysis

An intrusion detection system seeks to identify unauthorized access to computer systems' resources and data. Many methods have been proposed to detect intrusion; for example, the pattern matching method to finding intrusion by matching sample data to know intrusive patterns and the statistical...

Full description

Bibliographic Details
Main Authors: Abdullah, Abdul Hanan, Dahlan, Dahliyusmanto
Format: Conference or Workshop Item
Published: 2003
Online Access:http://eprints.utm.my/3417/
_version_ 1848890568377106432
author Abdullah, Abdul Hanan
Dahlan, Dahliyusmanto
author_facet Abdullah, Abdul Hanan
Dahlan, Dahliyusmanto
author_sort Abdullah, Abdul Hanan
building UTeM Institutional Repository
collection Online Access
description An intrusion detection system seeks to identify unauthorized access to computer systems' resources and data. Many methods have been proposed to detect intrusion; for example, the pattern matching method to finding intrusion by matching sample data to know intrusive patterns and the statistical approach to detect intrusion from normal activities at the user level or system level. We will investigate a new method for detecting intrusion at the level of privilege process. This method bases on the number of system call during a user's network activity on host machine. Evidence is given that short sequences of system call executed by running programs are good discriminator between normal activities and intrusive activities by using discriminant analysis, a kind of multivariate analysis. We are trying to detect intrusions by analyzing some of system calls occuring on a host machine by discriminant analysis with the Mahalanobis' distance. Our method will be lightweight intrusion detection method, given that it requires only certain of system call for analysis.
first_indexed 2025-11-15T20:44:08Z
format Conference or Workshop Item
id utm-3417
institution Universiti Teknologi Malaysia
institution_category Local University
last_indexed 2025-11-15T20:44:08Z
publishDate 2003
recordtype eprints
repository_type Digital Repository
spelling utm-34172012-02-09T01:48:14Z http://eprints.utm.my/3417/ A methodology to detect intrusion using system call based on discriminant analysis Abdullah, Abdul Hanan Dahlan, Dahliyusmanto An intrusion detection system seeks to identify unauthorized access to computer systems' resources and data. Many methods have been proposed to detect intrusion; for example, the pattern matching method to finding intrusion by matching sample data to know intrusive patterns and the statistical approach to detect intrusion from normal activities at the user level or system level. We will investigate a new method for detecting intrusion at the level of privilege process. This method bases on the number of system call during a user's network activity on host machine. Evidence is given that short sequences of system call executed by running programs are good discriminator between normal activities and intrusive activities by using discriminant analysis, a kind of multivariate analysis. We are trying to detect intrusions by analyzing some of system calls occuring on a host machine by discriminant analysis with the Mahalanobis' distance. Our method will be lightweight intrusion detection method, given that it requires only certain of system call for analysis. 2003-10-02 Conference or Workshop Item NonPeerReviewed Abdullah, Abdul Hanan and Dahlan, Dahliyusmanto (2003) A methodology to detect intrusion using system call based on discriminant analysis. In: UNSPECIFIED, 30th September - 2nd October 2003, Crown Princess Hotel, Kuala Lumpur, Malaysia.
spellingShingle Abdullah, Abdul Hanan
Dahlan, Dahliyusmanto
A methodology to detect intrusion using system call based on discriminant analysis
title A methodology to detect intrusion using system call based on discriminant analysis
title_full A methodology to detect intrusion using system call based on discriminant analysis
title_fullStr A methodology to detect intrusion using system call based on discriminant analysis
title_full_unstemmed A methodology to detect intrusion using system call based on discriminant analysis
title_short A methodology to detect intrusion using system call based on discriminant analysis
title_sort methodology to detect intrusion using system call based on discriminant analysis
url http://eprints.utm.my/3417/