作者
Mohamed Hamdi, Noureddine Boudriga
发表日期
2007/11/3
期刊
Computer Communications
卷号
30
期号
16
页码范围
3203-3213
出版商
Elsevier
简介
Anomaly-based intrusion detection is a crucial research issue as it permits to identify attacks that does not necessarily have known signatures. However, approaches using anomalies often consume more resources than those based on misuse detection and have a higher false alarm rate. This paper presents an efficient anomaly analysis method that is proved to be more efficient and less complex than the existing techniques. The approach relies on monitoring the security state by using a set of accurate metrics. The Wavelet Transform (WT) is used to decompose these metrics in the time-scale space. Attacks are viewed as Lipschitz singularities that arise in some specific points of time. Henceforth, the anomaly detection process is performed through processing the signals representing the metrics. The proposed approach is also shown to be extensible to the case where the monitoring points, used to gather the …
引用总数
2008200920102011201220132014201520162017201820192020202120222023202466546442232443111
学术搜索中的文章