Browse > Article
http://dx.doi.org/10.3745/KIPSTC.2003.10C.6.705

Hybrid Statistical Learning Model for Intrusion Detection of Networks  

Jun, Sung-Hae (청주대학교 통계학과)
Abstract
Recently, most interchanges of information have been performed in the internet environments. So, the technuque, which is used as intrusion deleting tool for system protecting against attack, is very important. But, the skills of intrusion detection are newer and more delicate, we need preparations for defending from these attacks. Currently, lots of intrusion detection systemsmake the midel of intrusion detection rule using experienced data, based on this model they have the strategy of defence against attacks. This is not efficient for defense from new attack. In this paper, a new model of intrusion detection is proposed. This is hybrid statistical learning model using likelihood ratio test and statistical learning theory, then this model can detect a new attack as well as experienced attacks. This strategy performs intrusion detection according to make a model by finding abnomal attacks. Using KDD Cup-99 task data, we can know that the proposed model has a good result of intrusion detection.
Keywords
Intrusion Detection; Statistical Learning Model; Likelihood Ratio Testing;
Citations & Related Records
Times Cited By KSCI : 3  (Citation Analysis)
연도 인용수 순위
1 V. N. Vapnik, 'The Nature of Statistical Learning Theory,' New York, Springer-Verlag, 1995
2 V. N. Vapnik, 'Statistical Learning Theory,' New York: Wiley, 1998
3 N. Ye, X. Li, 'scalable clustering technique for intrusion signature recognition,' 2001 IEEE Man Systems and Cybernetics Information Assurance Workshop, West Point, NY, June, 2001
4 J. Zhu, T. Hastie, 'Kernel Logistic Regression and the Import Vector Machine,' NIPS2001 conference, Vancouver, November, 2001
5 Lincoln Laboratory, Massachusetts Institute of Technology, http://www.ll.mit.edu/IST/ideval/data
6 C. Cortes and V. N. Vapnik, 'Support vector networks,' Machine Learning, Vol.20, pp.273-297, 1995   DOI
7 S. M. Emran, M. Xu, N. Ye, Q. Chen, X. Li, 'Probabilistic techniques for intrusion detection based on computer audit data,' IEEE Transactions on Systems, Man and Cybernetics, Part A, Vol.31, pp.266-274, 2001   DOI   ScienceOn
8 T. Hastie, R. Tibshirani, J. Friedman, 'The Elements of Statistical Learning,' Springer, 2001
9 전명식, '수리통계학,' 자유아카데미, 1996
10 W. Lee, S. J. Stolfo, K. W. Mok, 'A data mining framework for building intrusion detection models,' Proceedings of the 1999 IEEE Symposium on Security and Privacy, pp.120-132, 1999   DOI
11 이한성, 임영희, 박주영, 박대희, 'SVM과 클러스터링 기반 적응형 침입 탐지 시스템', 퍼지및지능시스템학회논문지, 2003   과학기술학회마을   DOI
12 M. Pontil and A. Verri, 'Properties of support vector machine,' M. I. T. AI Memo, No.1612, 1997
13 유신근, 이남훈, 신영철, '침입탐지시스템 평가 방법론', 정보처리학회논문집, Vol.7, No.11, pp.3445-3461, 2000   과학기술학회마을
14 A. Benhur, D. Horn, H. T. Siegelmann, V. Vapnik, 'A support vector clustering method,' Proceedings. 15th International Conference on Pattern Recognition, Vol.2, pp.724-727, 2000   DOI
15 G. Casella, R. L. Berger, 'Statistical Inference,' Duxburt Press, 1990
16 N. Cristianini,J. S. Taylor, 'An Introduction to Support Vector Machine,' Cambridge University Press, 2000