An anomaly detection technique based on a chi‐square statistic for detecting intrusions into information systems
N Ye, Q Chen - Quality and reliability engineering international, 2001 - Wiley Online Library
N Ye, Q Chen
Quality and reliability engineering international, 2001•Wiley Online LibraryAn intrusion into an information system compromises its security (eg availability, integrity
and confidentiality) through a series of events in the information system. Intrusive events
often show departures (anomalies) from normal events in an information system. This paper
presents an anomaly detection technique based on a chi‐square statistic. This technique
builds a profile of normal events in an information system—a norm profile computes the
departure of events in the recent past from the norm profile and detects a large departure as …
and confidentiality) through a series of events in the information system. Intrusive events
often show departures (anomalies) from normal events in an information system. This paper
presents an anomaly detection technique based on a chi‐square statistic. This technique
builds a profile of normal events in an information system—a norm profile computes the
departure of events in the recent past from the norm profile and detects a large departure as …
Abstract
An intrusion into an information system compromises its security (e.g. availability, integrity and confidentiality) through a series of events in the information system. Intrusive events often show departures (anomalies) from normal events in an information system. This paper presents an anomaly detection technique based on a chi‐square statistic. This technique builds a profile of normal events in an information system—a norm profile computes the departure of events in the recent past from the norm profile and detects a large departure as an anomaly—a likely intrusion. This technique was tested for its performance in distinguishing normal events from intrusive events in an information system. The test results demonstrated the promising performance of this technique for intrusion detection in terms of a low false alarm rate and a high detection rate. Intrusive events were detected at a very early stage. Copyright © 2001 John Wiley & Sons, Ltd.
Wiley Online Library