Applied multivariate statistical analysis
Applied multivariate statistical analysis
Query construction for user-guided knowledge discovery in databases
Information Sciences: an International Journal
Logical second order models: achieving synergy between computer power and human reason
Information Sciences: an International Journal
An introduction to intrusion detection
Crossroads - Special issue on computer security
Applications of Data Mining in Computer Security
Applications of Data Mining in Computer Security
Remote Attack Detection Method in IDA: MLSI-Based Intrusion Detection using Discriminant Analysis
SAINT '02 Proceedings of the 2002 Symposium on Applications and the Internet
Recent advances in access control models
Das'01 Proceedings of the fifteenth annual working conference on Database and application security
Clustering intrusion detection alarms to support root cause analysis
ACM Transactions on Information and System Security (TISSEC)
A database clustering methodology and tool
Information Sciences—Informatics and Computer Science: An International Journal
A Fuzzy Anomaly Detection Algorithm for IPv6
SKG '06 Proceedings of the Second International Conference on Semantics, Knowledge, and Grid
Learning to Detect and Classify Malicious Executables in the Wild
The Journal of Machine Learning Research
A scalable supervised algorithm for dimensionality reduction on streaming data
Information Sciences: an International Journal
Genetically optimized fuzzy polynomial neural networks with fuzzy set-based polynomial neurons
Information Sciences: an International Journal
Hierarchical multi-pattern matching algorithm for network content inspection
Information Sciences: an International Journal
Rough set theory with discriminant analysis in analyzing electricity loads
Expert Systems with Applications: An International Journal
Dynamical immunological surveillance for network danger evaluation model
WiCOM'09 Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing
Anomaly intrusion detection by clustering transactional audit streams in a host computer
Information Sciences: an International Journal
Information Sciences: an International Journal
Network intrusion detection and classification with decision tree and rule based approaches
ISCIT'09 Proceedings of the 9th international conference on Communications and information technologies
Practical real-time intrusion detection using machine learning approaches
Computer Communications
Hi-index | 0.07 |
This paper evaluates the statistical methodologies of cluster analysis, discriminant analysis, and Logit analysis used in the examination of intrusion detection data. The research is based on a sample of 1200 random observations for 42 variables of the KDD-99 database, that contains 'normal' and 'bad' connections. The results indicate that Logit analysis is more effective than cluster or discriminant analysis in intrusion detection. Specifically, according to the Kappa statistic that makes full use of all the information contained in a confusion matrix, Logit analysis (K=0.629) has been ranked first, with second discriminant analysis (K=0.583), and third cluster analysis (K=0.460).