skip to main content
10.1145/1582379.1582401acmconferencesArticle/Chapter ViewAbstractPublication PagesiwcmcConference Proceedingsconference-collections
research-article

On the use of co-occurrence matrices for network anomaly detection

Published:21 June 2009Publication History

ABSTRACT

In the last few years the number and impact of security attacks over the Internet have been continuously increasing. Since it is impossible to guarantee complete protection to a system by means of the "classical" prevention mechanisms, the use of Intrusion Detection Systems (IDSs) has emerged as a key element in network security. In this paper we address the problem considering some techniques for detecting network anomalies, based on the use of co-occurrence matrices, to model the "normal" behavior of the TCP connections.

The performance analysis, shows a comparison among the different solutions, which demonstrates the effectiveness of the proposed methods.

References

  1. M. Turk and A. Pentland, "Face recognition using eigenfaces," in Proc. of IEEE Computer Society Conference on Computer Vision and Pattern Recognition, (CVPR), 1991.Google ScholarGoogle Scholar
  2. M. Turk and A. Pentland, "Eigenfaces for recognition," Journal on Cognitive Neuroscience, vol. 3, no. 1, pp. 71--86, 1991. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. A. Pentland, B. Moghaddam, and T. Starner, "View-based and modular eigenspaces for face recognition," in Proc. of IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR), 1994.Google ScholarGoogle Scholar
  4. M. Oka, Y. Oyama, H. Abe, and K. Kato, "Anomaly detection using layered networks based on eigen co-occurrence matrix," in Proc. of the International Symposium on Recent Advances in Intrusion Detection (RAID), pp. 223--237, 2004.Google ScholarGoogle ScholarCross RefCross Ref
  5. M. Oka, Y. Oyama, and K. Kato, "Eigen co-occurrence matrix method for masquerade detection," in Proc. of the 7th JSSST SIGSYS Workshop on Systems for Programming and Applications (SPA), 2004.Google ScholarGoogle Scholar
  6. R. Haralick, Dinstein, and K. Shanmugam, "Textural features for image classification," IEEE Transactions on Systems, Man, and Cybernetics, vol. SMC-3, pp. 610--621, 1973.Google ScholarGoogle ScholarCross RefCross Ref
  7. R. Walker, P. Jackway, and D. Longstaff, "Recent developments in the use of the co-occurrence matrix for texture recognition," in Proc. of the 13th International Conference on Digital Signal Processing (ICDSP), 1997.Google ScholarGoogle Scholar
  8. D. Benedetto, E. Caglioti, and V. Loreto, "Language trees and zipping," Physical Review Letters, vol. 88, January 2002.Google ScholarGoogle Scholar
  9. A. Puglisi, "Data compression and learning in time sequences analysis," 2002.Google ScholarGoogle Scholar
  10. "MIT, Lincoln laboratory, DARPA evaluation intrusion detection." http://www.ll.mit.edu/IST/ideval/ (accessed on 2008/06/28).Google ScholarGoogle Scholar
  11. C. Callegari, S. Vaton, and M. Pagano, "A new statistical approach to network anomaly detection," in Proc. of the International Symposium on Performance Evaluation of Computer and Telecommunication Systems (SPECTS), 2008.Google ScholarGoogle Scholar

Index Terms

  1. On the use of co-occurrence matrices for network anomaly detection

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      IWCMC '09: Proceedings of the 2009 International Conference on Wireless Communications and Mobile Computing: Connecting the World Wirelessly
      June 2009
      1561 pages
      ISBN:9781605585697
      DOI:10.1145/1582379

      Copyright © 2009 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 21 June 2009

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader