Design of Anomaly Detection System for Outlier Detection in Hardware Profile Using PCA
Journal Title: International Journal on Computer Science and Engineering - Year 2012, Vol 4, Issue 9
Abstract
In this paper, we design an Anomaly Detection System for Outlier Detection in Hardware Profile by using Principal Component Analysis (PCA) that helps reduce the dimension of data. Anomaly detection methods can detect new intrusions, but they suffer from false alarms. Another approach is misuse detection that identifies only known attacks by matching with the previous patterns. Host based Intrusion Detection Systems (HIDSs) use anomaly detection approach to identify malicious attacks i.e. intrusion. Data being of large dimensional generates features in terms of large set of dimensions and hence the system takes considerable time for processing the huge amount of data. The PCA is used to reduce the dimensionality of the host based data without any loss of useful information such as non-redundant data. We experimentally show that the proposed intrusion detection system has detection rate in the range of 90% - 97.5% and false alarm rate in the range of 2.5% - 7.5% depending upon the major and minor principal components.
Authors and Affiliations
Hari Om , Tanmoy Hazra
A Layered Approach for Watermarking In Images Based On Huffman Coding
With the rapid increase of the internet users and the bandwidth is appreciable but at the same also brought some problems beside its advantages. The great facility in copying a digital content rapidly, perfectly and with...
Comparison of Two Partitioning Methods in a Fuzzy Time Series Model for Composite Index Forecasting
Study of fuzzy time series has increasingly attracted much attention due to its salient capabilities of tackling vague and incomplete data. A variety of forecasting models have devoted to improve forecasting accuracy. Re...
Implementation of Secured password for Web applications using two server model
The secured password is the most commonly used uthentication mechanism in security applications [11]. There ay be chances of password hacking from the hackers, so hat t is very essential to protect password informati...
AN EFFICIENT CLASSIFICATION OF GENOMES BASED ON CLASSES AND SUBCLASSES
The grass family has been the subject of intense research over the past. Reliable and fast classification / sub-classification of large sequences which are rapidly gaining importance due to genome sequencing projects all...
A Dynamic Slack Management Technique for Real- Time Distributed Embedded System with Enhanced Fault Tolerance and Resource Constraints
This project work aims to develop a dynamic slack management technique, for real-time distributed embedded systems to reduce the total energy consumption in addition to timing, precedence and resource constraints. The Sl...