IEEJ Transactions on Electronics, Information and Systems
Online ISSN : 1348-8155
Print ISSN : 0385-4221
ISSN-L : 0385-4221
<Software and Information Processing>
Appliance of Independent Component Analysis to System Intrusion Analysis
Yoshikazu IshiiTarou TakagiKouji Nakai
Author information
JOURNAL FREE ACCESS

2004 Volume 124 Issue 9 Pages 1907-1913

Details
Abstract
In order to analyze the output of the intrusion detection system and the firewall, we evaluated the applicability of ICA(independent component analysis). We developed a simulator for evaluation of intrusion analysis method. The simulator consists of the network model of an information system, the service model and the vulnerability model of each server, and the action model performed on client and intruder. We applied the ICA for analyzing the audit trail of simulated information system. We report the evaluation result of the ICA on intrusion analysis. In the simulated case, ICA separated two attacks correctly, and related an attack and the abnormalities of the normal application produced under the influence of the attach.
Content from these authors
© 2004 by the Institute of Electrical Engineers of Japan
Previous article Next article
feedback
Top