A Two-Tier System for Web Attack Detection Using Linear Discriminant Method

DSpace/Manakin Repository

Search OPUS


Advanced Search

Browse

My Account

Show simple item record

dc.contributor.author Tan, T
dc.contributor.author Jamdagni, A
dc.contributor.author He, S
dc.contributor.author Nanda, P
dc.contributor.author Liu, R
dc.contributor.author Jia, W
dc.contributor.author Yeh, W
dc.contributor.editor Soriano, M
dc.contributor.editor Qing, S
dc.contributor.editor Lopez, J
dc.date.accessioned 2012-02-02T11:08:13Z
dc.date.issued 2010-01
dc.identifier.citation Information and Communications Security - Lecture Notes in Computer Science 6476, 2010, pp. 459 - 471
dc.identifier.other E1 en_US
dc.identifier.uri http://hdl.handle.net/10453/16309
dc.description.abstract Computational cost is one of the major concerns of the commercial Intrusion Detection Systems (IDSs). Although these systems are proven to be promising in detecting network attacks, they need to check all the signatures to identify a suspicious attack in the worst case. This is time consuming. This paper proposes an efficient two-tier IDS, which applies a statistical signature approach and a Linear Discriminant Method (LDM) for the detection of various Web-based attacks. The two-tier system converts high-dimensional feature space into a low-dimensional feature space. It is able to reduce the computational cost and integrates groups of signatures into an identical signature. The integration of signatures reduces the cost of attack identification. The final decision is made on the integrated low-dimensional feature space. Finally, the proposed two-tier system is evaluated using DARPA 1999 IDS dataset for webbased attack detection.
dc.publisher Springer
dc.relation.isbasedon 10.1007/978-3-642-17650-0_32
dc.title A Two-Tier System for Web Attack Detection Using Linear Discriminant Method
dc.type Conference Proceeding
dc.parent Information and Communications Security - Lecture Notes in Computer Science 6476
dc.journal.number en_US
dc.publocation Berlin Heidelberg en_US
dc.identifier.startpage 459 en_US
dc.identifier.endpage 471 en_US
dc.cauo.name FEIT.School of Computing and Communications en_US
dc.conference Verified OK en_US
dc.conference Information and Communications Security
dc.for 0803 Computer Software
dc.personcode 990421
dc.personcode 044299
dc.personcode 010261
dc.personcode 108020
dc.personcode 106463
dc.personcode 114223
dc.percentage 100 en_US
dc.classification.name Computer Software en_US
dc.classification.type FOR-08 en_US
dc.edition 1 en_US
dc.custom Information and Communications Security en_US
dc.date.activity 20101215 en_US
dc.date.activity 2010-12-15
dc.location.activity Barcelona, Spain en_US
dc.description.keywords Web-based attack, Intrusion detection, Packet payload, Feature selection, Linear discriminant method.
pubs.embargo.period Not known
pubs.organisational-group /University of Technology Sydney
pubs.organisational-group /University of Technology Sydney/Faculty of Engineering and Information Technology
pubs.organisational-group /University of Technology Sydney/Faculty of Engineering and Information Technology/School of Computing and Communications
pubs.organisational-group /University of Technology Sydney/Faculty of Engineering and Information Technology/School of Software
pubs.organisational-group /University of Technology Sydney/Strength - Realtime Information Networks
utslib.copyright.status Closed Access
utslib.copyright.date 2015-04-15 12:17:09.805752+10
pubs.consider-herdc true
utslib.collection.history Closed (ID: 3)


Files in this item

This item appears in the following Collection(s)

Show simple item record