TY - JOUR
T1 - A two-tier system for web attack detection using linear discriminant method
AU - Tan, Zhiyuan
AU - Jamdagni, Aruna
AU - He, Xiangjian
AU - Nanda, Priyadarsi
AU - Liu, Ren Ping
AU - Jia, Wenjing
AU - Yeh, Wei-chang
PY - 2010
Y1 - 2010
N2 - Computational cost is one of the major concerns of the commercial Intrusion Detection Systems (IDSs). Although these systems are proven to be promising in detecting network attacks, they need to check all the signatures to identify a suspicious attack in the worst case. This is time consuming. This paper proposes an efficient two-tier IDS, which applies a statistical signature approach and a Linear Discriminant Method (LDM) for the detection of various Web-based attacks. The two-tier system converts high-dimensional feature space into a low-dimensional feature space. It is able to reduce the computational cost and integrates groups of signatures into an identical signature. The integration of signatures reduces the cost of attack identification. The final decision is made on the integrated low-dimensional feature space. Finally, the proposed two-tier system is evaluated using DARPA 1999 IDS dataset for webbased attack detection.
AB - Computational cost is one of the major concerns of the commercial Intrusion Detection Systems (IDSs). Although these systems are proven to be promising in detecting network attacks, they need to check all the signatures to identify a suspicious attack in the worst case. This is time consuming. This paper proposes an efficient two-tier IDS, which applies a statistical signature approach and a Linear Discriminant Method (LDM) for the detection of various Web-based attacks. The two-tier system converts high-dimensional feature space into a low-dimensional feature space. It is able to reduce the computational cost and integrates groups of signatures into an identical signature. The integration of signatures reduces the cost of attack identification. The final decision is made on the integrated low-dimensional feature space. Finally, the proposed two-tier system is evaluated using DARPA 1999 IDS dataset for webbased attack detection.
UR - http://handle.uws.edu.au:8081/1959.7/533289
U2 - 10.1007/978-3-642-17650-0_32
DO - 10.1007/978-3-642-17650-0_32
M3 - Article
SN - 0302-9743
VL - 6476
SP - 459
EP - 471
JO - Lecture Notes in Computer Science
JF - Lecture Notes in Computer Science
ER -