Summary
In this paper innovative recognition algorithm applied to Intrusion and/or Anomaly Detection System presented. We propose to use Matching Pursuit Mean Projection (MP-MP) of the reconstructed network signal to recognize anomalies/intrusions in network traffic. The practical usability of the proposed approach in the intrusion detection tolerance system (IDTS) in the INTERSECTION project is presented.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Esposito, M., Mazzariello, C., Oliviero, F., Romano, S.P., Sansone, C.: Evaluating Pattern Recognition Techniques in Intrusion Detection Systems. In: PRIS 2005, pp. 144–153 (2005)
Cheng, C.-M., Kung, H.T., Tan, K.-S.: Use of spectral analysis in defense against DoS attacks. In: IEEE GLOBECOM 2002, pp. 2143–2148 (2002)
Barford, P., Kline, J., Plonka, D., Ron, A.: A signal analysis of network traffic anomalies. In: ACM SIGCOMM Internet Measurement Workshop (2002)
Huang, P., Feldmann, A., Willinger, W.: A non-intrusive, wavelet-based approach to detecting network performance problems. In: ACM SIGCOMM Internet Measurement Workshop (November 2001)
Li, L., Lee, G.: DDos attack detection and wavelets. In: IEEE ICCCN 2003, October 2003, pp. 421–427 (2003)
Dainotti, A., Pescape, A., Ventre, G.: Wavelet-based Detection of DoS Attacks. In: 2006 IEEE GLOBECOM, San Francisco, CA, USA (November 2006)
Mallat, S., Zhang: Matching Pursuit with time-frequency dictionaries. IEEE Transactions on Signal Processing 41(12), 3397–3415 (1993)
Troop, J.A.: Greed is Good: Algorithmic Results for Sparse Approximation. IEEE Transactions on Information Theory 50(10) (October 2004)
Gribonval, R.: Fast Matching Pursuit with a Multiscale Dictionary of Gaussian Chirps. IEEE Transactions on Signal Processing 49(5) (May 2001)
Jost, P., Vandergheynst, P., Frossard, P.: Tree-Based Pursuit: Algorithm and Properties. In: Swiss Federal Institute of Technology Lausanne (EPFL), Signal Processing Institute Technical Report. TR-ITS-2005.013 (May 17, 2005)
Andrysiak, T., Choraś, M.: Image Retrieval Based on Hierarchical Gabor Filters. International Journal Applied Mathematics and Computer Science (AMCS) 15(4), 471–480 (2005)
Dainotti, A., Pescape, A., Ventre, G.: Worm Traffic Analysis and Characterization. In: Proceedings of ICC, pp. 1435–1442. IEEE CS Press, Los Alamitos (2007)
Renk, R., Saganowski, Ł., Hołubowicz, W., Choraś, M.: Intrusion Detection System Based on Matching Pursuit. In: Proc. Intelligent Networks and Intelligent Systems, ICINIS 2008, pp. 213–216. IEEE CS Press, Los Alamitos (2008)
Saganowski, Ł., Choraś, M., Renk, R., Hołubowicz, W.: Signal-based Approach to Anomaly Detection in IDS Systems. International Journal of Intelligent Engineering and Systems 1(4), 18–24 (2008)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Choraś, M., Saganowski, Ł., Renk, R., Kozik, R., Hołubowicz, W. (2009). Recognizing Anomalies/Intrusions in Heterogeneous Networks. In: Kurzynski, M., Wozniak, M. (eds) Computer Recognition Systems 3. Advances in Intelligent and Soft Computing, vol 57. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-93905-4_67
Download citation
DOI: https://doi.org/10.1007/978-3-540-93905-4_67
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-93904-7
Online ISBN: 978-3-540-93905-4
eBook Packages: EngineeringEngineering (R0)