JOURNAL ARTICLE

Multi-events analysis for anomaly intrusion detection

Abstract

Probabilistic methods are widely used in intrusion detection especially in computer audit data analysis. There are many famous probabilistic algorithm such as decision tree, Hotelling's T2, chi-square, first-order and high-order Markov model. These algorithms focus on some data features to mark anomaly state. New features are introduced into these algorithms and proper combination of these features will provide excellent result. But these algorithms are used single metric generated by multi-events so as to detect intrusion by comparison with a certain threshold. Experiment shows that using per event-based metric can improve accuracy of intrusion detection but not improve complexity of algorithm. In our paper we will provide a metric vector based on algorithm to detection intrusion that is more accurate and effective than traditional ones. Also, we provide some intrusion detection methods to our algorithm.

Keywords:
Intrusion detection system Computer science Anomaly detection Probabilistic logic Metric (unit) Data mining Anomaly-based intrusion detection system Decision tree Hidden Markov model Algorithm Artificial intelligence Engineering

Metrics

6
Cited By
1.06
FWCI (Field Weighted Citation Impact)
12
Refs
0.81
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Citation History

Topics

Network Security and Intrusion Detection
Physical Sciences →  Computer Science →  Computer Networks and Communications
Anomaly Detection Techniques and Applications
Physical Sciences →  Computer Science →  Artificial Intelligence
Advanced Malware Detection Techniques
Physical Sciences →  Computer Science →  Signal Processing

Related Documents

BOOK-CHAPTER

Intrusion Anomaly Detection with Multi-transformer

W. F. MaderBin WenWenlong LiuWenchao DuXu Wei

Communications in computer and information science Year: 2025 Pages: 3-16
JOURNAL ARTICLE

Multi-Agent-Based Anomaly Intrusion Detection

J. Arokia RenjitK. L. Shunmuganathan

Journal:   Information Security Journal A Global Perspective Year: 2011 Vol: 20 (4-5)Pages: 185-193
BOOK-CHAPTER

PAID: Packet Analysis for Anomaly Intrusion Detection

Kuo-Chen LeeJason ChangMing-Syan Chen⋆

Lecture notes in computer science Year: 2008 Pages: 626-633
BOOK-CHAPTER

Anomaly-Based Intrusion Detection

Jorge Maestre VidalMarco Antonio Sotelo MongeSergio Mauricio Martínez Monterrubio

Advances in information security, privacy, and ethics book series Year: 2019 Pages: 195-218
© 2026 ScienceGate Book Chapters — All rights reserved.