Proceedings of the 2003 SIAM International Conference on Data Mining


A Comparative Study of Anomaly Detection Schemes in Network Intrusion Detection

This Paper Appears in

Cover Image

Title Information

Published: 2003
ISBN: 978-0-89871-545-3
eISBN: 978-1-61197-273-3
Book Code: PR112
Pages: 12

†The authors are grateful to Richard Lippmann and Daniel Barbara for providing data sets and their useful comments. This work was partially supported by Army High Performance Computing Research Center contract number DAAD19-01-2-0014. The content of the work does not necessarily reflect the position or policy of the government and no official endorsement should be inferred. Access to computing facilities was provided by the AHPCRC and the Minnesota Supercomputing Institute

Abstract

Intrusion detection corresponds to a suite of techniques that are used to identify attacks against computers and network infrastructures. Anomaly detection is a key element of intrusion detection in which perturbations of normal behavior suggest the presence of intentionally or unintentionally induced attacks, faults, defects, etc. This paper focuses on a detailed comparative study of several anomaly detection schemes for identifying different network intrusions. Several existing supervised and unsupervised anomaly detection schemes and their variations are evaluated on the DARPA 1998 data set of network connections [9] as well as on real network data using existing standard evaluation techniques as well as using several specific metrics that are appropriate when detecting attacks that involve a large number of connections. Our experimental results indicate that some anomaly detection schemes appear very promising when detecting novel intrusions in both DARPA'98 data and real network data.