Skip to main content

Anomaly-Based Detection of System-Level Threats and Statistical Analysis

  • Conference paper
  • First Online:
Smart Computing Paradigms: New Progresses and Challenges

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 767))

Abstract

This paper presents various parameters for the analysis of threats to any network or system. These parameters are based on the anomalous behavior of the system. To characterize the behavior of the system connected to the Internet, we need to consider a number of incoming and outgoing packets, the process running in the background and system response which include CPU utilization and RAM utilization. Dataset is collected for the above-mentioned parameter under the normal condition and under the condition of any cyber-attack or threat. Based on the deviation in the values under two conditions, another statistical parameter entropy is calculated. This will helps us to identify the type of threats.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. R. Sekar, A. Gupta, J. Frullo, T. Shanbhag, A. Tiwari, H. Yang, S. Zhou, Specification-based anomaly detection: a new approach for detecting network intrusions, in CCS’02: Proceedings of the 9th ACM Conference on Computer and Communications Security (2002)

    Google Scholar 

  2. R. Ravinder Reddy, Network intrusion anomaly detection using radial basis function networks. Int. J. Res. Comput. Sci. 1011–1014 (2017)

    Google Scholar 

  3. A.S. Navaz, V. Sangeetha, C. Prabhadevi, Entropy based anomaly detection system to prevent DDoS attacks in cloud. arXiv preprint arXiv 1308–6745 (2013)

    Google Scholar 

  4. M. Tavallaee, N. Stakhanova, A.A. Ghorbani, Toward credible evaluation of anomaly-based intrusion-detection methods. IEEE Trans. Syst. Man Cybern. Part C (Appl. Rev.) 40(5), 516–524 (2010)

    Article  Google Scholar 

  5. V. Chandola, A. Banerjee, V. Kumar, Anomaly detection: a survey. ACM Comput. Surv. (CSUR) 41(3), 15 (2009)

    Article  Google Scholar 

  6. F. Sabahi, A. Movaghar, Intrusion detection: a survey, in ICSNC’08, 3rd International Conference on IEEE Systems and Networks Communications, 23–26 Oct 2008

    Google Scholar 

  7. S.T. Kung, C.C. Cheng, C.C. Liu, Y.C. Chen, Dynamic power saving by monitoring CPU utilization. U.S. Patent, 574,739, Jun 2003

    Google Scholar 

  8. R.K. Shymasundar, N.V. Narendra Kumar, P. Teltumde, Realizing software vault on Android through information-flow control, in 2017 IEEE Symposium on Computers and Communications (ISCC) (2017), pp. 1007–1014

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Himanshu Mishra .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Mishra, H., Karsh, R.K., Pavani, K. (2020). Anomaly-Based Detection of System-Level Threats and Statistical Analysis. In: Elçi, A., Sa, P., Modi, C., Olague, G., Sahoo, M., Bakshi, S. (eds) Smart Computing Paradigms: New Progresses and Challenges. Advances in Intelligent Systems and Computing, vol 767. Springer, Singapore. https://doi.org/10.1007/978-981-13-9680-9_23

Download citation

Publish with us

Policies and ethics