Reference Hub3
Risk Factors to Retrieve Anomaly Intrusion Information and Profile User Behavior

Risk Factors to Retrieve Anomaly Intrusion Information and Profile User Behavior

Yun Wang, Lee Seidman
Copyright: © 2006 |Volume: 2 |Issue: 1 |Pages: 17
ISSN: 1548-0631|EISSN: 1548-064X|ISSN: 1548-0631|EISBN13: 9781615201730|EISSN: 1548-064X|DOI: 10.4018/jbdcn.2006010104
Cite Article Cite Article

MLA

Wang, Yun, and Lee Seidman. "Risk Factors to Retrieve Anomaly Intrusion Information and Profile User Behavior." IJBDCN vol.2, no.1 2006: pp.44-60. http://doi.org/10.4018/jbdcn.2006010104

APA

Wang, Y. & Seidman, L. (2006). Risk Factors to Retrieve Anomaly Intrusion Information and Profile User Behavior. International Journal of Business Data Communications and Networking (IJBDCN), 2(1), 44-60. http://doi.org/10.4018/jbdcn.2006010104

Chicago

Wang, Yun, and Lee Seidman. "Risk Factors to Retrieve Anomaly Intrusion Information and Profile User Behavior," International Journal of Business Data Communications and Networking (IJBDCN) 2, no.1: 44-60. http://doi.org/10.4018/jbdcn.2006010104

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

The use of network traffic audit data for retrieving anomaly intrusion information and profiling user behavior has been studied previously, but the risk factors associated with attacks remain unclear. This study aimed to identify a set of robust risk factors via the bootstrap resampling and logistic regression modeling methods based on the KDD-cup 1999 data. Of the 46 examined variables, 16 were identified as robust risk factors, and the classification showed similar performances in sensitivity, specificity, and correctly classified rate in comparison with the KDD-cup 1999 winning results that were based on a rule-based decision tree algorithm with all variables. The study emphasizes that the bootstrap simulation and logistic regression modeling techniques offer a novel approach to understanding and identifying risk factors for better information protection on network security.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.