Abstract
This paper presents various parameters for the analysis of threats to any network or system. These parameters are based on the anomalous behavior of the system. To characterize the behavior of the system connected to the Internet, we need to consider a number of incoming and outgoing packets, the process running in the background and system response which include CPU utilization and RAM utilization. Dataset is collected for the above-mentioned parameter under the normal condition and under the condition of any cyber-attack or threat. Based on the deviation in the values under two conditions, another statistical parameter entropy is calculated. This will helps us to identify the type of threats.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
R. Sekar, A. Gupta, J. Frullo, T. Shanbhag, A. Tiwari, H. Yang, S. Zhou, Specification-based anomaly detection: a new approach for detecting network intrusions, in CCS’02: Proceedings of the 9th ACM Conference on Computer and Communications Security (2002)
R. Ravinder Reddy, Network intrusion anomaly detection using radial basis function networks. Int. J. Res. Comput. Sci. 1011–1014 (2017)
A.S. Navaz, V. Sangeetha, C. Prabhadevi, Entropy based anomaly detection system to prevent DDoS attacks in cloud. arXiv preprint arXiv 1308–6745 (2013)
M. Tavallaee, N. Stakhanova, A.A. Ghorbani, Toward credible evaluation of anomaly-based intrusion-detection methods. IEEE Trans. Syst. Man Cybern. Part C (Appl. Rev.) 40(5), 516–524 (2010)
V. Chandola, A. Banerjee, V. Kumar, Anomaly detection: a survey. ACM Comput. Surv. (CSUR) 41(3), 15 (2009)
F. Sabahi, A. Movaghar, Intrusion detection: a survey, in ICSNC’08, 3rd International Conference on IEEE Systems and Networks Communications, 23–26 Oct 2008
S.T. Kung, C.C. Cheng, C.C. Liu, Y.C. Chen, Dynamic power saving by monitoring CPU utilization. U.S. Patent, 574,739, Jun 2003
R.K. Shymasundar, N.V. Narendra Kumar, P. Teltumde, Realizing software vault on Android through information-flow control, in 2017 IEEE Symposium on Computers and Communications (ISCC) (2017), pp. 1007–1014
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Mishra, H., Karsh, R.K., Pavani, K. (2020). Anomaly-Based Detection of System-Level Threats and Statistical Analysis. In: Elçi, A., Sa, P., Modi, C., Olague, G., Sahoo, M., Bakshi, S. (eds) Smart Computing Paradigms: New Progresses and Challenges. Advances in Intelligent Systems and Computing, vol 767. Springer, Singapore. https://doi.org/10.1007/978-981-13-9680-9_23
Download citation
DOI: https://doi.org/10.1007/978-981-13-9680-9_23
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-13-9679-3
Online ISBN: 978-981-13-9680-9
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)