Next Article in Journal
Convergence of AI and Urban Emergency Responses: Emerging Pathway toward Resilient and Equitable Communities
Previous Article in Journal
A Model for Determining the Dependability of Continuous Subsystems in Coal Mines Using the Fuzzy Logic Approach
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Bootstrap and MRCD Estimators in Hotelling’s T2 Control Charts for Precise Intrusion Detection

by
Ichwanul Kahfi Prasetya
1,
Muhammad Ahsan
1,*,
Muhammad Mashuri
1 and
Muhammad Hisyam Lee
2
1
Department of Statistics, Institut Teknologi Sepuluh Nopember, Surabaya 60111, Indonesia
2
Department of Mathematical Sciences, Universiti Teknologi Malaysia, Johor Bahru 81310, Malaysia
*
Author to whom correspondence should be addressed.
Appl. Sci. 2024, 14(17), 7948; https://doi.org/10.3390/app14177948
Submission received: 1 April 2024 / Revised: 15 August 2024 / Accepted: 4 September 2024 / Published: 6 September 2024

Abstract

:
Intrusion detection systems (IDS) are crucial in safeguarding network security by identifying unauthorized access attempts through various techniques. Statistical Process Control (SPC), particularly Hotelling’s T2 control charts, is noted for monitoring network traffic against known attack patterns or anomaly detection. This research advances the domain by incorporating robust statistical estimators—namely, the Fast-MCD and MRCD (Minimum Regularized Covariance Determinant) estimators—into bootstrap-enhanced Hotelling’s T2 control charts. These enhanced charts aim to strengthen detection accuracy by offering improved resistance to outlier contamination, a prevalent challenge in intrusion detection. The methodology emphasizes the MRCD estimator’s robustness in overcoming the limitations of traditional T2 charts, especially in environments with a high incidence of outliers. Applying the proposed bootstrap-based robust T2 charts to the UNSW-NB15 dataset illustrates a marked enhancement in intrusion detection performance. Results indicate superior performance of the proposed method over conventional T2 and Fast-MCD-based T2 charts in detection accuracy, even in varied levels of outlier contamination. Despite increasing execution time, the precision and reliability in detecting intrusions present a justified trade-off. The findings underscore the significant potential of integrating robust statistical methods to enhance IDS effectiveness.

1. Introduction

Intrusion detection is a process of monitoring events within a computer system or network, where subsequent analysis of the monitored data is conducted to identify any signs of attempted intrusions. Intrusion refers to attempts to gain unauthorized access to a computer system or network, potentially threatening the availability, integrity, and confidentiality of a computer network system. The system used to perform intrusion detection is known as an intrusion detection system (IDS) [1]. Intrusion detection matches network traffic patterns with known attack patterns or identifies abnormal network traffic patterns [2]. Anomaly-based network intrusion detection systems are generally categorized into knowledge-based systems, computational approaches, and statistical approaches [3]. One statistical methodological approach used in intrusion detection is Statistical Process Control (SPC), which is widely applied across various sectors, including services and industries. SPC can also be applied to intrusion detection systems (IDS), and its conventional use is in monitoring changes within manufacturing and service processes. Recent research has investigated how SPC can detect unauthorized intrusions [4].
Statistical Process Control (SPC) has played a significant role in product quality control since Shewhart [5] introduced the control chart techniques by applying statistical methods to monitor the industrial and manufacturing processes. One of the multivariate control charts to monitor the process mean is Hotelling’s T2 control chart [6], which can be used to monitor individual or subgroup observations. In SPC concepts, an outlier can be defined as an observation that significantly deviates from other observations, which indicates that the observation is observed by a different process [7]. Hotelling’s T2 chart is unsuitable for detecting the presence of multiple outliers [8] due to the masking and swamping effect [9], especially for highly outlier-contaminated data. The statistic of T2, which is based on the classical estimator, is easily affected and decreased by the presence of outliers [10,11]. Moreover, the performance of control charts will decrease if the variables monitored increase [12].
Several methods have been proposed to overcome this problem and minimize the effects of outliers by changing the classical estimator with a robust one, especially for the covariance matrix estimator. The performance of the T2 control chart in detecting shifts in the mean could be enhanced by using a robust estimator [13]. Many robust methods have been adopted to develop a T2 control chart to minimize the effect of outliers. These methods such as Minimum Volume Ellipsoid (MVE) [14], Trimming Method [15,16], Minimum Vector Variance [17,18], Successive Difference Covariance Matrix (SDCM) [10,19], Minimum Covariance Determinant (MCD) [15,20], Reweighted minimum covariance determinant (RMCD) [21], and Fast Minimum Covariance Determinant (Fast-MCD), whose good performance on monitoring small to medium outlier contaminated data with 30% breakdown point [22]. The latest development of robust estimators is the Minimum Regularized Covariance Determinant (MRCD) method [23], which uses a data-driven algorithm and regularization to avoid overfitting problems. The MRCD estimator can be used to detect outliers in high-dimensional data. Besides the robust estimator, the Hotelling’ T2 chart can also be developed using a non-parametric approach as a control limit, namely the bootstrap resampling method [24].
This research focuses on developing bootstrap-based robust T2 control charts with MRCD estimators for detecting intrusion. This method will be applied to the UNSW-NB15 dataset. The primary contributions of this research are as follows:
  • Development: A novel control chart methodology based on the MRCD estimator is introduced for the identification of anomalous observation. The efficacy of the proposed method is assessed under diverse simulation conditions.
  • Application: The developed approach is applied to real-world network intrusion detection scenarios. Comparative performance evaluations with established benchmark methods are conducted.
The rest of this paper is organized as follows: Section 2 presents the related work. In Section 3, the explanation of the proposed chart construction is presented. Section 4 provides the methodology and procedural details of the proposed chart. The application results of the chart for intrusion detection system (IDS) datasets are presented in Section 5. Finally, Section 6 is dedicated to the conclusion and future research.

2. Related Works

The SPC method commonly used in intrusion detection is a multivariate control chart. Ye et al. [25] initiated the use of Markov Chain techniques, T2 Hotelling, and chi-square multivariate tests for intrusion detection. Then, Ye et al. [26] proposed a technique based on Hotelling’s T2 to detect anomalies associated with counter relationships and mean shifts. Qu, Hariri, and Yousif [27] use the T2 Hotelling diagram to detect intrusions on a network called real-time Multivariate Analysis for the Network Attack detection algorithm (MANA) by updating control limits at certain time intervals. Zhang, Zhu, and Jin [28] developed a Support Vector Clustering (SVC) based control diagram with performance results similar to the T2 diagram for detecting anomalies in computer networks. Tavallaee et al. [29] apply the Covariance Matrix Sign (CMS) to detecting Denial of Service (DoS) attacks. Sivasamy and Sundan [30] compared the performance of the T2 Hotelling control chart with the SVM and TANN methods. They found that Hotelling’s T2 accuracy level was high for all attack classes.
Besides Hotelling’s T2 chart, Rastogi et al. [31] stated that MEWMA and MCUSUM could be used in intrusion detection. However, intrusion detection data involves many quality characteristics, so MEWMA and MCUSUM are unsuitable. Camacho et al. [32] use PCA based on Multivariate Statistical Process Control (MSPC) to detect intrusions. Ahsan et al. [33] use PCA-based Hotelling’s T2, producing more efficient computational time. The use of non-parametric control limits improves performance on the T2 control diagram with a Successful Difference Covariance Matrix (SDCM) in the form of Kernel Density Estimation [34] and bootstrap resampling [35]. Then, Ahsan et al. [22] developed robust Hotelling’s T2 based on Fast-MCD, which shows better performance in detecting outliers in intrusion detection systems.

3. Material and Methods

3.1. UNSW-NB15 Dataset

The UNSW-NB15 dataset was built using the IXIA PerfectStorm tool at the Australian Centre for Cyber Security (ACCS) by generating a combination of everyday activities and realistic, modern artificial attacks for research purposes related to Network Intrusion Detection Systems (NIDS) [36]. Compared to other NIDS datasets, UNSW-NB15 excels in complexity, referring to patterns of modern network traffic attacks, making it suitable for evaluating intrusion detection systems [37]. The training set of UNSW-NB15 consists of 175,341 records with 38 metric features and record labels, which are normal labels and several intrusion labels presented in Table 1.

3.2. Multivariate Hotelling’s T2 Control Chart

This section briefly summarizes the classic multivariate Hotelling’s T2 control chart. Hotelling’s T2 is a multivariate control chart, a generalization of the t-student distribution, that can be used to monitor the process mean. Let x i where i = 1 ,   2 ,   ,   n are identic and independently random vectors that follow the multivariate normal distribution x i ~ N p ( μ , Σ ) . The data structure can be written as X = x 1 T x 2 T x n T with mean vector x ¯ = 1 n x i and covariance matrix S = 1 n 1 x i x ¯ x i x ¯ T . The T i 2 statistics can be calculated as follows [6]:
T i 2 = ( x i x ¯ ) S 1 ( x i x ¯ )
Conventional Hotelling’s T2 chart follows the assumption of multivariate normal distribution [38], so the control limit can be generated by following F-distribution with the following equation:
C L = p ( n + 1 ) ( n 1 ) n 2 n p F α ; p ; n p
where n is the total number of observations and p is the variable quantity, with α is the false alarm rate. The monitoring process is considered controlled if T2 statistics are not greater than the control limit.

3.3. Bootstrap Control Limit-Based T2 Chart

In some cases, a random variable might not follow any certain distributions. The bootstrap method is applied to overcome this problem and estimate the unknown distribution parameter [39,40]. Despite initially being proposed based on classic T2 statistics [24], this control limit can also be adopted in the proposed chart by putting robust statistics in the first step. The algorithm of bootstrap control limit calculation (see Figure 1 for illustration) is presented in Algorithm 1 as follows:
Algorithm 1 Of Bootstrap Control Limit
Step 1.
Compute the statistic T2 with n observations.
Step 2.
Generate B times bootstrap samples from statistic T2 for n observations with replacement (e.g., B = 1000).
Step 3.
Step 3. Calculate 100(1 − α).th percentile for each bootstrap resample for statistic T 2 ( l ) ; l = 1 ,   2 ,   ,   n
Step 4.
Determine the bootstrap control limit by averaging each replication using
C L B = 1 B i = 1 B T 2 100 ( 1 α ) ( l )

3.4. MRCD Algorithm

The Minimum Covariance Determinant (MCD) based method is one of the most extensively employed robust multivariate location and scatter estimators. This method is designed to determine H M C D , defined as a subset with the smallest sample covariance determinant. The MCD estimates for the mean vector and covariance matrix correspond to the mean vector and covariance matrix of H M C D . Define h as the subset size, where n 2 h < n and h p must be fulfilled; otherwise, the covariance matrix derived from the MCD method would become singular. The MCD algorithm calculates every subset possible, as many as n h possible combinations, in order to obtain H M C D . Therefore, this method is time-consuming and not suitable for estimating large datasets.
Minimum Regularized Covariance Determinant (MRCD) estimators are proposed [23] as the extension of MCD. The MRCD is a robust estimator that uses various combinations of target matrix and regularization weight determined through data-driven procedures. The application of the MRCD estimator is robust and well-suited for handling outliers in datasets with high dimensions.
Let X = x 1 ,   x 2 ,   ,   x i ,   , x n , where x i = x i 1 ,   x i 2 ,     , x i p from a p-variate observations. First, the data must be standardized using the Qn estimator [41] and these values must be put in a diagonal matrix D X . The median of each variable also needs to be computed and put in a location vector v X . The standardized observations are then stated on U that constructed under a set of u i as follows:
u i = D X 1 x i v X
The next step is defining the target matrix (T) and scalar regularization parameter ( ρ ) . T is a p × p diagonal matrix that consists of estimated univariate scales, while ρ is a weighted parameter that can be obtained by a data-driven approach that satisfies 0 ρ 1 . Then, define h × p covariance matrix K H of h-subset of H on the standardized data U as follows:
K H = ρ   T + 1 ρ c γ S U ( H )
where S U ( H ) is the covariance matrix of the h-subset for U and c γ is the consistency factor [42].
Mathematical operation (7) can be done by a spectral decomposition T = Q λ Q where λ represents the diagonal matrix encompassing the eigenvalues of T, while Q denotes the orthogonal matrix comprising the corresponding eigenvectors. The previous equation can be rewritten as follows:
K H = Q λ 1 / 2 ρ   I + 1 ρ c α S W H λ 1 / 2 Q
where W contains the transformation of standardized observations w i = λ 1 / 2 Q u i . Consequently, it follows S W H = λ 1 / 2 Q S U ( H ) Q λ 1 / 2 .
The subset MRCD H M C D is obtained by minimizing the determinant of the regularized covariance matrix K(H) as:
H M R C D = argmin H Ω d e t K ( H ) H M R C D = a r g m i n H Ω det ρ   I + 1 ρ c α S W H
Once the H M R C D is determined, then the location and scatters of the MRCD estimator can be defined as:
x ¯ M R C D = v X + D X H ¯ M R C D
S M R C D = D X Q λ 1 / 2 ρ   I + 1 ρ c α S W H M R C D λ 1 / 2 Q D X

3.5. MRCD-Based T2 Chart

In order to develop the robust T2 control chart, this study exchanges the classic estimators of mean vectors x ¯ and covariance matrix S from Equation (1) with the estimated values obtained of mean vector and covariance matrix from robust estimators. Robust T2 statistic based on MRCD was constructed as follows:
T M R C D ; i 2 = ( x i x ¯ M R C D ) S M R C D 1 ( x i x ¯ M R C D )
Due to the unknown distribution of the proposed chart, its control limit for both charts is estimated using the bootstrap resampling method to develop an adaptive control chart. The detailed procedure for the control limit is presented in the previous subsection.

4. Methodology

Two phases are required to be undertaken in developing the proposed robust T2 chart based on the MRCD estimator. Phase I is building a typical profile from the in-control, while Phase II detects intrusion using the calculated statistics and control limit from Phase II. Phase I must calculate the mean vector, covariance matrix, and bootstrap control limit. The procedure of Phase I is shown as following these steps:
Phase I: Normal Profile Construction
Step 1.
Form the in-control or normal data matrix X n o r m a l
Step 2.
Calculate x ¯ M R C D and S M R C D , which are the robust estimated values of normal data X n o r m a l using the MRCD algorithm in Equations (7) and (8)
Step 3.
Calculate T M R C D ; i 2 using Equation (9) from normal data X n o r m a l
Step 4.
Determine α and compute the bootstrap control limit C L B ; M R C D
Then, the estimated normal profile and control limit from Phase I are utilized for the Phase II detection process. The steps of Phase II are shown as follows:
Phase II: Detection
Step 1.
Form a new data matrix X t e s t
Step 2.
Calculate T M R C D ; i 2 from new data X n o r m a l as follows:
T M R C D ; i 2 = x t e s t ; i x ¯ M R C D T S M R C D 1 x t e s t ; i x ¯ M R C D
where x ¯ M R C D and S M R C D are taken from Phase I
Step 3.
Detect if T M R C D ; i 2 > C L B ; M R C D then the observation is labeled as an intrusion, and if T M R C D ; i 2 C L B ; M R C D then the observation is labeled as normal
Moreover, the evaluation of the proposed system can be conducted using the confusion matrix presented in Table 2. The assessment of classification effectiveness is determined by the degree of goodness and degree of error. In the context of intrusion detection, goodness is categorized into two types:
a.
True Positives (TPs) are intrusion records that are successfully detected as intrusions.
b.
True Negatives (TNs) are normal records that are correctly stated as normal.
The errors in detecting intrusion also can be divided into two types:
a.
False Positives (FPs) are normal records that are incorrectly detected as intrusions.
b.
False Negatives (FNs) are intrusion records that are unsuccessfully detected as normal.
FPs led to a false alarm, while FNs result in undetected chart intrusions. These error types can be used to calculate the degree of error, namely FP Rate and FN Rate [43]. The level of goodness can be measured using the Area Under Curves (AUC) as follows [44]:
A U C = 1 2 T P T P + F N + T N T N + F P
F P   R a t e = F P T N + F P
F N   R a t e = F N T P + F N

5. Results and Discussions

5.1. Simulation Study

Performance evaluation of control charts can be done by conducting a simulation study of outlier detection. The outlier detection method is carried out by simulating 1000 generated data containing outlier proportions ranging from 5%, 10%, 20%, 30%, 40%, and 50%, with the criteria being normal data X n o r m a l ~ N p 0 , I and outlier data X o u t ~ N p 3 , I as implemented to detect small outliers [22]. The number of variables generated is also regulated under several conditions, namely p = 5 ,   p = 10 ,   p = 20 ,   p = 30 ,   p = 40 ,   a n d   p = 50 . The performance evaluation encompassed three types of multivariate charts, specifically the conventional Hotelling’s T2, the robust Hotelling’s T2 based on Fast-MCD, and the robust Hotelling’s T2 based on MRCD as proposed.
Outlier detection in conventional Hotelling’s T2 control charts is carried out with detailed results obtained in Table 3. Table 3 shows the performance of Accuracy, AUC, FP rate, and FP rate of Hotelling’s T2 control charts with bootstrap control limits in detecting outliers for each number of variables and various percentages of outliers added according to the procedures. Regarding performance, the conventional T2 charts only work pretty well with an AUC of more than 0.75 and an FN Rate of less than 0.5 on data with a 5% outlier percentage for low dimensions ( p = 5 ) and medium dimension ( p = 10 ). In contrast, performance decreases drastically in high dimensional data ( p = 30 ,   40 ,   50 ). In addition, data with outlier percentages of 10%, 20%, 30%, 40%, and 50% for any dimension all indicate poor performance.
Then, the outlier detection in robust Fast-MCD-based Hotelling’s T2 control charts is carried out, and detailed results are obtained in Table 4. Table 4 presents the performance of Accuracy, AUC, FP rate, and FP rate of robust Fast-MCD-based Hotelling’s T2 control charts with bootstrap control limits in detecting outliers for each number of variables and various percentages of outliers added according to the procedures before.
Based on the outlier detection, detailed results are obtained in Table 4. In terms of performance, robust Fast-MCD based Hotelling’s T2 control charts work very well for conditions of low-dimensional ( p = 5 ) and medium dimensions ( p = 10 ) data, which is indicated by an AUC of more than 0.99 and an FN Rate below 0.01. The same good results can still be achieved in high dimensional conditions, but only at outlier percentages of 5% and 10%. Meanwhile, in high-dimensional data, the outlier percentage is more than 10%, and there is a drastic decrease in performance, where the AUC value is around 0.5, and the FN Rate is above 0.97. This constraint is based on previous research stating that the greater the observed quality characteristics, the lower the performance of the T2 charts. This limitation also applies to the robust Fast-MCD estimator and cannot be resolved entirely.
Finally, the outlier detection in robust MRCD-based Hotelling’s T2 control charts is carried out, and detailed results are obtained in Table 5. Table 5 presents the performance of Accuracy, AUC, FP rate, and FP rate of robust MRCD-based Hotelling’s T2 control charts with bootstrap control limits in detecting outliers for each number of variables and various percentages of outliers added according to the procedures before. Based on the outlier detection, detailed results are obtained in Table 5. In terms of performance, the robust MRCD-based Hotelling’s T2 control charts work very well for almost all conditions, as shown by an AUC of more than 0.99 and an FN Rate of below 0.01. This diagram only experiences problems: all data with an outlier percentage of 50% and a slight decrease in data with an outlier percentage of 40%. Besides p = 5 and p = 40 , at 40%, the outlier percentage still has a pretty good AUC in the 70–90%. The FN Rate is not too high, namely 0.3–0.5. The absence of a decrease in performance when the quality characteristics increase indicates that robust MRCD-based Hotelling’s T2 control charts can show consistent performance when used on high-dimensional data.
The performance results of each diagram in detecting outliers were shown and explained. These results can be compared to find out which diagram has the best performance in detecting outliers in various conditions. The following is a visualization of the chart’s performance comparison.
Figure 2 shows the AUC values for all diagrams based on the number of variables where Hotelling’s T2 charts perform poorly in almost all scenarios. Fast-MCD-based T2 charts can work very well in low dimensional data scenarios where p 10 , but when the variables increase, the performance will decrease. Meanwhile, the MRCD-based T2 charts can overcome the weaknesses of previous diagrams where the proposed diagram can consistently deal with high-dimensional data conditions to reach p = 50 .
To illustrate the comparative performance of the three methods, visual representations for p = 5 ,   20 ,   50 are presented in Figure 3, Figure 4 and Figure 5. A representative scenario, considered a potential outlier breakpoint, namely p = 20 , with a 30% proportion of outliers. Figure 4 shows that the MRCD-based T2 charts can detect outliers well, while the conventional T2 and Fast-MCD-based T2 charts are less effective in identifying and detecting outliers.

5.2. Illustration for IDS on UNSW-NB15 Dataset

The data application is conducted through three methods: conventional Hotelling’s T2, robust T2 based on Fast-MCD, and the proposed diagram, which is the robust T2 based on MRCD. The construction of the control chart is divided into two phases: Phase I for establishing control limits and Phase II for the detection process and calculating the performance of the control chart. In the conventional Hotelling’s T2 control chart, the T2 statistic is calculated using Equation (1), with control limits determined based on the significance level using the criteria of the highest AUC value, which is α = 6%, as depicted in Figure 6a. The control chart can be visualized after computing the statistics and establishing control limits, as shown in Figure 6b.
The statistical plot depicted in Figure 6 shows two types of data labels: green for normal data and red for intrusion data. These statistics will be tested against the control limits. If the value of the statistic T2 > C L B , the observation is detected as an intrusion. If the statistic T2 C L B , the observation is detected as normal. Based on the labels and the detection outcomes obtained, a confusion matrix table can be formed. Visualization in the form of an ROC Curve can also be generated, as shown in Figure 6c, which can subsequently be used for calculating the AUC value. A confusion matrix and AUC value can be seen in Table 6.
Based on Table 6, it can be seen that the performance of conventional Hotelling’s T2 on UNSW-NB15 data is not good, where the AUC value obtained is only 0.511. Then, with an FP Rate of 0.060, a very high FN rate is obtained, namely, 0.917.
Next, in the construction of a control chart for Robust T2 based on Fast-MCD, the T2 statistic is calculated, and the control limits are determined based on the significance level using the criteria of the highest AUC value, which is α = 25%, as depicted in Figure 7a. The control chart can be visualized after computing the statistics and establishing the control limits, as seen in Figure 7b.
Based on the figure, the statistical plot depicts two types of data labels: green for normal data and red for intrusion data. These statistics will be tested against the control limits. If the value of the statistic T2FMCD > C L B , the observation is detected as an intrusion. If the statistic T2FMCD C L B , the observation is normal. Based on the labels and the detection outcomes obtained, a confusion matrix table can be formed. Visualization in the form of an ROC Curve can also be generated, as shown in Figure 7c, which can subsequently be used for calculating the AUC value. A confusion matrix and AUC value can be seen in Table 7. Table 7 shows that the performance of Robust T2 based on Fast-MCD on the UNSW-NB15 data is quite good, with an AUC value of 0.718. Additionally, with an FP rate of 0.25, there is a relatively low FN rate of 0.314.
For constructing the proposed chart of Robust T2 based on MRCD, the T2 statistic is calculated, and the control limits are determined based on the significance level using the criteria of the highest AUC value, α = 30%, as depicted in Figure 8a. The control chart can be visualized after computing the statistics and establishing control limits, as shown in Figure 8b.
The statistical plot depicted in Figure 8 shows two types of data labels: green for normal data and red for intrusion data. These statistics will be tested against the control limits. If the value of the statistic T2MRCD > C L B , the observation is detected as an intrusion. If the statistic T2MRCD C L B , the observation is normal. Based on the labels and the detection outcomes obtained, a confusion matrix table can be formed. Visualization in the form of an ROC Curve can also be generated, as shown in Figure 8c, which can be used subsequently for calculating the AUC value. A confusion matrix and AUC value can be seen in Table 8. Based on Table 8, it is apparent that the performance of Robust T2 based on MRCD on the UNSW-NB15 data is excellent, with an AUC value of 0.849. Additionally, with an FP Rate of 0.298, there is a shallow FN rate of only 0.004.
After applying the UNSW-NB15 data using these three methods, the performance of each chart can be compared by the shape of the ROC Curve in Figure 9. MRCD-based T2 has a larger area; therefore, it has better performance than the other methods, which have a smaller area. The performance of each chart also can be compared and evaluated based on several goodness and error criteria, as presented in Table 9.
Table 9 displays the accuracy, AUC, FP rate, FN rate, and execution time of the three methods used in this study. The conventional T2 method, with its straightforward steps, took only 286 s. The Fast-MCD-based T2 method, known for its efficiency, required 1470 s. Meanwhile, the MRCD-based T2, which features a complex algorithm, took a longer time of 8108 s.
The duration of execution time correlates with the quality of the chart’s performance in detecting intrusions. Based on the AUC values, the conventional T2 Hotelling chart showed poor performance in intrusion detection, achieving an AUC of only 0.511. Both robust T2 charts demonstrated better performance than the conventional T2. The Fast-MCD-based T2 had a relatively good AUC value of 0.718. On the other hand, the proposed MRCD-based T2 had the best performance, with the highest AUC value of 0.849 and a shallow FN Rate of 0.004, indicating a meager chance of undetected intrusions.
Table 10 summarizes the comparative performance of the proposed MRCD-based T2 chart with existing algorithms. While the proposed method exhibits the highest accuracy, it also generates a relatively high false positive rate. This suggests a potential trade-off between detection accuracy and the number of non-anomalous events flagged as anomalies. Further investigation is warranted to explore methods for reducing the false positive rate while maintaining high detection accuracy. Additionally, the computational cost of the proposed method should be evaluated to assess its suitability for real-time applications.
The empirical results presented in this study collectively underscore the effectiveness of the proposed approach in accurately identifying network intrusions. This capability positions the methodology as a promising asset for bolstering overall cybersecurity defenses. A key advantage of the proposed framework is its computational efficiency, a direct consequence of the underlying multivariate chart structure. This efficiency enables the model to adapt swiftly to the evolving nature of network traffic, a critical attribute for contemporary intrusion detection systems operating in dynamic and complex digital landscapes.

6. Conclusions and Future Research

The simulation performance evaluation revealed that the conventional T2 Hotelling performed effectively only under low dimensionality and a minimal percentage of outliers. On the other hand, Fast-MCD-based T2 Hotelling demonstrated improved performance, particularly in managing a high percentage of low-dimensional data; however, its effectiveness decreased as the number of variables increased. In contrast, MRCD-based T2 Hotelling consistently outperformed the above charts, exhibiting superior performance across all simulated conditions. The application of the UNSW-NB15 data revealed that the MRCD-based T2 Hotelling exhibited better performance in detecting intrusion, with a 0.902 Accuracy and 0.848 AUC value. This proposed chart successfully outperformed the conventional T2 Hotelling and the Fast-MCD-based T2 Hotelling, which had AUC values of 0.511 and 0.718, respectively, despite the longer execution time. In addition, compared to the other algorithms, the proposed chart exhibits higher accuracy while producing higher false alarms.
This proposed chart can still be modified for further research by applying another non-parametric approach as the control limit. Applying an MRCD estimator for monitoring processes for variance shifts or simultaneous shifts in mean and variance can also be constructed. The latest robust estimator, Cellwise MCD [48], known for its efficiency, can be considered for implementation to overcome the MRCD’s problem in terms of the long execution time.

Author Contributions

I.K.P.: writing original draft and data analysis. M.A.: Conceptual methodology, Supervising and validating the results. M.M.: Performed analysis and data visualization. M.H.L.: Validating the results. All authors have read and agreed to the published version of the manuscript.

Funding

The authors gratefully acknowledge financial support from the Institut Teknologi Sepuluh Nopember for this work under grant number 1174/PKS/ITS/2024.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

The data presented in this study are openly available in: https://research.unsw.edu.au/projects/unsw-nb15-dataset (accessed on 3 September 2024).

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Bace, R.; Mell, P. NIST Special Publication on Intrusion Detection Systems; Nist Special Publication; National Institute of Standards and Technology: Gaithersburg, MD, USA, 2001. [Google Scholar]
  2. Lee, W.; Stolfo, S.J. A framework for constructing features and models for intrusion detection systems. ACM Trans. Inf. Syst. Secur. 2000, 3, 227–261. [Google Scholar] [CrossRef]
  3. Wu, G.; Huang, Y. Design of a New Intrusion Detection System Based on Database. In Proceedings of the 2009 International Conference on Signal Processing Systems, Singapore, 15–17 May 2009; pp. 814–817. [Google Scholar]
  4. Park, Y. A Statistical Process Control Approach for Network Intrusion Detection; Georgia Insitute of Technology: Atlanta, GA, USA, 2005. [Google Scholar]
  5. Shewhart, W.A. Some applications of statistical methods to the analysis of physical and engineering data. Bell Syst. Tech. J. 1924, 3, 43–87. [Google Scholar] [CrossRef]
  6. Hotteling, H. Multivariate Quality Control. In Techiques of Statistical Analysis; McGraw-Hill: New York, NY, USA, 1947. [Google Scholar]
  7. Hawkins, D.M. Identification of Outliers; Springer: Berlin/Heidelberg Germany, 1980; Volume 11. [Google Scholar]
  8. Chenouri, S.; Steiner, S.H.; Variyath, A.M. A multivariate robust control chart for individual observations. J. Qual. Technol. 2009, 41, 259–271. [Google Scholar] [CrossRef]
  9. Rousseeuw, P.J.; Van Zomeren, B.C. Unmasking multivariate outliers and leverage point. J. Am. Stat. Assoc. 1990, 85, 633–639. [Google Scholar] [CrossRef]
  10. Sullivan, J.H.; Woodall, W.H. A comparison of multivariate control charts for individual observations. J. Qual. Technol. 1996, 28, 398–408. [Google Scholar] [CrossRef]
  11. Rousseeuw, P.J.; Leroy, A.M. Robust Regression and Outlier Detection; John Wiley & Sons: Hoboken, NJ, USA, 2005; Volume 589. [Google Scholar]
  12. Ahsan, M.; Khusna, H. Evaluasi Diagram Kontrol Multivariat berbasis Independen Principal Component Analysis (PCA). Inferensi 2018, 1, 89–92. [Google Scholar] [CrossRef]
  13. Williems, G.; Pison, G.; Rousseeuw, P.J.; Van Aelst, S. A Robust Hotelling Test. Metrika 2002, 55, 125–138. [Google Scholar] [CrossRef]
  14. Vargas, N.J. Robust estimation in multivariate control charts for individual observations. J. Qual. Technol. 2003, 35, 367–376. [Google Scholar] [CrossRef]
  15. Alfaro, J.L.; Ortega, J.F. A comparison of robust alternatives to hotelling’s T2 control chart. J. Appl. Stat. 2009, 36, 1385–1396. [Google Scholar] [CrossRef]
  16. Abu-Shawiesh, M.O.A.; Kibria, B.M.G.; George, F. A robust bivariate control chart alternative to the hotelling’s T2 control chart. Qual. Reliab. Eng. Int. 2014, 30, 25–35. [Google Scholar] [CrossRef]
  17. Yahaya, S.S.S.; Ali, H.; Omar, Z. An alternative hotelling T 2 control chart based on minimum vector variance (MVV). Mod. Appl. Sci. 2011, 5, 132. [Google Scholar]
  18. Herwindiati, D.E.; Djauhari, M.A.; Mashuri, M. Robust multivariate outlier labeling. Commun. Stat. Simul. Comput. 2007, 36, 1287–1294. [Google Scholar] [CrossRef]
  19. Williams, J.D.; Woodall, W.H.; Birch, J.B.; Sullivan, J.O.E.H. On the distribution of hotelling’s T2 statistic based on the successive differences covariance matrix estimator. J. Qual. Technol. 2006, 38, 217–229. [Google Scholar] [CrossRef]
  20. Jensen, W.A.; Birch, J.B.; Woodall, W.H. High breakdown estimation methods for phase I multivariate control charts. Qual. Reliab. Eng. Int. 2007, 23, 615–629. [Google Scholar] [CrossRef]
  21. Utami, A.N.F.; Suwanda. Penggunaan Estimator Robust Reweighted Minimum Covariance Determinant pada Diagram Kontrol T2 Hotelling untuk Monitoring Penyebaran COVID-19 di Korea Selatan. J. Ris. Stat. 2021, 1, 63–72. [Google Scholar]
  22. Ahsan, M.; Mashuri, M.; Lee, M.H.; Kuswanto, H.; Prastyo, D.D. Robust Adaptive Multivariate Hotelling T2 Control Chart Based on Kernel Density Estimation for Intrusion Detection System. Expert Syst. Appl. 2020, 145, 113105. [Google Scholar] [CrossRef]
  23. Boudt, K.; Rousseeuw, P.J.; Vanduffel, S.; Verdonck, T. The minimum regularized covariance determinant estimator. Stat. Comput. 2020, 30, 113–128. [Google Scholar] [CrossRef]
  24. Phaladiganon, P.; Seoung, S.B.; Chen, V.C.P.; Baek, J.G.; Pa, S.K. Bootstrap-Based T2 Multivariate Control Charts. Commun. Stat. Simul. Comput. 2011, 40, 645–662. [Google Scholar] [CrossRef]
  25. Ye, N.; Li, X.; Chen, Q.; Emran, S.M.; Xu, M. Probabilistic techniques for intrusion detection based on computer audit data. IEEE Trans. Syst. Man, Cybern. Part A Syst. Hum. 2001, 31, 266–274. [Google Scholar]
  26. Ye, N.; Emran, S.M.; Chen, Q.; Vilbert, S. Multivariate statistical analysis of audit trails for host-based intrusion detection. IEEE Trans. Comput. 2002, 51, 810–820. [Google Scholar] [CrossRef]
  27. Qu, G.; Hariri, S.; Yousif, M. Multivariate Statistical Analysis for Network Attacks Detection. In Proceedings of the 3rd ACS/IEEE International Conference onComputer Systems and Applications, Cairo, Egypt, 6 January 2005; pp. 9–14. [Google Scholar]
  28. Zhang, Z.; Zhu, X.; Jin, J. SVC-Based Multivariate Control Charts for Automatic Anomaly Detection in Computer Networks. In Proceedings of the International Conference on Autonomic and Autonomous Systems (ICAS), IEEE, Athens, Greece, 19–25 June 2007. [Google Scholar]
  29. Tavallaee, M.; Lu, W.; Iqbal, S.A.; Ghorbani, A. A Novel Covariance Matrix based Approach for Detecting Network Anomalies. In Proceedings of the Sixth Annual Conference on Communication Networks and Services Research, Halifax, NS, Canada, 5–8 May 2008. [Google Scholar]
  30. Sivasamy, A.; Sundan, B. A Dynamic Intrusion Detection System Based on Multivariate Hotelling’s T2 Statistics Approach for Network Environments. Sci. World J. 2015, 2015, 850153. [Google Scholar] [CrossRef] [PubMed]
  31. Rastogi, R.; Khan, Z.; Khan, M.H. Network Anomalies Detection Using Statistical Technique: A Chi- Square approach. Int. J. Comput. Sci. Issues 2012, 9, 515–522. [Google Scholar]
  32. Camacho, J.; Pérez-Villegas, A.; García-Teodoro, P.; Maciá-Fernández, G. PCA-based multivariate statistical network monitoring for anomaly detection. Comput. Secur. 2016, 59, 118–137. [Google Scholar] [CrossRef]
  33. Ahsan, M.; Mashuri, M.; Kuswanto, H.; Prastyo, D. Intrusion detection system using multivariate control chart Hotelling’s T2 based on PCA. Int. J. Adv. Sci. Eng. Inf. Technol. 2018, 8, 1905–1911. [Google Scholar] [CrossRef]
  34. Ahsan, M.; Mashuri, M.; Kuswanto, H.; Prastyo, D.D.; Khusna, H. T2 control chart based on successive difference covariance matrix for intrusion detection system. J. Phys. Conf. Ser. 2018, 1028, 012220. [Google Scholar] [CrossRef]
  35. Ahsan, M.; Mashuri, M.; Khusna, H. Intrusion Detection System Using Bootstrap Resampling Approach of T2 Control Chart Based on Successive Difference Covariance Matrix. J. Theor. Appl. Inf. Technol. 2018, 96, 2128–2138. [Google Scholar]
  36. Moustafa, N.; Slay, J. UNSW-NB15: A comprehensive data set for network intrusion detection. In Proceedings of the 2015 Military Communications and Information Systems Conference, MilCIS 2015-IEEE Stream, Canberra, Australia, 10–12 November 2015; pp. 1–6. [Google Scholar]
  37. Moustafa, N.; Slay, J. The evaluation of Network Anomaly Detection Systems: Statistical analysis of the UNSW-NB15 data set and the comparison with the KDD99 data set. Inf. Secur. J. A Glob. Perspect. 2016, 25, 18–31. [Google Scholar] [CrossRef]
  38. Montgomery, D.C. Introduction to Statistical Quality Control, 7th ed.; John Wiley & Sons, Inc.: New York, NY, USA, 2013. [Google Scholar]
  39. Efron, B. Bootstrap Methods: Another Look at the Jacknife. Ann. Stat. 1979, 7, 1–26. [Google Scholar] [CrossRef]
  40. Efron, B.; Tibshirani, R. An Introduction to the Bootstrap; CRC Press: Boca Raton, FL, USA, 1994. [Google Scholar]
  41. Rousseeuw, P.; Croux, C. Alternatives to the median absolute deviation. J. Am. Stat. Assoc. 1993, 88, 1273–1283. [Google Scholar] [CrossRef]
  42. Croux, C.; Haesbroeck, G. Influence function and efficiency of the minimum covariance determinant scatter matrix estimator. J. Multivar. Anal. 1999, 71, 161–190. [Google Scholar] [CrossRef]
  43. Han, J.; Kamber, M.; Pei, J. Data Mining Concepts and Techniques; Morgan Kaufmann: Waltham, MA, USA, 2012. [Google Scholar]
  44. Bekkar, M.; Djemaa, H.; Alitouch, T. Evaluation Measure for Models Assesment Over Imbalanced Data Sets. J. Inf. Eng. Apl. 2013, 3, 27–38. [Google Scholar]
  45. B.I. Tool. Bro-IDS Tool. 2014. Available online: https://www.bro.org/ (accessed on 1 March 2024).
  46. Witten, I.H.; Frank, E. Data Mining: Practical Machine Learning Tools and Techniques with Java Implementations; Elsevier: Amsterdam, The Netherlands, 2005. [Google Scholar]
  47. Mei-Ling, S.; Kanoksri, S.; Indika, K.-A.; Shu-Ching, C.; Liwu, C.; Goldring, T. Handling nominal features in anomaly intrusion detection problems. In Research Issues in Data Engineering: Stream Data Mining and Applications, Proceedings of the 15th International Workshop on Research Issues in Data Engineering: Stream Data Mining and Applications, Tokyo, Japan, 3–4 April 2005; IEEE: New York, NY, USA, 2005; pp. 55–62. [Google Scholar]
  48. Raymaekers, J.; Rousseeuw, P.J. The Cellwise Minimum Covariance Determinant Estimator. J. Am. Stat. Assoc. 2023, 1–12. [Google Scholar] [CrossRef]
Figure 1. Bootstrap Control Limit Algorithm.
Figure 1. Bootstrap Control Limit Algorithm.
Applsci 14 07948 g001
Figure 2. AUC Performance for All Charts Based on Number of Variables (a) p = 5, (b) p = 10, (c) p = 20, (d) p = 30, (e) p = 40 (f) p = 50.
Figure 2. AUC Performance for All Charts Based on Number of Variables (a) p = 5, (b) p = 10, (c) p = 20, (d) p = 30, (e) p = 40 (f) p = 50.
Applsci 14 07948 g002aApplsci 14 07948 g002b
Figure 3. Statistics Plot of Simulation on p = 5 using (a) T2 (b) T2-FMCD (c) T2-MRCD.
Figure 3. Statistics Plot of Simulation on p = 5 using (a) T2 (b) T2-FMCD (c) T2-MRCD.
Applsci 14 07948 g003
Figure 4. Statistics Plot of Simulation on p = 20 using (a) T2 (b) T2-FMCD (c) T2-MRCD.
Figure 4. Statistics Plot of Simulation on p = 20 using (a) T2 (b) T2-FMCD (c) T2-MRCD.
Applsci 14 07948 g004
Figure 5. Statistics Plot of Simulation on p = 50 using (a) T2 (b) T2-FMCD (c) T2-MRCD.
Figure 5. Statistics Plot of Simulation on p = 50 using (a) T2 (b) T2-FMCD (c) T2-MRCD.
Applsci 14 07948 g005
Figure 6. T2 Chart of (a) Control Limit Selection, (b) Statistic Plot, and (c) ROC Curve Plot.
Figure 6. T2 Chart of (a) Control Limit Selection, (b) Statistic Plot, and (c) ROC Curve Plot.
Applsci 14 07948 g006
Figure 7. Fast-MCD-based T2 Chart of (a) Control Limit Selection, (b) Statistic Plot, and (c) ROC Curve Plot.
Figure 7. Fast-MCD-based T2 Chart of (a) Control Limit Selection, (b) Statistic Plot, and (c) ROC Curve Plot.
Applsci 14 07948 g007
Figure 8. MRCD-based T2 Chart of (a) Control Limit Selection, (b) Statistic Plot, and (c) ROC Curve Plot.
Figure 8. MRCD-based T2 Chart of (a) Control Limit Selection, (b) Statistic Plot, and (c) ROC Curve Plot.
Applsci 14 07948 g008
Figure 9. ROC Curve Comparison of T2, T2-FMCD, and T2-MRCD.
Figure 9. ROC Curve Comparison of T2, T2-FMCD, and T2-MRCD.
Applsci 14 07948 g009
Table 1. Characteristics of UNSW-NB15 dataset.
Table 1. Characteristics of UNSW-NB15 dataset.
LabelNumber of RecordsPercentage
Normal500031.94
Intrusion119,34168.06
  - Analysis20001.14
  - Backdoor17461.00
  - DoS12,2646.99
  - Exploits33,39319.04
  - Fuzzers18,18410.37
  - Generic40,00022.81
  - Reconnaissance10,4915.98
  - Shellcode11330.65
  - Worms1300.07
Total175,341100.00
Table 2. Confusion Matrix Table.
Table 2. Confusion Matrix Table.
ActualDetection
IntrusionNormal
IntrusionTrue Positives (TPs)False Negatives (FNs)
NormalFalse Positives (FPs)True Negatives (TNs)
Table 3. Performance. Simulation of Conventional Hotelling’s T2 Charts.
Table 3. Performance. Simulation of Conventional Hotelling’s T2 Charts.
p%OutT2-Conventional
AccuracyAUCFP RateFN Rate
550.9780.8330.0060.327
100.9140.5950.0070.804
200.8010.5130.0070.967
300.7010.5060.0070.982
400.6000.5020.0070.988
500.5000.5000.0070.992
1050.9720.7820.0060.430
100.9050.5530.0060.888
200.8000.5100.0070.972
300.6990.5040.0070.985
400.5990.5010.0070.991
500.5000.5000.0070.991
2050.9630.6850.0060.624
100.9010.5290.0070.936
200.7980.5060.0070.981
300.6990.5020.0070.988
400.5990.5010.0070.992
500.5000.5000.0070.991
3050.9390.5090.0130.970
100.8920.5080.0120.972
200.7940.5050.0130.978
300.6990.5030.0070.988
400.5990.5010.0070.991
500.5000.5000.0070.991
4050.9540.5960.0070.801
100.8990.5200.0070.954
200.7980.5050.0060.983
300.6980.5020.0070.989
400.5990.5010.0070.991
500.5010.5010.0080.991
5050.9520.5760.0060.841
100.8970.5140.0070.966
200.7970.5040.0070.986
300.6990.5030.0070.988
400.5990.5010.0070.991
500.5000.5000.0080.993
Table 4. Performance. Simulation of Robust Fast-MCD-Based T2 Charts.
Table 4. Performance. Simulation of Robust Fast-MCD-Based T2 Charts.
p%OutT2-FMCD
AccuracyAUCFP RateFN Rate
550.9940.9960.0070.001
100.9940.9960.0070.002
200.9940.9960.0070.001
300.9950.9960.0070.001
400.9950.9950.0070.001
500.5000.5000.0070.992
1050.9940.9970.0070.000
100.9940.9970.0070.000
200.9950.9970.0070.000
300.9950.9970.0070.000
400.8610.8280.0070.337
500.5000.5000.0070.991
2050.9940.9970.0060.000
100.9940.9970.0070.000
200.9940.9960.0070.000
300.7990.6700.0070.653
400.5990.5000.0080.992
500.5000.5000.0070.991
3050.9940.9970.0070.000
100.9940.9970.0070.000
200.9850.9720.0070.049
300.7020.5080.0070.978
400.5990.5010.0070.991
500.5000.5000.0070.992
4050.9940.9970.0070.000
100.9940.9970.0070.000
200.8860.7260.0070.541
300.6980.5020.0070.989
400.6000.5020.0070.989
500.5010.5010.0070.990
5050.9940.9970.0060.000
100.9940.9970.0070.000
200.8050.5240.0070.946
300.6990.5030.0070.988
400.5990.5010.0070.991
500.5000.5000.0080.991
Table 5. Performance. Simulation of Robust MRCD-Based T2 Charts.
Table 5. Performance. Simulation of Robust MRCD-Based T2 Charts.
p%OutT2-MRCD
AccuracyAUCFP RateFN Rate
550.9940.9960.0060.002
100.9940.9950.0070.003
200.9940.9960.0070.001
300.9940.9960.0070.002
400.6430.5560.0070.882
500.5000.5000.0070.992
1050.9940.9970.0060.000
100.9940.9970.0060.000
200.9950.9970.0070.000
300.9950.9960.0070.000
400.8530.8180.0070.357
500.5000.5000.0070.991
2050.9940.9970.0070.000
100.9940.9970.0070.000
200.9940.9970.0070.000
300.9950.9960.0070.000
400.9640.9570.0070.079
500.5000.5000.0070.992
3050.9940.9970.0060.000
100.9940.9970.0070.000
200.9950.9970.0070.000
300.9950.9960.0070.000
400.7620.7040.0070.585
500.5000.5000.0070.992
4050.9940.9970.0070.000
100.9940.9970.0070.000
200.9950.9960.0070.000
300.9950.9970.0070.000
400.6920.6170.0070.760
500.5010.5010.0080.991
5050.9940.9970.0070.000
100.9940.9970.0070.000
200.9950.9970.0070.000
300.9950.9970.0070.000
400.8100.7640.0070.464
500.5010.5010.0080.991
Table 6. Confusion Matrix and Performance Evaluation for Conventional Hotelling’s T2 Chart.
Table 6. Confusion Matrix and Performance Evaluation for Conventional Hotelling’s T2 Chart.
ActualDetectionAccuracyAUCFP RateFN Rate
IntrusionNormal
Intrusion9853109,4880.3760.5110.0600.917
Normal335452,646
Table 7. Confusion Matrix and Performance Evaluation for Fast-MCD-based T2 Chart.
Table 7. Confusion Matrix and Performance Evaluation for Fast-MCD-based T2 Chart.
ActualDetectionAccuracyAUCFP RateFN Rate
IntrusionNormal
Intrusion81,87137,4700.7110.7180.2500.314
Normal13,99142,009
Table 8. Confusion Matrix and Performance Evaluation for MRCD-based T2 Chart.
Table 8. Confusion Matrix and Performance Evaluation for MRCD-based T2 Chart.
ActualDetectionAccuracyAUCFP RateFN Rate
IntrusionNormal
Intrusion118,9154260.9020.8490.2980.004
Normal16,67139,329
Table 9. Confusion Matrix and Performance Evaluation for MRCD-based T2 Chart.
Table 9. Confusion Matrix and Performance Evaluation for MRCD-based T2 Chart.
Control ChartAccuracyAUCFP RateFN RateExecution
Time (s)
Conventional T20.3760.5110.0600.917286
T2 Fast-MCD0.7110.7180.2500.3141470
Proposed T2 MRCD0.9020.8490.2980.0048108
Table 10. Comparison of MRCD-based T2 Chart with the other algorithms.
Table 10. Comparison of MRCD-based T2 Chart with the other algorithms.
MethodsAccuracyFP Rate
Decision Tree [45]0.85560.1578
Logistic Regression [46]0.83150.1848
Naïve Bayes [47]0.82070.1856
ANN [46]0.81340.2113
Proposed T2 MRCD0.90210.2980
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Prasetya, I.K.; Ahsan, M.; Mashuri, M.; Lee, M.H. Bootstrap and MRCD Estimators in Hotelling’s T2 Control Charts for Precise Intrusion Detection. Appl. Sci. 2024, 14, 7948. https://doi.org/10.3390/app14177948

AMA Style

Prasetya IK, Ahsan M, Mashuri M, Lee MH. Bootstrap and MRCD Estimators in Hotelling’s T2 Control Charts for Precise Intrusion Detection. Applied Sciences. 2024; 14(17):7948. https://doi.org/10.3390/app14177948

Chicago/Turabian Style

Prasetya, Ichwanul Kahfi, Muhammad Ahsan, Muhammad Mashuri, and Muhammad Hisyam Lee. 2024. "Bootstrap and MRCD Estimators in Hotelling’s T2 Control Charts for Precise Intrusion Detection" Applied Sciences 14, no. 17: 7948. https://doi.org/10.3390/app14177948

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop