Experiment Techniques Veriication Process

ISSN: 1985-3157 Vol. 4 No. 1 Jan-June 2010 Statistical Approach for Validating Static Threshold in Fast Atack Detection 61 the process flow of the observation process usi Figure 4: the process low of the observation process using real traic site

3.3 Experiment Techniques

For the experiment technique, a small local area network LAN has been setup, refer igure 4. The experiment consists of multiple operating systems such as Windows XP Professional Service Pack 2, Windows Vista and Linux CentOS Version 4.4. The purpose of the experiment is to identify the normal connection made by each of operating system. By doing this, the normal behavior of host in transmiting network packet to the destination host within one second time interval is identiied. The result from each of the operating system will be captured and compared with each other. Another comparison process will be done between the result from the observation and result from the experiment. The comparison result will be used to select an appropriate threshold for the fast atack detection. Figure 5: Experimental setup Figure 5: Experimental setup ISSN: 1985-3157 Vol. 4 No. 1 Jan-June 2010 Journal of Advanced Manufacturing and Technology 62

3.4 Veriication Process

Ater selecting the appropriate threshold from observation and experiment, the veriication process needs to be done. The purpose of the veriication process is to identify the valid static threshold for the AVC category and also increase the conidence of the selected static threshold. In the veriication process the raw network traic data is processed in the same way as the observation process as depicted in Figure 6. The only diference is that the output from the Time Based Module will be imported into the Microsot Excel 2003 to construct the Statistical Process Control Chart. The Shewhart Chart has been chosen in this research to validate the threshold selection. The mean value is selected from the result of the observation technique and experiment technique. Ater constructing the control chart, the process of validation will be done. The validation was done by inspecting the out of control point based on the Western Electric Rules. Furthermore, the reason behind the out of control point will also be analyzed. The analyzing process is done by referring to the network administrator of the site or by technical report produce by certiied bodies. Ater analyzing the out of control point, then the valid threshold for the AVC category is selected. Figure 6: Verification process flow        Figure 6: Veriication process low ISSN: 1985-3157 Vol. 4 No. 1 Jan-June 2010 Statistical Approach for Validating Static Threshold in Fast Atack Detection 63

3.5 Statistical Process Control