Anomaly detection with high deviations for system security

被引:2
|
作者
Peng, XG [1 ]
Ren, KF [1 ]
机构
[1] Taiyuan Univ Technol, Dept Comp Sci & Technol, Taiyuan 030024, Peoples R China
关键词
system security; anomaly detection; privileged programs;
D O I
10.1109/PRDC.2005.18
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
The concept of the unidentified pattern comes from theoretic analysis of pattern space and experimental analysis of pattern distribution. The fuzzy mapping algorithm has been specially designed for the mapping of the unidentified pattern according to the clustering principle of normal and abnormal pattern in the normal and attack period of time. It provides the computation foundation, on which the concept of the unidentified pattern can be introduced into the anomaly detection of privileged programs providing host services. Experiment results indicate that the proposed modeling method of anomaly detection evidently increases the deviation of attack behaviors from normal profile, and ultimately increases detection capability against known and unknown attacks. The research achievements have laid the strong theoretical and experimental foundations to develop the security technologies of system services.
引用
收藏
页码:200 / 207
页数:8
相关论文
共 50 条
  • [1] System and Network Security: Anomaly Detection and Monitoring
    Vadursi, Michele
    Ceccarelli, Andrea
    Duarte, Elias P., Jr.
    Mahanti, Aniket
    [J]. JOURNAL OF ELECTRICAL AND COMPUTER ENGINEERING, 2016, 2016 (2016)
  • [2] Anomaly detection in computer security and an application to file system accesses
    Stolfo, SJ
    Hershkop, S
    Bui, LH
    Ferster, R
    Wang, K
    [J]. FOUNDATIONS OF INTELLIGENT SYSTEMS, PROCEEDINGS, 2005, 3488 : 14 - 28
  • [3] A large deviations approach to statistical traffic anomaly detection
    Paschalidis, Ioannis Ch.
    Smaragdakis, Georgios
    [J]. PROCEEDINGS OF THE 45TH IEEE CONFERENCE ON DECISION AND CONTROL, VOLS 1-14, 2006, : 1901 - +
  • [4] MSCA: An Unsupervised Anomaly Detection System for Network Security in Backbone Network
    Liu, Yating
    Gu, Yuantao
    Shen, Xinyue
    Liao, Qingmin
    Yu, Quan
    [J]. IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2023, 10 (01): : 223 - 238
  • [5] Anomaly detection system for network security: Immunity-based approach
    Seredynski, F
    Bouvry, P
    Rutkowski, DR
    [J]. INTELLIGENT INFORMATION PROCESSING AND WEB MINING, PROCEEDINGS, 2005, : 486 - 490
  • [6] An Anomaly Detection System Proposal to Ensure Information Security for File Integrations
    Uzum, Ibrahim
    Can, Ozgu
    [J]. 2018 26TH SIGNAL PROCESSING AND COMMUNICATIONS APPLICATIONS CONFERENCE (SIU), 2018,
  • [7] Anomaly-Based Intrusion Detection System for Cyber-Physical System Security
    Colelli, Riccardo
    Magri, Filippo
    Panzieri, Stefano
    Pascucci, Federica
    [J]. 2021 29TH MEDITERRANEAN CONFERENCE ON CONTROL AND AUTOMATION (MED), 2021, : 428 - 434
  • [8] On ubiquitous network security and anomaly detection
    Van Dyke, C
    Koc, CK
    [J]. 2003 SYMPOSIUM ON APPLICATIONS AND THE INTERNET WORKSHOPS, PROCEEDINGS, 2003, : 374 - 378
  • [9] Exploratory security analytics for anomaly detection
    Pierazzi, Fabio
    Casolari, Sara
    Colajanni, Michele
    Marchetti, Mirco
    [J]. COMPUTERS & SECURITY, 2016, 56 : 28 - 49
  • [10] Anomaly detection survey for information security
    Kaur, Harsurinder
    Pannu, Husanbir Singh
    [J]. SIN'17: PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON SECURITY OF INFORMATION AND NETWORKS, 2017, : 251 - +