Anomaly detection with high deviations for system security

被引:2
|
作者
Peng, XG [1 ]
Ren, KF [1 ]
机构
[1] Taiyuan Univ Technol, Dept Comp Sci & Technol, Taiyuan 030024, Peoples R China
关键词
system security; anomaly detection; privileged programs;
D O I
10.1109/PRDC.2005.18
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
The concept of the unidentified pattern comes from theoretic analysis of pattern space and experimental analysis of pattern distribution. The fuzzy mapping algorithm has been specially designed for the mapping of the unidentified pattern according to the clustering principle of normal and abnormal pattern in the normal and attack period of time. It provides the computation foundation, on which the concept of the unidentified pattern can be introduced into the anomaly detection of privileged programs providing host services. Experiment results indicate that the proposed modeling method of anomaly detection evidently increases the deviation of attack behaviors from normal profile, and ultimately increases detection capability against known and unknown attacks. The research achievements have laid the strong theoretical and experimental foundations to develop the security technologies of system services.
引用
收藏
页码:200 / 207
页数:8
相关论文
共 50 条
  • [41] Bayesian Estimation of Oscillator Parameters: Toward Anomaly Detection and Cyber-Physical System Security
    Lukens, Joseph M.
    Passian, Ali
    Yoginath, Srikanth
    Law, Kody J. H.
    Dawson, Joel A.
    [J]. SENSORS, 2022, 22 (16)
  • [42] Anomaly Detection in Sensor Networks based on Large Deviations of Markov Chain Models
    Paschalidis, Ioannis Ch.
    Chen, Yin
    [J]. 47TH IEEE CONFERENCE ON DECISION AND CONTROL, 2008 (CDC 2008), 2008, : 2338 - 2343
  • [43] Anomaly-Based Intrusion Detection System for In-Flight and Network Security in UAV Swarm
    da Silva, Leandro Marcos
    Ferrao, Isadora Garcia
    Dezan, Catherine
    Espes, David
    Branco, Kalinka R. L. J. C.
    [J]. 2023 INTERNATIONAL CONFERENCE ON UNMANNED AIRCRAFT SYSTEMS, ICUAS, 2023, : 812 - 819
  • [44] Spatio-Temporal Network Anomaly Detection by Assessing Deviations of Empirical Measures
    Paschalidis, Ioannis Ch.
    Smaragdakis, Georgios
    [J]. IEEE-ACM TRANSACTIONS ON NETWORKING, 2009, 17 (03) : 685 - 697
  • [45] Anomaly-Based Intrusion Detection System for In-Flight and Network Security in UAV Swarm
    Da Silva, Leandro Marcos
    Ferrao, Isadora Garcia
    Dezan, Catherine
    Espes, David
    Branco, Kalinka R. L. J. C.
    [J]. 2023 International Conference on Unmanned Aircraft Systems, ICUAS 2023, 2023, : 812 - 819
  • [46] The techniques for computer security intrusion detection based on Preserving Embedding for Anomaly Detection
    Zhao, Chunxia
    Linjing, Wang
    Fan, Liao
    [J]. PROCEEDINGS OF THE 2016 6TH INTERNATIONAL CONFERENCE ON MACHINERY, MATERIALS, ENVIRONMENT, BIOTECHNOLOGY AND COMPUTER (MMEBC), 2016, 88 : 587 - 591
  • [47] STEP-GAN: A ONE-CLASS ANOMALY DETECTION MODEL WITH APPLICATIONS TO POWER SYSTEM SECURITY
    Adiban, Mohammad
    Safari, Arash
    Salvi, Giampiero
    [J]. 2021 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING (ICASSP 2021), 2021, : 2605 - 2609
  • [48] MS-ADS: Multistage Spectrogram image-based Anomaly Detection System for IoT security
    Ahmad, Zeeshan
    Khan, Adnan Shahid
    Zen, Kartinah
    Ahmad, Farhan
    [J]. TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2023, 34 (08):
  • [49] Anomaly detection in high-dimensional data with the Mahalanobis-Taguchi system
    Ohkubo, Masato
    Nagata, Yasushi
    [J]. TOTAL QUALITY MANAGEMENT & BUSINESS EXCELLENCE, 2018, 29 (9-10) : 1213 - 1227
  • [50] Markov Chain Modeling for Anomaly Detection in High Performance Computing System Logs
    Haque, Abida
    DeLucia, Alexandra
    Baseman, Elisabeth
    [J]. HUST'17: PROCEEDINGS OF THE FOURTH INTERNATIONAL WORKSHOP ON HPC USER SUPPORT TOOLS, 2017,