An Anomaly Detection System Proposal to Ensure Information Security for File Integrations

被引:0
|
作者
Uzum, Ibrahim [1 ]
Can, Ozgu [1 ]
机构
[1] Ege Univ, Bilgisayar Muhendisligi Bolumu, TR-35100 Izmir, Turkey
关键词
anomaly detection; information security; machine learning; file integration;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Anomaly detection has an important place in the field of information security with the reason for providing defense against new threats. Additionally, anomaly detection can help organizations to make plan for the unexpected situations. For this reason, it is important to take into account that abnormalities in information systems can occur at any time and there must be an emergency management to perceive the anomalies. Anomaly detection systems must not only find previously known anomalies, but also new unknown anomalies. The most effective solution to detect anomalies is self-learning based approaches. In this study, an anomaly detection system is proposed to be developed for file integration systems. The proposed system aims to provide a solution to information security problems that can be encountered in file integration systems.
引用
收藏
页数:4
相关论文
共 50 条
  • [1] Anomaly detection in computer security and an application to file system accesses
    Stolfo, SJ
    Hershkop, S
    Bui, LH
    Ferster, R
    Wang, K
    [J]. FOUNDATIONS OF INTELLIGENT SYSTEMS, PROCEEDINGS, 2005, 3488 : 14 - 28
  • [2] Anomaly detection survey for information security
    Kaur, Harsurinder
    Pannu, Husanbir Singh
    [J]. SIN'17: PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON SECURITY OF INFORMATION AND NETWORKS, 2017, : 251 - +
  • [3] IMPORTANCE OF EVENT LOG MANAGEMENT TO ENSURE INFORMATION SYSTEM SECURITY
    Stanciu, Nicoleta
    [J]. METALURGIA INTERNATIONAL, 2013, 18 (02): : 144 - 149
  • [4] Anomaly detection with high deviations for system security
    Peng, XG
    Ren, KF
    [J]. 11TH PACIFIC RIM INTERNATIONAL SYMPOSIUM ON DEPENDABLE COMPUTING, PROCEEDINGS, 2005, : 200 - 207
  • [5] The Algorithm of Information System Anomaly Detection
    Gu, Ming
    [J]. 2013 3RD INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS, COMMUNICATIONS AND NETWORKS (CECNET), 2013, : 653 - 657
  • [6] System and Network Security: Anomaly Detection and Monitoring
    Vadursi, Michele
    Ceccarelli, Andrea
    Duarte, Elias P., Jr.
    Mahanti, Aniket
    [J]. JOURNAL OF ELECTRICAL AND COMPUTER ENGINEERING, 2016, 2016 (2016)
  • [7] Selection of information security systems to ensure economic security
    Voronin, E. A.
    Yushin, I. V.
    [J]. DILEMAS CONTEMPORANEOS-EDUCACION POLITICA Y VALORES, 2019, 6
  • [8] A Lightweight Anomaly Detection System for Information Appliances
    Sugaya, Midori
    Ohno, Yuki
    van der Zee, Andrej
    Nakajima, Tatsuo
    [J]. PROCEEDINGS OF THE 12TH IEEE INTERNATIONAL SYMPOSIUM ON OBJECT/COMPONENT/SERVICE-ORIENTED REAL-TIME DISTRIBUTED COMPUTING, 2009, : 257 - +
  • [9] Research on the Security Protection Mechanism of Computer File Management Information System
    Li, Bowei
    [J]. PROCEEDINGS OF THE 2017 4TH INTERNATIONAL CONFERENCE ON EDUCATION, MANAGEMENT AND COMPUTING TECHNOLOGY (ICEMCT 2017), 2017, 101 : 1006 - 1009
  • [10] Proposal of the security information sharing system with RDF site summary
    Terada, M
    Doi, N
    [J]. 8TH WORLD MULTI-CONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL X, PROCEEDINGS: SYSTEMICS AND INFORMATION SYSTEMS, TECHNOLOGIES AND APPLICATIONS, 2004, : 41 - 46