An Anomaly Detection System Proposal to Ensure Information Security for File Integrations

被引:0
|
作者
Uzum, Ibrahim [1 ]
Can, Ozgu [1 ]
机构
[1] Ege Univ, Bilgisayar Muhendisligi Bolumu, TR-35100 Izmir, Turkey
关键词
anomaly detection; information security; machine learning; file integration;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Anomaly detection has an important place in the field of information security with the reason for providing defense against new threats. Additionally, anomaly detection can help organizations to make plan for the unexpected situations. For this reason, it is important to take into account that abnormalities in information systems can occur at any time and there must be an emergency management to perceive the anomalies. Anomaly detection systems must not only find previously known anomalies, but also new unknown anomalies. The most effective solution to detect anomalies is self-learning based approaches. In this study, an anomaly detection system is proposed to be developed for file integration systems. The proposed system aims to provide a solution to information security problems that can be encountered in file integration systems.
引用
收藏
页数:4
相关论文
共 50 条
  • [41] Cryptographic and Steganographic Approaches to Ensure Multimedia Information Security and Privacy
    Yang, Ming
    Trifas, Monica
    Francia, Guillermo, III
    Chen, Lei
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2009, 3 (03) : 37 - 54
  • [42] Guidelines for Using Machine Learning Technology to Ensure Information Security
    Mikhailovich, Kovtsur Maxim
    Valerievna, Mikhailova Anastasia
    Andreevich, Potemkin Pavel
    Alexandrovich, Ushakov Igor
    Vladimirovich, Krasov Andrey
    [J]. 2020 12TH INTERNATIONAL CONGRESS ON ULTRA MODERN TELECOMMUNICATIONS AND CONTROL SYSTEMS AND WORKSHOPS (ICUMT 2020), 2020, : 285 - 290
  • [43] A New Framework for Cloud Storage Confidentiality to Ensure Information Security
    Singh, Deepak
    Verma, Harsh K.
    [J]. 2016 SYMPOSIUM ON COLOSSAL DATA ANALYSIS AND NETWORKING (CDAN), 2016,
  • [44] From Static to Dynamic Anomaly Detection With Application to Power System Cyber Security
    Pan, Kaikai
    Palensky, Peter
    Esfahani, Peyman Mohajerin
    [J]. IEEE TRANSACTIONS ON POWER SYSTEMS, 2020, 35 (02) : 1584 - 1596
  • [45] An Intelligent Security System Using Enhanced Anomaly-Based Detection Scheme
    Louati, Faten
    Barika Ktata, Farah
    Amous, Ikram
    [J]. COMPUTER JOURNAL, 2024, 67 (06): : 2317 - 2330
  • [46] Regulatory Compliance to Ensure Information Security: Financial Supervision Perspective
    Kull, Andro
    [J]. PROCEEDINGS OF THE 10TH EUROPEAN CONFERENCE ON INFORMATION WARFARE AND SECURITY, 2011, : 298 - 306
  • [47] POSSIBILITIES OF MPR AND USSR INFORMATION-SYSTEM INTEGRATIONS
    KHYUKHENZHIMEE, N
    [J]. NAUCHNO-TEKHNICHESKAYA INFORMATSIYA SERIYA 1-ORGANIZATSIYA I METODIKA INFORMATSIONNOI RABOTY, 1984, (10): : 22 - 23
  • [48] Anomaly Detection System Towards a framework for enterprise log management of security services
    Ozulku, Omer
    Fadhel, Nawfal F.
    Argles, David
    Wills, Gary B.
    [J]. 2014 WORLD CONGRESS ON INTERNET SECURITY (WORLDCIS), 2014, : 97 - 102
  • [49] Communication Network Anomaly Detection Based on Log File Analysis
    Cheng, Xin
    Wang, Ruizhi
    [J]. ROUGH SETS AND KNOWLEDGE TECHNOLOGY, RSKT 2014, 2014, 8818 : 240 - 248
  • [50] Detecting Packed Executable File: Supervised or Anomaly Detection Method ?
    Hubballi, Neminath
    Dogra, Himanshu
    [J]. PROCEEDINGS OF 2016 11TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, (ARES 2016), 2016, : 638 - 643