Statistical learning methods for information security: fundamentals and case studies

被引:3
|
作者
Pao, H. -K. [1 ]
Lee, Y. -J. [1 ]
Huang, C. -Y. [2 ]
机构
[1] Natl Taiwan Univ Sci & Technol, Dept Comp Sci & Informat Engn, Taipei, Taiwan
[2] Natl Taiwan Ocean Univ, Dept Comp Sci & Engn, Keelung, Taiwan
关键词
Anomaly detection; information security; intrusion detection; signature-based methods; statistical learning; SUPPORT VECTOR MACHINES; INTRUSION DETECTION; RULE EXTRACTION;
D O I
10.1002/asmb.2052
中图分类号
C93 [管理学]; O22 [运筹学];
学科分类号
070105 ; 12 ; 1201 ; 1202 ; 120202 ;
摘要
One of the most traditional methods for information security can be as easy as sequence matching, such as the signature-based methods for virus detection. However, it is now well accepted that the signature-based methods are no longer satisfactory solutions for many security problems. The signature is usually too rigid, resulting in detection that is hard to adjust and easy to bypass. Statistical learning approaches can complete the puzzle to form an integrated defense system. Numerous statistical learning methods have been proposed in the last couple of decades for various applications. To solve information security problems statistically, we need to carefully choose appropriate statistical learning methods and evaluation procedures so that what seems to be a meaningful and effective method in terms of the statistical analysis can also be beneficial when the method is deployed to the real world. This paper aims to give an introductory and as self-contained as possible overview for how to correctly and effectively apply statistical methods to information security problems. We also demonstrate a couple of applications of the statistical learning methods on the problems of botnet detection and account security. Copyright (c) 2014 John Wiley & Sons, Ltd.
引用
收藏
页码:97 / 113
页数:17
相关论文
共 50 条
  • [1] Rejoinder to 'Statistical learning methods for information security: fundamentals and case studies'
    Pao, Hsing-Kuo
    Lee, Yuh-Jye
    Huang, Chun-Ying
    APPLIED STOCHASTIC MODELS IN BUSINESS AND INDUSTRY, 2015, 31 (02) : 119 - 121
  • [2] Discussion of 'Statistical learning methods for information security: fundamentals and case studies'
    Chari, Suresh
    APPLIED STOCHASTIC MODELS IN BUSINESS AND INDUSTRY, 2015, 31 (02) : 116 - 118
  • [3] The fundamentals of information security
    Pfleeger, SL
    IEEE SOFTWARE, 1997, 14 (01) : 15 - &
  • [4] Reliability Evaluation of Clean Energy Internet Information Security Based on Statistical Learning Methods
    Hao Zhang
    Xin Liu
    Donglan Liu
    Fangzhe Zhang
    Lili Sun
    Chemistry and Technology of Fuels and Oils, 2024, 59 : 1211 - 1220
  • [5] Reliability Evaluation of Clean Energy Internet Information Security Based on Statistical Learning Methods
    Zhang, Hao
    Liu, Xin
    Liu, Donglan
    Zhang, Fangzhe
    Sun, Lili
    CHEMISTRY AND TECHNOLOGY OF FUELS AND OILS, 2024, 59 (06) : 1211 - 1220
  • [6] Review of Statistical Learning Methods in Integrated Omics Studies (An Integrated Information Science)
    Zeng, Irene Sui Lan
    Lumley, Thomas
    BIOINFORMATICS AND BIOLOGY INSIGHTS, 2018, 12
  • [7] Fundamentals of the theory of statistical methods
    Anderson, O.
    ZEITSCHRIFT FUR NATIONALOKONOMIE, 1930, 1 (05): : 790 - 791
  • [8] Rock Magnetic Methods in Soil and Environmental Studies: Fundamentals and Case Studies
    Bijaksana, Satria
    Huliselan, Estevanus
    Safiuddin, La Ode
    Fitriani, Dini
    Tamuntuan, Gerald
    Agustine, Eleonora
    INTERNATIONAL CONFERENCE ON EARTH SCIENCE AND TECHNOLOGY PROCEEDINGS, 2013, 6 : 8 - 13
  • [9] Information security fundamentals - Graphical conceptualisations for understanding
    Oscarson, P
    SECURITY EDUCATION AND CRITICAL INFRASTRUCTURES, 2003, 125 : 95 - 107
  • [10] Research of Information Security Risk Management Based on Statistical Learning Theory
    Zhao Li
    Wu Yongchun
    Wu Xuexia
    2009 INTERNATIONAL FORUM ON COMPUTER SCIENCE-TECHNOLOGY AND APPLICATIONS, VOL 3, PROCEEDINGS, 2009, : 436 - 438