Statistical learning methods for information security: fundamentals and case studies

被引:3
|
作者
Pao, H. -K. [1 ]
Lee, Y. -J. [1 ]
Huang, C. -Y. [2 ]
机构
[1] Natl Taiwan Univ Sci & Technol, Dept Comp Sci & Informat Engn, Taipei, Taiwan
[2] Natl Taiwan Ocean Univ, Dept Comp Sci & Engn, Keelung, Taiwan
关键词
Anomaly detection; information security; intrusion detection; signature-based methods; statistical learning; SUPPORT VECTOR MACHINES; INTRUSION DETECTION; RULE EXTRACTION;
D O I
10.1002/asmb.2052
中图分类号
C93 [管理学]; O22 [运筹学];
学科分类号
070105 ; 12 ; 1201 ; 1202 ; 120202 ;
摘要
One of the most traditional methods for information security can be as easy as sequence matching, such as the signature-based methods for virus detection. However, it is now well accepted that the signature-based methods are no longer satisfactory solutions for many security problems. The signature is usually too rigid, resulting in detection that is hard to adjust and easy to bypass. Statistical learning approaches can complete the puzzle to form an integrated defense system. Numerous statistical learning methods have been proposed in the last couple of decades for various applications. To solve information security problems statistically, we need to carefully choose appropriate statistical learning methods and evaluation procedures so that what seems to be a meaningful and effective method in terms of the statistical analysis can also be beneficial when the method is deployed to the real world. This paper aims to give an introductory and as self-contained as possible overview for how to correctly and effectively apply statistical methods to information security problems. We also demonstrate a couple of applications of the statistical learning methods on the problems of botnet detection and account security. Copyright (c) 2014 John Wiley & Sons, Ltd.
引用
收藏
页码:97 / 113
页数:17
相关论文
共 50 条
  • [11] Authentic Learning of Mobile Security with Case Studies
    Guo, Minzhe
    Bhattacharya, Prabir
    Qian, Kai
    Yang, Li
    2013 IEEE FRONTIERS IN EDUCATION CONFERENCE, 2013,
  • [12] Statistical methods in computer security
    Lang, I
    JOURNAL OF THE ROYAL STATISTICAL SOCIETY SERIES A-STATISTICS IN SOCIETY, 2005, 168 : 871 - 871
  • [13] Investigation on the statistical methods in research studies of library and information science
    Zhang, Jin
    Wang, Yanyan
    Zhao, Yuehua
    ELECTRONIC LIBRARY, 2017, 35 (06): : 1070 - 1086
  • [14] Data science: Fundamentals and case studies, machine learning with Python']Python
    Morand, Elisabeth
    POPULATION, 2018, 73 (02): : 404 - 405
  • [15] Fundamentals of information studies: Understanding information and its environment
    Zlatos, C
    JOURNAL OF ACADEMIC LIBRARIANSHIP, 2004, 30 (03): : 260 - 260
  • [16] Fundamentals of information studies: understanding information and its environment
    Maceviii, E
    INFORMATION RESEARCH-AN INTERNATIONAL ELECTRONIC JOURNAL, 2004, 9 (02):
  • [17] Applied Statistical Learning-With Case Studies in Stata
    Bach, Ruben L.
    JOURNAL OF THE ROYAL STATISTICAL SOCIETY SERIES A-STATISTICS IN SOCIETY, 2024, 187 (03) : 854 - 855
  • [18] Comparisons of Machine Learning Methods of Statistical Downscaling Method: Case Studies of Daily Climate Anomalies in Thailand
    Chattrairat, Kanawut
    Wongseree, Waranyu
    Leelasantitham, Adisorn
    JOURNAL OF WEB ENGINEERING, 2021, 20 (05): : 1397 - 1423
  • [19] Information Security Management Practices: Case Studies from India
    Singh, Abhishek Narain
    Gupta, M. P.
    GLOBAL BUSINESS REVIEW, 2019, 20 (01) : 253 - 271
  • [20] An analysis on the use of autoencoders for representation learning: Fundamentals, learning task case studies, explainability and challenges
    Charte, David
    Charte, Francisco
    del Jesus, Maria J.
    Herrera, Francisco
    NEUROCOMPUTING, 2020, 404 : 93 - 107