Statistical learning methods for information security: fundamentals and case studies

被引:3
|
作者
Pao, H. -K. [1 ]
Lee, Y. -J. [1 ]
Huang, C. -Y. [2 ]
机构
[1] Natl Taiwan Univ Sci & Technol, Dept Comp Sci & Informat Engn, Taipei, Taiwan
[2] Natl Taiwan Ocean Univ, Dept Comp Sci & Engn, Keelung, Taiwan
关键词
Anomaly detection; information security; intrusion detection; signature-based methods; statistical learning; SUPPORT VECTOR MACHINES; INTRUSION DETECTION; RULE EXTRACTION;
D O I
10.1002/asmb.2052
中图分类号
C93 [管理学]; O22 [运筹学];
学科分类号
070105 ; 12 ; 1201 ; 1202 ; 120202 ;
摘要
One of the most traditional methods for information security can be as easy as sequence matching, such as the signature-based methods for virus detection. However, it is now well accepted that the signature-based methods are no longer satisfactory solutions for many security problems. The signature is usually too rigid, resulting in detection that is hard to adjust and easy to bypass. Statistical learning approaches can complete the puzzle to form an integrated defense system. Numerous statistical learning methods have been proposed in the last couple of decades for various applications. To solve information security problems statistically, we need to carefully choose appropriate statistical learning methods and evaluation procedures so that what seems to be a meaningful and effective method in terms of the statistical analysis can also be beneficial when the method is deployed to the real world. This paper aims to give an introductory and as self-contained as possible overview for how to correctly and effectively apply statistical methods to information security problems. We also demonstrate a couple of applications of the statistical learning methods on the problems of botnet detection and account security. Copyright (c) 2014 John Wiley & Sons, Ltd.
引用
收藏
页码:97 / 113
页数:17
相关论文
共 50 条
  • [21] Methods of Organizational Information Security
    Martins, Jose
    dos Santos, Henrique
    GLOBAL SECURITY, SAFETY, AND SUSTAINABILITY, 2010, 92 : 120 - +
  • [22] STATISTICAL-METHODS FOR ANALYZING CASE-CROSSOVER STUDIES
    MITTLEMAN, M
    ROBINS, J
    MACLURE, M
    AMERICAN JOURNAL OF EPIDEMIOLOGY, 1993, 138 (08) : 618 - 619
  • [23] Information Security Methodology, Replication Studies and Information Security Education
    Wendzel, Steffen
    Caviglione, Luca
    Checco, Alessandro
    Mileva, Aleksandra
    Lalande, Jean-Francois
    Mazurczyk, Wojciech
    JOURNAL OF UNIVERSAL COMPUTER SCIENCE, 2020, 26 (07) : 762 - 763
  • [24] Fundamentals of information studies: Understanding information and its environment.
    Raber, D
    LIBRARY QUARTERLY, 2004, 74 (04): : 486 - 488
  • [25] Big Data Analysis Methods Based on Machine Learning to Ensure Information Security
    Olga, Veselska
    Ruslana, Ziubina
    Yuriy, Finenko
    Joanna, Nikodem
    KNOWLEDGE-BASED AND INTELLIGENT INFORMATION & ENGINEERING SYSTEMS (KSE 2021), 2021, 192 : 2633 - 2640
  • [26] The Future of e-Learning - A Case Scenario: Security Studies
    Grigoras, Razvan
    ELEARNING CHALLENGES AND NEW HORIZONS, VOL 1, 2018, : 36 - 41
  • [27] Collaborative Learning : A Case Study on Information Security and Auditing Management Course
    Parkavi, R.
    Karthikeyan, P.
    Abdullah, A. Sheik
    2022 International Conference for Advancement in Technology, ICONAT 2022, 2022,
  • [28] Fundamentals of Modern Statistical Methods: Substantially Improving Power and Accuracy
    Tian, Tian Siva
    PSYCHOMETRIKA, 2011, 76 (01) : 153 - 154
  • [29] Fundamentals of Queuing Systems: Statistical Methods for Analyzing Queuing Models
    Hodge, David
    INTERFACES, 2013, 43 (06) : 614 - 615
  • [30] Case studies and information technology in civil engineering learning
    Angelides, DC
    Poulopoulos, A
    Avgeris, I
    Haralampous, P
    JOURNAL OF PROFESSIONAL ISSUES IN ENGINEERING EDUCATION AND PRACTICE, 2000, 126 (03) : 125 - 132