Statistical learning methods for information security: fundamentals and case studies

被引:3
|
作者
Pao, H. -K. [1 ]
Lee, Y. -J. [1 ]
Huang, C. -Y. [2 ]
机构
[1] Natl Taiwan Univ Sci & Technol, Dept Comp Sci & Informat Engn, Taipei, Taiwan
[2] Natl Taiwan Ocean Univ, Dept Comp Sci & Engn, Keelung, Taiwan
关键词
Anomaly detection; information security; intrusion detection; signature-based methods; statistical learning; SUPPORT VECTOR MACHINES; INTRUSION DETECTION; RULE EXTRACTION;
D O I
10.1002/asmb.2052
中图分类号
C93 [管理学]; O22 [运筹学];
学科分类号
070105 ; 12 ; 1201 ; 1202 ; 120202 ;
摘要
One of the most traditional methods for information security can be as easy as sequence matching, such as the signature-based methods for virus detection. However, it is now well accepted that the signature-based methods are no longer satisfactory solutions for many security problems. The signature is usually too rigid, resulting in detection that is hard to adjust and easy to bypass. Statistical learning approaches can complete the puzzle to form an integrated defense system. Numerous statistical learning methods have been proposed in the last couple of decades for various applications. To solve information security problems statistically, we need to carefully choose appropriate statistical learning methods and evaluation procedures so that what seems to be a meaningful and effective method in terms of the statistical analysis can also be beneficial when the method is deployed to the real world. This paper aims to give an introductory and as self-contained as possible overview for how to correctly and effectively apply statistical methods to information security problems. We also demonstrate a couple of applications of the statistical learning methods on the problems of botnet detection and account security. Copyright (c) 2014 John Wiley & Sons, Ltd.
引用
收藏
页码:97 / 113
页数:17
相关论文
共 50 条
  • [31] A selective review of statistical methods using calibration information from similar studies
    Qin, Jing
    Liu, Yukun
    Li, Pengfei
    STATISTICAL THEORY AND RELATED FIELDS, 2022,
  • [32] Communicating in chaplaincy: fundamentals and case studies
    Gartner, Stefan
    PRACTICAL THEOLOGY, 2024, 17 (03) : 237 - 247
  • [33] FUNDAMENTALS OF CASE-CONTROL STUDIES
    CLAVEL, J
    HEMON, D
    PHARMACOGENETICS, 1993, 3 (03): : 160 - 165
  • [34] Information-seeking behaviour of security studies students: A case study
    Thindwa, Theodora
    Chawinga, Winner D.
    Dube, Gift
    SOUTH AFRICAN JOURNAL OF INFORMATION MANAGEMENT, 2019, 21 (01):
  • [35] Enterprise Information Security Architecture A Review of Frameworks, Methodology, and Case Studies
    Oda, S. Michelle
    Fu, Huirong
    Zhu, Ye
    2009 2ND IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, VOL 3, 2009, : 333 - +
  • [36] Metalinguistics.: Fundamentals and case studies
    Seppänen, L
    ZEITSCHRIFT FUR DIALEKTOLOGIE UND LINGUISTIK, 2001, 68 (03): : 330 - 332
  • [37] SHARE: system design and case studies for statistical health information release
    Gardner, James
    Xiong, Li
    Xiao, Yonghui
    Gao, Jingjing
    Post, Andrew R.
    Jiang, Xiaoqian
    Ohno-Machado, Lucila
    JOURNAL OF THE AMERICAN MEDICAL INFORMATICS ASSOCIATION, 2013, 20 (01) : 109 - 116
  • [38] Statistical learning and kernel methods
    Navia-Vázquez, A
    Schölkopf, B
    ADAPTIVITY AND LEARNING: AN INTERDISCIPLINARY DEBATE, 2003, : 161 - 186
  • [39] Statistical learning and kernel methods
    Schölkopf, B
    DATA FUSION AND PERCEPTION, 2001, (431): : 3 - 24
  • [40] Statistical Methods for Combining Information: Stryker Family of Vehicles Reliability Case Study
    Dickinson, Rebecca M.
    Freeman, Laura J.
    Simpson, Bruce A.
    Wilson, Alyson G.
    JOURNAL OF QUALITY TECHNOLOGY, 2015, 47 (04) : 400 - 415