Methods for cluster-based incident detection

被引:0
|
作者
Carrier, BD [1 ]
Matheny, B [1 ]
机构
[1] Purdue Univ, Ctr Educ & Res Informat Assurance & Secur, CERIAS, W Lafayette, IN 47907 USA
关键词
D O I
10.1109/IWIA.2004.1288039
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we introduce a statistics-based anomaly detection technique for identifying systems that could have been compromised and had trojan executables installed. Attackers frequently install rootkits and other trojan files onto hosts they compromise so they can easily gain access in the future. Many detection systems use signatures to identify unauthorized files, but signatures for all platforms and patch levels do not exist in large-scale environments, such as government and university networks. Our anomaly detection system organizes hosts into clusters based on their files and uses statistics to identify those that should be examined in more detail.
引用
收藏
页码:71 / 78
页数:8
相关论文
共 50 条
  • [1] Cluster-based outlier detection
    Lian Duan
    Lida Xu
    Ying Liu
    Jun Lee
    [J]. Annals of Operations Research, 2009, 168 : 151 - 168
  • [2] Cluster-based outlier detection
    Duan, Lian
    Xu, Lida
    Liu, Ying
    Lee, Jun
    [J]. ANNALS OF OPERATIONS RESEARCH, 2009, 168 (01) : 151 - 168
  • [3] A Cluster-based Noise Detection Algorithm
    Yin, Hua
    Dong, Hongbin
    Li, Yuxuan
    [J]. FIRST INTERNATIONAL WORKSHOP ON DATABASE TECHNOLOGY AND APPLICATIONS, PROCEEDINGS, 2009, : 386 - +
  • [4] Efficient Coreset Selection with Cluster-based Methods
    Chai, Chengliang
    Wang, Jiayi
    Tang, Nan
    Yuan, Ye
    Liu, Jiabin
    Deng, Yuhao
    Wang, Guoren
    [J]. PROCEEDINGS OF THE 29TH ACM SIGKDD CONFERENCE ON KNOWLEDGE DISCOVERY AND DATA MINING, KDD 2023, 2023, : 167 - 178
  • [5] Cluster-Based Co-Saliency Detection
    Fu, Huazhu
    Cao, Xiaochun
    Tu, Zhuowen
    [J]. IEEE TRANSACTIONS ON IMAGE PROCESSING, 2013, 22 (10) : 3766 - 3778
  • [6] Cluster-based Crowd Movement Behavior Detection
    Yang, Meng
    Rashidi, Lida
    Rao, Aravinda S.
    Rajasegarar, Sutharshan
    Ganji, Mohadeseh
    Palaniswami, Marimuthu
    Leckie, Christopher
    [J]. 2018 INTERNATIONAL CONFERENCE ON DIGITAL IMAGE COMPUTING: TECHNIQUES AND APPLICATIONS (DICTA), 2018, : 346 - 353
  • [7] A comparative study of cluster-based methods at finite strain
    Yang, Yang
    Zhang, Lei
    Tang, Shaoqiang
    [J]. ACTA MECHANICA SINICA, 2022, 38 (04)
  • [8] Differential Evolution Cluster-based Text Summarization Methods
    Abuobieda, Albaraa
    Salim, Naomie
    Binwahlan, Mohammed Salem
    Osman, Ahmed Hamza
    [J]. 2013 INTERNATIONAL CONFERENCE ON COMPUTING, ELECTRICAL AND ELECTRONICS ENGINEERING (ICCEEE), 2013, : 244 - 248
  • [9] Cluster-based Intrusion Detection Method for Internet of Things
    Choudhary, Sarika
    Kesswani, Nishtha
    [J]. 2019 IEEE/ACS 16TH INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS (AICCSA 2019), 2019,
  • [10] A Cluster-Based Outlier Detection Scheme for Multivariate Data
    Jobe, J. Marcus
    Pokojovy, Michael
    [J]. JOURNAL OF THE AMERICAN STATISTICAL ASSOCIATION, 2015, 110 (512) : 1543 - 1551