Adaptive Threshold Selection for Trust-based Detection Systems

被引:0
|
作者
Chae, Younghun [1 ]
Katenka, Natallia [1 ]
DiPippo, Lisa [1 ]
机构
[1] Univ Rhode Isl, Dept Comp Sci, Kingston, RI 02881 USA
关键词
anomaly detection; outlier identification; trust management; bipartite graph;
D O I
10.1109/ICDMW.2016.58
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Data analysis of complex behaviors, intrusion attacks and system failures inherent in the Information Technology systems became one of the key strategies for ensuring the security of cyber assets. Data-driven anomaly detection methods can offer an appealing alternative to existing signature-based intrusion detection systems by capturing known and previously unseen attacks. In this paper, we try to develop efficient rules that distinguish between normal and abnormal behavior in a given period and over time that can also adapt to relational and dynamic changes in cyber environment. Specifically, we represent the network flow data as a bipartite graph and then adopt an outlier detection approach for heavy-tailed distributions to develop an adaptive threshold method for node behavior characterization. Further, we introduce a trust management scheme for aggregation of node behaviors over time and evaluation of overall node `trustworthiness' over full time period. Using the data collected by European Internet Service Provider, we demonstrate superior performance of the proposed adaptive threshold selection method for Trust-based detection systems. Overall, the proposed framework can adjust to changing conditions of the system and can be used for detection of anomalous node behaviors in realtime.
引用
收藏
页码:281 / 287
页数:7
相关论文
共 50 条
  • [1] Trust-Based Selection of Partners
    Urbano, Maria Joana
    Rocha, Ana Paula
    Oliveira, Eugenio
    [J]. E-COMMERCE AND WEB TECHNOLOGIES, 2011, 85 : 221 - 232
  • [2] Adaptive detection threshold selection based on a priori threshold optimization
    Wang, Guo-Hong
    Mao, Shi-Yi
    He, You
    Dong, Bing
    Song, Zhen-Yu
    [J]. Hangkong Xuebao/Acta Aeronautica et Astronautica Sinica, 2000, 21 (06): : 516 - 519
  • [3] Selection of Query - Utilize Trust-Based Algorithms to Propagate Trust
    Pruthi, Jyoti
    [J]. PROCEEDINGS OF THE 10TH INDIACOM - 2016 3RD INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT, 2016, : 3872 - 3875
  • [4] A trust-based selection approach for composite service
    Li, Jun
    Zheng, Xiao-Lin
    Chen, De-Ren
    [J]. Zhejiang Daxue Xuebao (Gongxue Ban)/Journal of Zhejiang University (Engineering Science), 2012, 46 (05): : 885 - 892
  • [5] A trust-based approach to selection of business services
    Li, Sufen
    Fan, Yushun
    Li, Xitong
    [J]. INTERNATIONAL JOURNAL OF COMPUTER INTEGRATED MANUFACTURING, 2011, 24 (08) : 769 - 784
  • [6] TRUST-BASED NAVIGATION IN DISTRIBUTED SYSTEMS
    YAHALOM, R
    KLEIN, B
    BETH, T
    [J]. COMPUTING SYSTEMS, 1994, 7 (01): : 45 - 73
  • [7] Trust-based specification of sociotechnical systems
    Paja, Elda
    Chopra, Amit K.
    Giorgini, Paolo
    [J]. DATA & KNOWLEDGE ENGINEERING, 2013, 87 : 339 - 353
  • [8] Trust-Based Recommender Systems: An Overview
    Selmi, Afef
    Brahmi, Zaki
    Gammoudi, Mohamed Mohsen
    [J]. INNOVATION MANAGEMENT AND EDUCATION EXCELLENCE VISION 2020: FROM REGIONAL DEVELOPMENT SUSTAINABILITY TO GLOBAL ECONOMIC GROWTH, VOLS I - VI, 2016, : 371 - 380
  • [9] Epidemic Trust-based Recommender Systems
    Magureanu, Stefan
    Dokoohaki, Nima
    Mokarizadeh, Shahab
    Matskin, Mihhail
    [J]. PROCEEDINGS OF 2012 ASE/IEEE INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY, RISK AND TRUST AND 2012 ASE/IEEE INTERNATIONAL CONFERENCE ON SOCIAL COMPUTING (SOCIALCOM/PASSAT 2012), 2012, : 461 - 470
  • [10] An Interference Detection Method Based on Adaptive Threshold Selection
    Liang Xiurong
    [J]. AGRO FOOD INDUSTRY HI-TECH, 2017, 28 (03): : 3044 - 3049