The techniques for computer security intrusion detection based on Preserving Embedding for Anomaly Detection

被引:0
作者
Zhao, Chunxia [1 ]
Linjing, Wang [1 ]
Fan, Liao [1 ]
机构
[1] Henan Univ Chinese Med, Zhengzhou, Peoples R China
来源
PROCEEDINGS OF THE 2016 6TH INTERNATIONAL CONFERENCE ON MACHINERY, MATERIALS, ENVIRONMENT, BIOTECHNOLOGY AND COMPUTER (MMEBC) | 2016年 / 88卷
关键词
security intrusion detection; Preserving Embedding; Anomaly Detection;
D O I
暂无
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Computer security has been attracting more and more attention, since intrusion detection have become a significant threat in recent years. The techniques for intrusion detection are generally classified into two categories, which are anomaly detection and misuse detection respectively. In this paper, we mainly focus on anomaly detection on behavior of process which is in the form of system call traces. Each process trace is recorded by different system calls that can be naturally deemed as high dimensional data, as one operating system may have a great deal of different system calls. Thus, it is natural without any doubt to say that dimension reduction technique has the opportunity to make a better performance improvement by exploiting classifier in the low dimensional subspace.
引用
收藏
页码:587 / 591
页数:5
相关论文
共 50 条
  • [31] ANOMALY INTRUSION DETECTION METHOD BASED ON ROUGH SET THEORY
    Li, Yong-Zhong
    Zhao, Bo
    Xu, Jing
    Yang, Ge
    PROCEEDINGS OF 2008 INTERNATIONAL CONFERENCE ON WAVELET ANALYSIS AND PATTERN RECOGNITION, VOLS 1 AND 2, 2008, : 764 - 770
  • [32] Anomaly Based Intrusion Detection for Building Automation and Control Networks
    Pan, Zhiwen
    Hariri, Salim
    Al-Nashif, Youssif
    2014 IEEE/ACS 11TH INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS (AICCSA), 2014, : 72 - 77
  • [33] Data preprocessing for anomaly based network intrusion detection: A review
    Davis, Jonathan J.
    Clark, Andrew J.
    COMPUTERS & SECURITY, 2011, 30 (6-7) : 353 - 375
  • [34] A WEB INTRUSION DETECTION SYSTEM BASED ON ANOMALY GENERALIZATION MECHANISM
    Ma, Hualin
    INTERNATIONAL SYMPOSIUM ON COMPUTER SCIENCE & TECHNOLOGY, PROCEEDINGS, 2009, : 143 - 146
  • [35] Anomaly-based Intrusion Detection System for smart lighting
    Lara, Agustin
    Estepa, Antonio
    Estepa, Rafael
    Diaz-Verdejo, Jesus E.
    Mayor, Vicente
    INTERNET OF THINGS, 2024, 28
  • [36] Intrusion detection for high-speed railways based on unsupervised anomaly detection models
    Wang, Yao
    Yu, Zujun
    Zhu, Liqiang
    APPLIED INTELLIGENCE, 2023, 53 (07) : 8453 - 8466
  • [37] Intrusion detection for high-speed railways based on unsupervised anomaly detection models
    Yao Wang
    Zujun Yu
    Liqiang Zhu
    Applied Intelligence, 2023, 53 : 8453 - 8466
  • [38] Context-based profiling for anomaly intrusion detection with diagnosis
    Salem, Benferhat
    Karim, Tabia
    ARES 2008: PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON AVAILABILITY, SECURITY AND RELIABILITY, 2008, : 618 - +
  • [39] Anomaly based Intrusion Detection using Modified Fuzzy Clustering
    Harish, B. S.
    Kumar, S. V. Aruna
    INTERNATIONAL JOURNAL OF INTERACTIVE MULTIMEDIA AND ARTIFICIAL INTELLIGENCE, 2017, 4 (06): : 54 - 59
  • [40] Anomaly Detection on Intrusion Detection System Using CLIQUE Partitioning
    Nastaiinullah, N.
    Adiwijaya
    Kurniati, A. P.
    2014 2ND INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY (ICOICT), 2014,