The techniques for computer security intrusion detection based on Preserving Embedding for Anomaly Detection

被引:0
作者
Zhao, Chunxia [1 ]
Linjing, Wang [1 ]
Fan, Liao [1 ]
机构
[1] Henan Univ Chinese Med, Zhengzhou, Peoples R China
来源
PROCEEDINGS OF THE 2016 6TH INTERNATIONAL CONFERENCE ON MACHINERY, MATERIALS, ENVIRONMENT, BIOTECHNOLOGY AND COMPUTER (MMEBC) | 2016年 / 88卷
关键词
security intrusion detection; Preserving Embedding; Anomaly Detection;
D O I
暂无
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Computer security has been attracting more and more attention, since intrusion detection have become a significant threat in recent years. The techniques for intrusion detection are generally classified into two categories, which are anomaly detection and misuse detection respectively. In this paper, we mainly focus on anomaly detection on behavior of process which is in the form of system call traces. Each process trace is recorded by different system calls that can be naturally deemed as high dimensional data, as one operating system may have a great deal of different system calls. Thus, it is natural without any doubt to say that dimension reduction technique has the opportunity to make a better performance improvement by exploiting classifier in the low dimensional subspace.
引用
收藏
页码:587 / 591
页数:5
相关论文
共 50 条
  • [41] A Novel Unsupervised Anomaly Detection Approach for Intrusion Detection System
    Chen, Weiwei
    Kong, Fangang
    Mei, Feng
    Yuan, Guiqin
    Li, Bo
    2017 IEEE 3RD INTERNATIONAL CONFERENCE ON BIG DATA SECURITY ON CLOUD (BIGDATASECURITY, IEEE 3RD INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE AND SMART COMPUTING, (HPSC) AND 2ND IEEE INTERNATIONAL CONFERENCE ON INTELLIGENT DATA AND SECURITY (IDS), 2017, : 69 - 73
  • [42] Quantitative Comparison of Unsupervised Anomaly Detection Algorithms for Intrusion Detection
    Falcao, Filipe
    Zoppi, Tommaso
    Viera Silva, Caio Barbosa
    Santos, Anderson
    Fonseca, Baldoino
    Ceccarelli, Andrea
    Bondavalli, Andrea
    SAC '19: PROCEEDINGS OF THE 34TH ACM/SIGAPP SYMPOSIUM ON APPLIED COMPUTING, 2019, : 318 - 327
  • [43] Privacy preserving anomaly detection based on local density estimation
    Zhang, Chunkai
    Yin, Ao
    Zuo, Wei
    Chen, Yingyang
    MATHEMATICAL BIOSCIENCES AND ENGINEERING, 2020, 17 (04) : 3478 - 3497
  • [44] A novel hybrid intrusion detection method integrating anomaly detection with misuse detection
    Kim, Gisung
    Lee, Seungmin
    Kim, Sehun
    EXPERT SYSTEMS WITH APPLICATIONS, 2014, 41 (04) : 1690 - 1700
  • [45] PGAN:A Generative Adversarial Network based Anomaly Detection Method for Network Intrusion Detection System
    Li, Zeyi
    Wang, Yun
    Wang, Pan
    Su, Haorui
    2021 IEEE 20TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2021), 2021, : 734 - 741
  • [46] TAT-NIDS: An Immune-Based Anomaly Detection Architecture for Network Intrusion Detection
    Antunes, Mario
    Correia, Manuel
    2ND INTERNATIONAL WORKSHOP ON PRACTICAL APPLICATIONS OF COMPUTATIONAL BIOLOGY AND BIOINFORMATICS (IWPACBB 2008), 2009, 49 : 60 - +
  • [47] A survey of anomaly detection techniques
    Fatma M. Ghamry
    Ghada M. El-Banby
    Adel S. El-Fishawy
    Fathi E. Abd El-Samie
    Moawad I. Dessouky
    Journal of Optics, 2024, 53 : 756 - 774
  • [48] A survey of anomaly detection techniques
    Ghamry, Fatma M.
    El-Banby, Ghada M.
    El-Fishawy, Adel S.
    Abd El-Samie, Fathi E.
    Dessouky, Moawad I.
    JOURNAL OF OPTICS-INDIA, 2024, 53 (02): : 756 - 774
  • [49] A new similarity measure for the anomaly intrusion detection
    Belkhirat, Ahmed
    Bouras, Abdelghani
    Belkhir, Abdelkader
    NSS: 2009 3RD INTERNATIONAL CONFERENCE ON NETWORK AND SYSTEM SECURITY, 2009, : 431 - +
  • [50] Intrusion cancellation for anomaly detection in healthcare applications
    Mohamed, Mbarka Belhaj
    Meddeb-Makhlouf, Amel
    Fakhfakh, Ahmed
    2019 15TH INTERNATIONAL WIRELESS COMMUNICATIONS & MOBILE COMPUTING CONFERENCE (IWCMC), 2019, : 313 - 318