Anomaly detection model of user behavior based on principal component analysis

被引:22
作者
Bi, Meng [1 ,2 ]
Xu, Jian [1 ,3 ]
Wang, Mo [4 ]
Zhou, Fucai [1 ]
机构
[1] Northeastern Univ, Software Coll, Shenyang, Peoples R China
[2] Shenyang Univ Technol, Shenyang, Peoples R China
[3] Chinese Acad Sci, Secur Inst Informat Engn, State Key Lab Informat, Beijing 100093, Peoples R China
[4] Jilin Univ, Software Coll, Changchun, Jilin, Peoples R China
关键词
Anomaly detection; User behavior; Principle component analysis;
D O I
10.1007/s12652-015-0341-4
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
A new anomaly detection model which is based on principal component analysis (PCA) is proposed in this paper. Our schema proposes a method to extract the user's behavior and analyzes the features selected as representative of the user's access. The PCA method is introduced to the anomaly detection model which adopts its improvements to make it more consistent with anomaly detection system design to describe the user's behavior more completely and to improve the efficiency and stability of the algorithm. This paper also uses our scheme to the anomaly detection of the database system. Finally, the data sets from the internet are used to test the feasibility of this model. The experimental results show that our model can detect normal and abnormal user behavior precisely and effectively.
引用
收藏
页码:547 / 554
页数:8
相关论文
共 24 条
[1]  
Bertino E, 2005, 21ST ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, P155
[2]   Cloud-based adaptive compression and secure management services for 3D healthcare data [J].
Castiglione, Arcangelo ;
Pizzolante, Raffaele ;
De Santis, Alfredo ;
Carpentieri, Bruno ;
Castiglione, Aniello ;
Palmieri, Francesco .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2015, 43-44 :120-134
[3]   Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud Storage [J].
Cui, Baojiang ;
Liu, Zheli ;
Wang, Lingyu .
IEEE TRANSACTIONS ON COMPUTERS, 2016, 65 (08) :2374-2385
[4]   A novel feature-selection approach based on the cuttlefish optimization algorithm for intrusion detection systems [J].
Eesa, Adel Sabry ;
Orman, Zeynep ;
Brifcani, Adnan Mohsin Abdulazeez .
EXPERT SYSTEMS WITH APPLICATIONS, 2015, 42 (05) :2670-2679
[5]   Smart Cloud Storage Service Selection Based on Fuzzy Logic, Theory of Evidence and Game Theory [J].
Esposito, Christian ;
Ficco, Massimo ;
Palmieri, Francesco ;
Castiglione, Aniello .
IEEE TRANSACTIONS ON COMPUTERS, 2016, 65 (08) :2348-2362
[6]   Interconnecting Federated Clouds by Using Publish-Subscribe Service [J].
Esposito, Christian ;
Ficco, Massimo ;
Palmieri, Francesco ;
Castiglione, Aniello .
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2013, 16 (04) :887-903
[7]   Network anomaly detection with the restricted Boltzmann machine [J].
Fiore, Ugo ;
Palmieri, Francesco ;
Castiglione, Aniello ;
De Santis, Alfredo .
NEUROCOMPUTING, 2013, 122 :13-23
[8]  
Goyal MK, 2012, 2012 2ND IEEE INTERNATIONAL CONFERENCE ON PARALLEL, DISTRIBUTED AND GRID COMPUTING (PDGC), P669, DOI 10.1109/PDGC.2012.6449900
[9]  
Hu Y, 2004, ACM S APPL COMP
[10]  
Jonathan G, 2015, J APPL STAT, V42, P209