Anomaly Upload Behavior Detection Based on Fuzzy Inference

被引:2
|
作者
Han, Ting [1 ]
Zhan, Xuna [1 ]
Tao, Jing [2 ]
Cao, Ken [1 ]
Xiong, Yuheng [1 ]
机构
[1] Xi An Jiao Tong Univ, Minist Educ, Key Lab Intelligent Networks & Network Secur, Xian, Peoples R China
[2] Xi An Jiao Tong Univ, Minist Educ, Key Lab Intelligent Networks & Network Secur, Shenzhen Res Inst, Xian, Peoples R China
来源
2021 IEEE INTL CONF ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, INTL CONF ON PERVASIVE INTELLIGENCE AND COMPUTING, INTL CONF ON CLOUD AND BIG DATA COMPUTING, INTL CONF ON CYBER SCIENCE AND TECHNOLOGY CONGRESS DASC/PICOM/CBDCOM/CYBERSCITECH 2021 | 2021年
基金
中国国家自然科学基金;
关键词
file upload; anomaly detection; fuzzy inference; membership function; SYSTEM;
D O I
10.1109/DASC-PICom-CBDCom-CyberSciTech52372.2021.00154
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Anomaly behavior detection is a key step in building a secure and reliable system when a user operates the server system. If a hacker uploads a file containing malicious code during an attack, it will pose a huge threat to the computer system and cannot be detected only by file extension. To solve this problem, this paper proposes a novel anomaly upload behavior detection method that establishes an upload behavior detection model by the fuzzy inference algorithm. In general, membership functions of the fuzzy inference algorithm are directly given by expert's experience. Furthermore, we investigate an improved method for determining membership function, which is obtained by statistical and curve fitting of historical data, to facilitate user's real behavior pattern recognition in the upload behavior detection model. This method does not require calibration of historical data and can be well adapted to different application scenarios. We evaluate the performance of our method via extensive simulations and real-world experiments, whose results demonstrate the feasibility and effectiveness of the proposed method.
引用
收藏
页码:923 / 929
页数:7
相关论文
共 50 条
  • [1] Fuzzy Logic Inference for Unsupervised Anomaly Detection
    Gladkykh, Tetiana
    Hnot, Taras
    Solskyy, Volodymyr
    PROCEEDINGS OF THE 2016 IEEE FIRST INTERNATIONAL CONFERENCE ON DATA STREAM MINING & PROCESSING (DSMP), 2016, : 42 - 47
  • [2] Anomaly detection based on fuzzy rules
    Jiao W.
    Li Q.
    International Journal of Performability Engineering, 2018, 14 (02) : 376 - 385
  • [3] Novel Anomaly Intrusion Detection Using Neuro-Fuzzy Inference System
    Kumar, K. S. Anil
    NandaMohan, V.
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2008, 8 (08): : 6 - 11
  • [4] Anomaly detection based on fuzzy neighborhood rough sets
    Yuan, Yuan
    Wang, Sihan
    Chen, Hongmei
    Luo, Chuan
    Yuan, Zhong
    INFORMATION SCIENCES, 2025, 709
  • [5] A fuzzy rules based approach for performance anomaly detection
    Xu, H
    You, J
    Liu, FY
    2005 IEEE Networking, Sensing and Control Proceedings, 2005, : 44 - 48
  • [6] Graph Structure Based Anomaly Behavior Detection
    Wang, Kai
    Chen, Danwei
    PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING, INFORMATION SCIENCE & APPLICATION TECHNOLOGY (ICCIA 2017), 2017, 74 : 543 - 550
  • [7] Anomaly Detection for User Behavior in Wireless Network Based on Cross Entropy
    Zhang, Chunxiao
    Hu, Yihong
    Zhu, Xinning
    Guo, Zhigang
    Huang, Junfei
    IEEE 12TH INT CONF UBIQUITOUS INTELLIGENCE & COMP/IEEE 12TH INT CONF ADV & TRUSTED COMP/IEEE 15TH INT CONF SCALABLE COMP & COMMUN/IEEE INT CONF CLOUD & BIG DATA COMP/IEEE INT CONF INTERNET PEOPLE AND ASSOCIATED SYMPOSIA/WORKSHOPS, 2015, : 1258 - 1263
  • [8] Behavior Profiling for Robust Anomaly Detection
    Hsiao, Shun-Wen
    Sun, Yeali S.
    Chen, Meng Chang
    Zhang, Hui
    2010 IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND INFORMATION SECURITY (WCNIS), VOL 1, 2010, : 465 - +
  • [9] Anomaly Detection in Network Traffic Based on Statistical Inference and α-Stable Modeling
    Simmross-Wattenberg, Federico
    Ignacio Asensio-Perez, Juan
    Casaseca-de-la-Higuera, Pablo
    Martin-Fernandez, Marcos
    Dimitriadis, Ioannis A.
    Alberola-Lopez, Carlos
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2011, 8 (04) : 494 - 509
  • [10] Agent Behavior Strategy Based on Fuzzy Evaluation and Inference in RoboCupSoccer
    Cai, Jian-Huai
    Luo, De-Lin
    Li, Mao-Qing
    Wu, Shun-Xiang
    JOURNAL OF INTERNET TECHNOLOGY, 2010, 11 (03): : 371 - 378