Enhancing profiles for anomaly detection using time granularities

被引:0
|
作者
Li, Yingjiu [1 ]
Wu, Ningning [1 ]
Sean Wang, X. [1 ]
Jajodia, Sushil [1 ]
机构
[1] Ctr. for Secure Information Systems, George Mason University, Fairfax, VA 22030, United States
关键词
Algorithms - Data reduction - Network protocols - Security of data;
D O I
10.3233/JCS-2002-101-206
中图分类号
学科分类号
摘要
Recently, association rules have been used to generate profiles of normal behavior for anomaly detection. However, the time factor (especially in terms of multiple time granularities) has not been utilized extensively in generation of these profiles. In reality, user behavior during different time intervals may be very different. For example, the normal number and duration of FTP connections may vary from working hours to midnight, from business day to weekend or holiday. Furthermore, these variations may depend on the day of the month or the week. This paper proposes to build profiles using temporal association rules in terms of multiple time granularities, and describes algorithms to discover these profiles. Because multiple time granularities are used for the profile generation, the proposed method is more flexible and precise than previous methods that use fixed partition of time intervals. Finally, the paper describes an experiment and its preliminary result on TCP-dump data.
引用
收藏
页码:137 / 157
相关论文
共 50 条
  • [31] Enhancing Industrial Control Systems Security: Real-Time Anomaly Detection with Uncertainty Estimation
    Birihanu, Ermiyas
    Soullami, Ayyoub
    Lendak, Imre
    DISCOVERY SCIENCE, DS 2024, PT II, 2025, 15244 : 99 - 114
  • [32] Enhancing Urban Traffic Management Through Real-Time Anomaly Detection and Load Balancing
    Laanaoui, My Driss
    Lachgar, Mohamed
    Mohamed, Hanine
    Hamid, Hrimech
    Villar, Santos Gracia
    Ashraf, Imran
    IEEE ACCESS, 2024, 12 : 63683 - 63700
  • [33] Enhancing autoencoder models for multivariate time series anomaly detection: the role of noise and data amount
    Sefati, Seyedeh Tina
    Razavi, Seyed Naser
    Salehpour, Pedram
    JOURNAL OF SUPERCOMPUTING, 2025, 81 (04):
  • [34] Enhancing Anomaly Detection in Attributed Networks Using Proximity Preservation and Advanced Embedding Techniques
    Khan, Wasim
    Ishrat, Mohammad
    Ahmed, Mohammad Nadeem
    Abidin, Shafiqul
    Husain, Mohammad
    Izhar, Mohd
    Zamani, Abu Taha
    Hussain, Mohammad Rashid
    Ali, Arshad
    IEEE ACCESS, 2025, 13 : 42777 - 42796
  • [35] Enhancing security using mobility-based anomaly detection in cellular mobile networks
    Sun, Bo
    Yu, Fei
    Wu, Kui
    Xiao, Yang
    Leung, Victor C. M.
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2006, 55 (04) : 1385 - 1396
  • [36] Enhancing Cyber Physical System Security via Anomaly Detection Using Behaviour Analysis
    Gokarn, Vasundhara
    Kulkarni, Vaishali
    Singh, Prateek
    2017 2ND IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, SIGNAL PROCESSING AND NETWORKING (WISPNET), 2017, : 944 - 948
  • [37] Enhancing Anomaly Detection in Critical Systems Using Household Appliance Power Consumption Data
    Nayak, Rajesh
    Jaidhar, C. D.
    IEEE SENSORS JOURNAL, 2024, 24 (17) : 27677 - 27686
  • [38] Enhancing Anomaly Detection of IoT using Knowledge-Based and Federated Deep Learning
    Simra, Tabassum
    Konatham, Bharath
    Amsaad, Fathi
    Ibrahem, Mohamed I.
    Jhanjhi, Noor Zaman
    2024 IEEE 3RD INTERNATIONAL CONFERENCE ON COMPUTING AND MACHINE INTELLIGENCE, ICMI 2024, 2024,
  • [39] Enhancing Control System Security of Power Grid Using Anomaly Detection and Behaviour Analysis
    Gokarn, Vasundhara
    Kulkarni, Vaishali
    Saquib, Zia
    2017 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2017, : 1249 - 1255
  • [40] Anomaly-based intrusion detection using mobility profiles of public transportation users
    Hall, J
    Barbeau, M
    Kranakis, E
    WIMOB'2005: IEEE INTERNATIONAL CONFERENCE ON WIRELESS AND MOBILE COMPUTING, NETWORKING AND COMMUNICATIONS, VOL 2, PROCEEDINGS: MOBILE NETWORKING, 2005, : 17 - 24