Anomaly detection with high deviations for system security

被引:2
|
作者
Peng, XG [1 ]
Ren, KF [1 ]
机构
[1] Taiyuan Univ Technol, Dept Comp Sci & Technol, Taiyuan 030024, Peoples R China
关键词
system security; anomaly detection; privileged programs;
D O I
10.1109/PRDC.2005.18
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
The concept of the unidentified pattern comes from theoretic analysis of pattern space and experimental analysis of pattern distribution. The fuzzy mapping algorithm has been specially designed for the mapping of the unidentified pattern according to the clustering principle of normal and abnormal pattern in the normal and attack period of time. It provides the computation foundation, on which the concept of the unidentified pattern can be introduced into the anomaly detection of privileged programs providing host services. Experiment results indicate that the proposed modeling method of anomaly detection evidently increases the deviation of attack behaviors from normal profile, and ultimately increases detection capability against known and unknown attacks. The research achievements have laid the strong theoretical and experimental foundations to develop the security technologies of system services.
引用
收藏
页码:200 / 207
页数:8
相关论文
共 50 条
  • [21] Integrated Anomaly Detection for Cyber Security of the Substations
    Hong, Junho
    Liu, Chen-Ching
    Govindarasu, Manimaran
    2014 IEEE PES GENERAL MEETING - CONFERENCE & EXPOSITION, 2014,
  • [22] DISCOVERING PATTERNS AND DEVIATIONS IN DATA: COMPARISON OF ANOMALY DETECTION PROCEDURE IN REGRESSION
    Suboh, Syahirah
    Aziz, Izzatdin Abdul
    ADVANCES AND APPLICATIONS IN STATISTICS, 2024, 91 (09) : 1195 - 1215
  • [23] Enhancing Cyber Physical System Security via Anomaly Detection Using Behaviour Analysis
    Gokarn, Vasundhara
    Kulkarni, Vaishali
    Singh, Prateek
    2017 2ND IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, SIGNAL PROCESSING AND NETWORKING (WISPNET), 2017, : 944 - 948
  • [25] Applying unsupervised system-call based software security techniques for anomaly detection
    Kishore, Pushkar
    Nayak, Gayatri
    Barisal, Swadhin Kumar
    JOURNAL OF INFORMATION & OPTIMIZATION SCIENCES, 2022, 43 (05): : 915 - 922
  • [26] Enhancing Control System Security of Power Grid Using Anomaly Detection and Behaviour Analysis
    Gokarn, Vasundhara
    Kulkarni, Vaishali
    Saquib, Zia
    2017 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2017, : 1249 - 1255
  • [27] Security Analysis of Control System Anomaly Detectors
    Umsonst, David
    Sandberg, Henrik
    Cardenas, Alvaro A.
    2017 AMERICAN CONTROL CONFERENCE (ACC), 2017, : 5500 - 5506
  • [28] A Robust Anomaly Detection System
    Bharambe, Asha
    Ravindran, Rahul
    Suchdev, Riya
    Tanna, Yash
    2014 INTERNATIONAL CONFERENCE ON ADVANCES IN ENGINEERING AND TECHNOLOGY RESEARCH (ICAETR), 2014,
  • [29] Anomaly Detection in Dosing System
    Xu, Song
    Zhai, Zhengang
    Fang, Xusheng
    Gao, Bingtao
    Zhu, Yunya
    Zhang, Li
    INTERNATIONAL CONFERENCE ON IMAGE PROCESSING AND INTELLIGENT CONTROL (IPIC 2021), 2021, 11928
  • [30] A fuzzy anomaly detection system
    Li, Dan
    Wang, Kefei
    Deogun, Jitender S.
    INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2006, 3917 : 167 - 168