A novel anomaly detection approach based on data field

被引:1
|
作者
Yang, Hong-Yu [1 ]
Xie, Li-Xia [1 ]
Xie, Feng [2 ]
机构
[1] Civil Aviat Univ China, Sch Comp Sci, Tianjin 300300, Peoples R China
[2] China Informat Technol Secur Certificat Ctr, Beijing 100083, Peoples R China
基金
中国国家自然科学基金;
关键词
anomaly detection; data field; influence; classification; data set;
D O I
10.1109/ICMLC.2008.4620569
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
This paper presents a new approach to detecting attack activities. In this method, network connections were transformed into data points in the predefined feature space. The influence function was designed to quantify the influence of an object and, further, the data field was divided into positive field and negative Field according to the source point's category. To perform classification, all the labeled training samples were regarded as source points and a data field was built in the feature space. The influence felt by given testing point in the data field was calculated and its class was judged according to the sign and magnitude of the influence in detecting process. Experimental results demonstrate that our approach has good detection performance.
引用
收藏
页码:1105 / +
页数:3
相关论文
共 50 条
  • [41] A novel approach for edge detection based on the theory of electrostatic field
    Wang, Zhong-Ren
    Quan, Yan-Ming
    2007 INTERNATIONAL SYMPOSIUM ON INTELLIGENT SIGNAL PROCESSING AND COMMUNICATION SYSTEMS, VOLS 1 AND 2, 2007, : 192 - +
  • [42] A novel anomaly detection based on vector quantization
    Yin, QB
    Zhang, RB
    Li, XY
    Shen, LR
    PROCEEDINGS OF THE 8TH JOINT CONFERENCE ON INFORMATION SCIENCES, VOLS 1-3, 2005, : 749 - 753
  • [43] An Anomaly Detection Approach based on Symbolic Similarity
    Yan, Qiuyan
    Xia, Shixiong
    Shi, Yilong
    2010 CHINESE CONTROL AND DECISION CONFERENCE, VOLS 1-5, 2010, : 3003 - 3008
  • [44] A CNN Based Approach for Crowd Anomaly Detection
    Joshi, Kinjal, V
    Patel, Narendra M.
    INTERNATIONAL JOURNAL OF NEXT-GENERATION COMPUTING, 2021, 12 (01): : 1 - 11
  • [45] Anomaly detection: A signature.-based approach
    Sy, B
    Chan, HH
    DMIN '05: Proceedings of the 2005 International Conference on Data Mining, 2005, : 193 - 199
  • [46] Anomaly Detection of Sensor Data Based on Similarity
    Sheng, Xun
    Hu, Min
    Yu, Gang
    Teng, Li
    Su, Donghua
    2024 IEEE 7TH INTERNATIONAL CONFERENCE ON AUTOMATION, ELECTRONICS AND ELECTRICAL ENGINEERING, AUTEEE, 2024, : 895 - 898
  • [47] A Novel Anomaly Detection Approach for Mitigating Web-based Attacks against Clouds
    Zhang, Simin
    Li, Bo
    Li, Jianxin
    Zhang, Mingming
    Chen, Yang
    2015 IEEE 2ND INTERNATIONAL CONFERENCE ON CYBER SECURITY AND CLOUD COMPUTING (CSCLOUD), 2015, : 289 - 294
  • [48] A novel bi-anomaly-based intrusion detection system approach for industry 4.0
    Alem, Salwa
    Espes, David
    Nana, Laurent
    Martin, Eric
    De Lamotte, Florent
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2023, 145 : 267 - 283
  • [49] A novel systematic algorithm paradigm for the electric vehicle data anomaly detection based on association data mining
    Wang, Yan
    Wu, Mengnan
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2019, 31 (09):
  • [50] A Novel Network Anomaly Detection Method based on Data Balancing and Recursive Feature Addition
    Liu, Xinqian
    Ren, Jiadong
    He, Haitao
    Wang, Qian
    Sun, Shengting
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2020, 14 (07) : 3093 - 3115