The techniques for computer security intrusion detection based on Preserving Embedding for Anomaly Detection

被引:0
|
作者
Zhao, Chunxia [1 ]
Linjing, Wang [1 ]
Fan, Liao [1 ]
机构
[1] Henan Univ Chinese Med, Zhengzhou, Peoples R China
关键词
security intrusion detection; Preserving Embedding; Anomaly Detection;
D O I
暂无
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Computer security has been attracting more and more attention, since intrusion detection have become a significant threat in recent years. The techniques for intrusion detection are generally classified into two categories, which are anomaly detection and misuse detection respectively. In this paper, we mainly focus on anomaly detection on behavior of process which is in the form of system call traces. Each process trace is recorded by different system calls that can be naturally deemed as high dimensional data, as one operating system may have a great deal of different system calls. Thus, it is natural without any doubt to say that dimension reduction technique has the opportunity to make a better performance improvement by exploiting classifier in the low dimensional subspace.
引用
收藏
页码:587 / 591
页数:5
相关论文
共 50 条
  • [1] Intrusion Detection Based on Sequential Information Preserving Log Embedding Methods and Anomaly Detection Algorithms
    Kim, Czangyeob
    Jang, Myeongjun
    Seo, Seungwan
    Park, Kyeongchan
    Kang, Pilsung
    IEEE ACCESS, 2021, 9 : 58088 - 58101
  • [2] Taxonomy of statistical based anomaly detection techniques for intrusion detection
    Qayyum, A
    Islam, MH
    Jamil, M
    IEEE: 2005 International Conference on Emerging Technologies, Proceedings, 2005, : 270 - 276
  • [3] Anomaly Detection With Kernel Preserving Embedding
    Liu, Huawen
    Li, Enhui
    Liu, Xinwang
    Su, Kaile
    Zhang, Shichao
    ACM TRANSACTIONS ON KNOWLEDGE DISCOVERY FROM DATA, 2021, 15 (05)
  • [4] Anomaly-Based Network Intrusion Detection: An Outlier Detection Techniques
    Kumar, Neeraj
    Kumar, Upendra
    PROCEEDINGS OF THE EIGHTH INTERNATIONAL CONFERENCE ON SOFT COMPUTING AND PATTERN RECOGNITION (SOCPAR 2016), 2018, 614 : 262 - 269
  • [5] Anomaly detection enhanced classification in computer intrusion detection
    Fugate, M
    Gattiker, JR
    PATTERN RECOGNITION WITH SUPPORT VECTOR MACHINES, PROCEEDINGS, 2002, 2388 : 186 - 197
  • [6] Anomaly detection based Intrusion Detection
    Novikov, Dima
    Yampolskiy, Roman V.
    Reznik, Leon
    THIRD INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: NEW GENERATIONS, PROCEEDINGS, 2006, : 420 - +
  • [7] Computer intrusion detection with classification and anomaly detection, using SVMs
    Fugate, M
    Gattiker, JR
    INTERNATIONAL JOURNAL OF PATTERN RECOGNITION AND ARTIFICIAL INTELLIGENCE, 2003, 17 (03) : 441 - 458
  • [8] Anomaly detection in network security based on nonparametric techniques
    Kim, Eunhye
    Kim, Sehun
    25TH IEEE INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS, VOLS 1-7, PROCEEDINGS IEEE INFOCOM 2006, 2006, : 3240 - 3241
  • [9] Computer Classification of Anomaly Intrusion Detection Based on Support Vector Machine
    Juan Zhou
    Xiang-hua Chen
    INFORMATION TECHNOLOGY APPLICATIONS IN INDUSTRY II, PTS 1-4, 2013, 411-414 : 25 - 29
  • [10] Anomaly-based Intrusion Detection in Computer Networks using Wavelets
    Perlin, Tiago
    Nunes, Raul Ceretta
    Kozakevicius, Alice de Jesus
    REVISTA BRASILEIRA DE COMPUTACAO APLICADA, 2011, 3 (01): : 2 - 15