The techniques for computer security intrusion detection based on Preserving Embedding for Anomaly Detection

被引:0
|
作者
Zhao, Chunxia [1 ]
Linjing, Wang [1 ]
Fan, Liao [1 ]
机构
[1] Henan Univ Chinese Med, Zhengzhou, Peoples R China
关键词
security intrusion detection; Preserving Embedding; Anomaly Detection;
D O I
暂无
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Computer security has been attracting more and more attention, since intrusion detection have become a significant threat in recent years. The techniques for intrusion detection are generally classified into two categories, which are anomaly detection and misuse detection respectively. In this paper, we mainly focus on anomaly detection on behavior of process which is in the form of system call traces. Each process trace is recorded by different system calls that can be naturally deemed as high dimensional data, as one operating system may have a great deal of different system calls. Thus, it is natural without any doubt to say that dimension reduction technique has the opportunity to make a better performance improvement by exploiting classifier in the low dimensional subspace.
引用
收藏
页码:587 / 591
页数:5
相关论文
共 50 条
  • [21] Computer Network Intrusion Anomaly Detection Based on Rough Fourier Fast Algorithm
    Duan, Xindong
    MATHEMATICAL PROBLEMS IN ENGINEERING, 2022, 2022
  • [22] A Hybrid Model for Anomaly-Based Intrusion Detection in Complex Computer Networks
    Protic, Danijela
    Stankovic, Miomir
    2020 21ST INTERNATIONAL ARAB CONFERENCE ON INFORMATION TECHNOLOGY (ACIT), 2020,
  • [23] An intelligent intrusion detection system (IDS) for anomaly and misuse detection in computer networks
    Depren, O
    Topallar, M
    Anarim, E
    Ciliz, MK
    EXPERT SYSTEMS WITH APPLICATIONS, 2005, 29 (04) : 713 - 722
  • [24] Anomaly Based Intrusion Detection System Using Hierarchical Classification and Clustering Techniques
    Bahjat, Hala
    Mohammed, Suhaila N.
    Ahmed, Wafaa
    Hamad, Sumaya
    Mohammed, Shayma
    2020 13TH INTERNATIONAL CONFERENCE ON DEVELOPMENTS IN ESYSTEMS ENGINEERING (DESE 2020), 2020, : 257 - 262
  • [25] Anomaly Intrusion Detection Based Upon Data Mining Techniques and Fuzzy Logic
    Yu, Yingbing
    Wu, Han
    PROCEEDINGS 2012 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN, AND CYBERNETICS (SMC), 2012, : 514 - 517
  • [26] Analysis of anomaly-based intrusion detection techniques for mobile wireless networks
    Liu, Lijun
    Ma, Hongxia
    Liu, Jianqiu
    Li, Zhuowei
    2008 PROCEEDINGS OF INFORMATION TECHNOLOGY AND ENVIRONMENTAL SYSTEM SCIENCES: ITESS 2008, VOL 2, 2008, : 827 - 832
  • [27] Anomaly Based Network Intrusion Detection with Unsupervised Outlier Detection
    Zhang, Jiong
    Zulkernine, Mohammad
    2006 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-12, 2006, : 2388 - 2393
  • [28] Hurst Parameter based Anomaly Detection for Intrusion Detection System
    Yu, Song Jin
    Koh, Pauline
    Kwon, Hyukmin
    Kim, Dong Seong
    Kim, Huy Kang
    2016 IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY (CIT), 2016, : 234 - 240
  • [29] Clustering Algorithm Based on Outlier Detection for Anomaly Intrusion Detection
    Yin, Shang-Nan
    Kang, Ho-Seok
    Kim, Sung-Ryul
    JOURNAL OF INTERNET TECHNOLOGY, 2016, 17 (02): : 291 - 299
  • [30] An attack signature model to computer security intrusion detection
    Cansian, AM
    da Silva, ARA
    de Souza, M
    2002 MILCOM PROCEEDINGS, VOLS 1 AND 2: GLOBAL INFORMATION GRID - ENABLING TRANSFORMATION THROUGH 21ST CENTURY COMMUNICATIONS, 2002, : 1368 - 1373