The techniques for computer security intrusion detection based on Preserving Embedding for Anomaly Detection

被引:0
|
作者
Zhao, Chunxia [1 ]
Linjing, Wang [1 ]
Fan, Liao [1 ]
机构
[1] Henan Univ Chinese Med, Zhengzhou, Peoples R China
关键词
security intrusion detection; Preserving Embedding; Anomaly Detection;
D O I
暂无
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Computer security has been attracting more and more attention, since intrusion detection have become a significant threat in recent years. The techniques for intrusion detection are generally classified into two categories, which are anomaly detection and misuse detection respectively. In this paper, we mainly focus on anomaly detection on behavior of process which is in the form of system call traces. Each process trace is recorded by different system calls that can be naturally deemed as high dimensional data, as one operating system may have a great deal of different system calls. Thus, it is natural without any doubt to say that dimension reduction technique has the opportunity to make a better performance improvement by exploiting classifier in the low dimensional subspace.
引用
收藏
页码:587 / 591
页数:5
相关论文
共 50 条
  • [31] INTRUSION DETECTION - AN APPLICATION OF EXPERT SYSTEMS TO COMPUTER SECURITY
    BAUER, DS
    EICHELMAN, FR
    HERRERA, RM
    IRGON, AE
    1989 INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY, 1989, : 97 - 100
  • [32] A global security architecture for intrusion detection on computer networks
    Ganame, Abdoul Karim
    Bourgeois, Julien
    Bidou, Renaud
    Spies, Francois
    COMPUTERS & SECURITY, 2008, 27 (1-2) : 30 - 47
  • [33] Anomaly intrusion detection method based on HMM
    Qiao, Y
    Xin, XW
    Bin, Y
    Ge, S
    ELECTRONICS LETTERS, 2002, 38 (13) : 663 - 664
  • [34] Anomaly Intrusion Detection based on Concept Lattice
    Wang, Li-fang
    ADVANCES IN MANUFACTURING TECHNOLOGY, PTS 1-4, 2012, 220-223 : 2388 - 2392
  • [35] Computer Network Intrusion Anomaly Detection with Recurrent Neural Network
    Fu, Zeyuan
    MOBILE INFORMATION SYSTEMS, 2022, 2022
  • [36] Intrusion Detection System based on Anomaly and Misuse
    Zhou, YuPing
    Zheng, LiPing
    PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON MODELLING AND SIMULATION (ICMS2009), VOL 7, 2009, : 474 - 479
  • [37] Improved security intrusion detection using intelligent techniques
    Leghris, Cherkaoui
    Elaeraj, Ouafae
    Renault, Eric
    2019 INTERNATIONAL CONFERENCE ON WIRELESS NETWORKS AND MOBILE COMMUNICATIONS (WINCOM), 2019, : 222 - 226
  • [38] Anomaly-Based Intrusion Detection System for Cyber-Physical System Security
    Colelli, Riccardo
    Magri, Filippo
    Panzieri, Stefano
    Pascucci, Federica
    2021 29TH MEDITERRANEAN CONFERENCE ON CONTROL AND AUTOMATION (MED), 2021, : 428 - 434
  • [39] Novel intrusion detection method based on Principle Component Analysis in computer security
    Wang, W
    Guan, XH
    Zhang, XL
    ADVANCES IN NEURAL NETWORKS - ISNN 2004, PT 2, 2004, 3174 : 657 - 662
  • [40] The multi-demeanor fusion based robust intrusion detection system for anomaly and misuse detection in computer networks
    Akshay Rameshbhai Gupta
    Jitendra Agrawal
    Journal of Ambient Intelligence and Humanized Computing, 2021, 12 : 303 - 319