The techniques for computer security intrusion detection based on Preserving Embedding for Anomaly Detection

被引:0
|
作者
Zhao, Chunxia [1 ]
Linjing, Wang [1 ]
Fan, Liao [1 ]
机构
[1] Henan Univ Chinese Med, Zhengzhou, Peoples R China
关键词
security intrusion detection; Preserving Embedding; Anomaly Detection;
D O I
暂无
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Computer security has been attracting more and more attention, since intrusion detection have become a significant threat in recent years. The techniques for intrusion detection are generally classified into two categories, which are anomaly detection and misuse detection respectively. In this paper, we mainly focus on anomaly detection on behavior of process which is in the form of system call traces. Each process trace is recorded by different system calls that can be naturally deemed as high dimensional data, as one operating system may have a great deal of different system calls. Thus, it is natural without any doubt to say that dimension reduction technique has the opportunity to make a better performance improvement by exploiting classifier in the low dimensional subspace.
引用
收藏
页码:587 / 591
页数:5
相关论文
共 50 条
  • [41] The multi-demeanor fusion based robust intrusion detection system for anomaly and misuse detection in computer networks
    Gupta, Akshay Rameshbhai
    Agrawal, Jitendra
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2021, 12 (01) : 303 - 319
  • [42] A rough set theory based method for anomaly intrusion detection in computer network systems
    Cai, ZM
    Guan, XH
    Shao, P
    Peng, QK
    Sun, GJ
    EXPERT SYSTEMS, 2003, 20 (05) : 251 - 259
  • [43] Anomaly-Based Intrusion Detection System for DDoS Attack with Deep Learning Techniques
    Agostinello, Davide
    Genovese, Angelo
    Piuri, Vincenzo
    PROCEEDINGS OF THE 20TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, SECRYPT 2023, 2023, : 267 - 275
  • [44] Anomaly detection schemes in network intrusion detection
    Corvera, S
    Grau, JB
    Andina, D
    Soft Computing with Industrial Applications, Vol 17, 2004, 17 : 309 - 313
  • [45] HMMs for anomaly intrusion detection
    Du, Y
    Wang, HQ
    Pang, YG
    COMPUTATIONAL AND INFORMATION SCIENCE, PROCEEDINGS, 2004, 3314 : 692 - 697
  • [46] Embedding Tree-Based Intrusion Detection System in Smart Thermostats for Enhanced IoT Security
    Javed, Abbas
    Awais, Muhammad Naeem
    Qureshi, Ayyaz-ul-Haq
    Jawad, Muhammad
    Arshad, Jehangir
    Larijani, Hadi
    SENSORS, 2024, 24 (22)
  • [47] A hybrid intrusion detection system design for computer network security
    Aydin, M. Ali
    Zaim, A. Halim
    Ceylan, K. Goekhan
    COMPUTERS & ELECTRICAL ENGINEERING, 2009, 35 (03) : 517 - 526
  • [48] Design of intrusion detection system oriented to computer network security
    Lou, Xiao
    PROCEEDINGS OF THE 2017 5TH INTERNATIONAL CONFERENCE ON MECHATRONICS, MATERIALS, CHEMISTRY AND COMPUTER ENGINEERING (ICMMCCE 2017), 2017, 141 : 258 - 262
  • [49] Optimization of Network Security in University Laboratories Based on Anomaly Intrusion Detection in Public Cloud Networks
    Wang, Man
    COMPUTERS & ELECTRICAL ENGINEERING, 2023, 111
  • [50] Anomaly intrusion detection by clustering transactional audit streams in a host computer
    Park, Nam Hun
    Oh, Sang Hyun
    Lee, Won Suk
    INFORMATION SCIENCES, 2010, 180 (12) : 2375 - 2389