Anomaly Upload Behavior Detection Based on Fuzzy Inference

被引:2
|
作者
Han, Ting [1 ]
Zhan, Xuna [1 ]
Tao, Jing [2 ]
Cao, Ken [1 ]
Xiong, Yuheng [1 ]
机构
[1] Xi An Jiao Tong Univ, Minist Educ, Key Lab Intelligent Networks & Network Secur, Xian, Peoples R China
[2] Xi An Jiao Tong Univ, Minist Educ, Key Lab Intelligent Networks & Network Secur, Shenzhen Res Inst, Xian, Peoples R China
基金
中国国家自然科学基金;
关键词
file upload; anomaly detection; fuzzy inference; membership function; SYSTEM;
D O I
10.1109/DASC-PICom-CBDCom-CyberSciTech52372.2021.00154
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Anomaly behavior detection is a key step in building a secure and reliable system when a user operates the server system. If a hacker uploads a file containing malicious code during an attack, it will pose a huge threat to the computer system and cannot be detected only by file extension. To solve this problem, this paper proposes a novel anomaly upload behavior detection method that establishes an upload behavior detection model by the fuzzy inference algorithm. In general, membership functions of the fuzzy inference algorithm are directly given by expert's experience. Furthermore, we investigate an improved method for determining membership function, which is obtained by statistical and curve fitting of historical data, to facilitate user's real behavior pattern recognition in the upload behavior detection model. This method does not require calibration of historical data and can be well adapted to different application scenarios. We evaluate the performance of our method via extensive simulations and real-world experiments, whose results demonstrate the feasibility and effectiveness of the proposed method.
引用
收藏
页码:923 / 929
页数:7
相关论文
共 50 条
  • [21] Behavior Anomaly Detection
    Gibson, Kristofor B.
    JOHNS HOPKINS APL TECHNICAL DIGEST, 2022, 36 (02): : 175 - 183
  • [22] Anomaly detection based on weighted fuzzy-rough density
    Yuan, Zhong
    Chen, Baiyang
    Liu, Jia
    Chen, Hongmei
    Peng, Dezhong
    Li, Peilin
    APPLIED SOFT COMPUTING, 2023, 134
  • [23] An Improved Anomaly Detection Method Based on Fuzzy Association Rules
    Yang, Zifen
    2010 INTERNATIONAL COLLOQUIUM ON COMPUTING, COMMUNICATION, CONTROL, AND MANAGEMENT (CCCM2010), VOL I, 2010, : 474 - 477
  • [24] Anomaly based Intrusion Detection using Modified Fuzzy Clustering
    Harish, B. S.
    Kumar, S. V. Aruna
    INTERNATIONAL JOURNAL OF INTERACTIVE MULTIMEDIA AND ARTIFICIAL INTELLIGENCE, 2017, 4 (06): : 54 - 59
  • [25] Fuzzy mega cluster based anomaly network intrusion detection
    Hubballi, Neminath
    Biswas, Santosh
    Nandi, Sukumar
    2009 INTERNATIONAL CONFERENCE ON NETWORK AND SERVICE SECURITY, 2009, : 82 - 86
  • [26] An Improved Anomaly Detection Method Based on Fuzzy Association Rules
    Yang, Zifen
    PROCEEDINGS OF THE 2011 INTERNATIONAL CONFERENCE ON INFORMATICS, CYBERNETICS, AND COMPUTER ENGINEERING (ICCE2011), VOL 1: INTELLIGENT CONTROL AND NETWORK COMMUNICATION, 2011, 110 (01): : 441 - 447
  • [27] Behavior Anomaly Detection
    Gibson, Kristofor B.
    Johns Hopkins APL Technical Digest (Applied Physics Laboratory), 2022, 36 (02): : 175 - 183
  • [28] Fuzzy Clustering Based Anomaly Detection for Updating Intrusion Detection Signature Files
    Padath, Anish Abraham
    Endicott-Popovsky, Barbara
    JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2011, 6 (06): : 462 - 468
  • [29] Weak Image Edge Detection Based on Improved Fuzzy Inference
    Song, Wenwei
    Gao, Xiaorong
    Li, Jinlong
    Luo, Lin
    Peng, Jianping
    9TH INTERNATIONAL SYMPOSIUM ON ADVANCED OPTICAL MANUFACTURING AND TESTING TECHNOLOGIES: OPTOELECTRONIC MATERIALS AND DEVICES FOR SENSING AND IMAGING, 2019, 10843
  • [30] Intrusion Detection Model Based on Hierarchical Fuzzy Inference System
    Zhou, Yu-Ping
    Fang, Jian-An
    Zhou, Yu-Ping
    ICIC 2009: SECOND INTERNATIONAL CONFERENCE ON INFORMATION AND COMPUTING SCIENCE, VOL 2, PROCEEDINGS: IMAGE ANALYSIS, INFORMATION AND SIGNAL PROCESSING, 2009, : 144 - +