Proceedings of the 33rd Annual ACM Symposium on Applied Computing 2018
DOI: 10.1145/3167132.3167180
|View full text |Cite
|
Sign up to set email alerts
|

An efficient hybrid SVDD/clustering approach for anomaly-based intrusion detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
8
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 13 publications
(8 citation statements)
references
References 13 publications
0
8
0
Order By: Relevance
“…These models are then used in testing whether an observation is normal or abnormal, assuming unforeseen anomalies do not follow the learned patterns. Kanaza et al [3] integrated supports vector data description and clustering algorithms, and Liu et al [4] integrated K-prototype clustering and k-NN classification algorithms to detect anomalous data points, assuming anomalies are rare or accidental events. When prior domain knowledge is available for linking causal or dependency relations among subjects, objects and operations, graph-based anomaly detection methods (such as Elicit [9], Log2Vec [16], Oprea et al [17]) could be powerful.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…These models are then used in testing whether an observation is normal or abnormal, assuming unforeseen anomalies do not follow the learned patterns. Kanaza et al [3] integrated supports vector data description and clustering algorithms, and Liu et al [4] integrated K-prototype clustering and k-NN classification algorithms to detect anomalous data points, assuming anomalies are rare or accidental events. When prior domain knowledge is available for linking causal or dependency relations among subjects, objects and operations, graph-based anomaly detection methods (such as Elicit [9], Log2Vec [16], Oprea et al [17]) could be powerful.…”
Section: Related Workmentioning
confidence: 99%
“…What is worse, emerging cyber threats are more difficult to be identified by signature-based detection methods, because more and more evasive techniques are available to adversaries. To identify the emerging cyber threats before they can cause greater damage, anomaly detection upon user behaviors has attracted focuses from largescale enterprises [3]- [9], as anomaly detection enables security analysts to find suspicious activities that could be aftermath of cyber threats (including cyberattacks and insider threats). Adversarial activities often manifest themselves in abnormal behavioral changes compared to past habitual patterns.…”
Section: Introductionmentioning
confidence: 99%
“…Most anomaly detection methods are zero-positive machine learning models that are trained by only normal (i.e., negative) data and then used in testing whether observation data is normal or abnormal, assuming unforeseen anomalies do not follow the learned normal patterns. For example, Kenaza et al [27] integrated supports vector data description and clustering algorithms, and Liuq et al [33] integrated Kprototype clustering and k-NN classification algorithms to detect anomalous data points, assuming anomalies are rare or accidental events. When prior domain knowledge is available for linking causal or dependency relations among subjects and objects and operations, graph-based anomaly detection methods (such as Elicit [35], Log2Vec [29], Oprea et al [38]) could be powerful.…”
Section: Related Workmentioning
confidence: 99%
“…One of the most challenging problems in the field of intrusion detection is anomaly detection for discrete event logs. Researchers have been trying to resolve this challenge for two decades, and most work have focused on applying unsupervised learning upon engineered features from normal data, assuming unforeseen anomalies do not follow the learned normal patterns (e.g., [27], [33], [25], [35], [29], [38], [3], [36], [31], [32]). Recently, solving this challenge with deep learning has gained a substantial amount of traction in the security community (e.g., [15], [6], [17], [16], [47]), partially due to the unique advantages of deep learning in natural language processing.…”
Section: Introductionmentioning
confidence: 99%
“…In [15], a terrain classification method for ensuring navigation safety of mobile service robots based on SVDD is proposed. To enhance the performance of SVDD, numerous extensions and hybridization techniques have been proposed [8], [16], [17], [18], [19] [20]. The main extensions of SVDD can be categorized into four main categories.…”
Section: Introductionmentioning
confidence: 99%