2019
DOI: 10.1155/2019/8368473
|View full text |Cite
|
Sign up to set email alerts
|

Application-Level Unsupervised Outlier-Based Intrusion Detection and Prevention

Abstract: As cyber threats are permanently jeopardizing individuals privacy and organizations’ security, there have been several efforts to empower software applications with built-in immunity. In this paper, we present our approach to immune applications through application-level, unsupervised, outlier-based intrusion detection and prevention. Our framework allows tracking application domain objects all along the processing lifecycle. It also leverages the application business context and learns from production data, w… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
4
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(4 citation statements)
references
References 24 publications
0
4
0
Order By: Relevance
“…(2) In the clustering block, the w-k-means algorithm [40] is adopted, which reduces the influence of noise attributes on the clustering performance by calculating and assigning a weight to each attribute. (3) In the outlier detection block, the outlier score of objects that are identified as candidate outliers for the first time is set to 1, and then enter to the next current data are labeled as true point outlier (10) else (11) if count in threshold then (12) all data between current data and the data corresponding to abDiff are labeled as candidate collective outliers (13) else if count outside threshold then (14) the data corresponding to abDiff is labeled as a candidate jump outlier (15) end if (16) end if (17) reset the temporary variables (18) end if (19) else (20) if count in threshold then (21) label the data corresponding to abDiff as a true jump outlier (22) reset the temporary variables (23) end if (24) end if (25) end if ALGORITHM 1: Outlier detection based on neighbor difference (ODND).…”
Section: Odc Algorithmmentioning
confidence: 99%
See 2 more Smart Citations
“…(2) In the clustering block, the w-k-means algorithm [40] is adopted, which reduces the influence of noise attributes on the clustering performance by calculating and assigning a weight to each attribute. (3) In the outlier detection block, the outlier score of objects that are identified as candidate outliers for the first time is set to 1, and then enter to the next current data are labeled as true point outlier (10) else (11) if count in threshold then (12) all data between current data and the data corresponding to abDiff are labeled as candidate collective outliers (13) else if count outside threshold then (14) the data corresponding to abDiff is labeled as a candidate jump outlier (15) end if (16) end if (17) reset the temporary variables (18) end if (19) else (20) if count in threshold then (21) label the data corresponding to abDiff as a true jump outlier (22) reset the temporary variables (23) end if (24) end if (25) end if ALGORITHM 1: Outlier detection based on neighbor difference (ODND).…”
Section: Odc Algorithmmentioning
confidence: 99%
“…In addition, to detect abnormal data, outlier detection can also be used to discover some abnormal events [16]. Because of the importance of data security in all walks of life, massive outlier detection approaches have been proposed and used in many applications, such as intrusion detection [17,18], health diagnosis [19], and social network detection [20,21]. However, most outlier detection approaches require the collected data to be scanned several times, but the characteristics of streaming sensor data do not allow the multiple scans of data since the time, cost, and computational complexity are very high [22], which leads to these approaches not being effectively used in WSNs.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Iraqi and Bakkali [14] developed a framework that can learn to detect outlier behavior in method invocations without supervision. The method invocation features required for the learning process are implemented as a feature extractor aspect, which demonstrates another use case for integrating attack awareness with AOP.…”
Section: B Aspect-oriented Programmingmentioning
confidence: 99%