Proceedings of the Symposium and Bootcamp on the Science of Security 2016
DOI: 10.1145/2898375.2898400
|View full text |Cite
|
Sign up to set email alerts
|

Intrusion detection in enterprise systems by combining and clustering diverse monitor data

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
17
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 32 publications
(17 citation statements)
references
References 17 publications
0
17
0
Order By: Relevance
“…Unsupervised learning methods are usually used with unlabeled logs. Bohara et al [63] proposed an unsupervised learning detection method in the enterprise environment. They conducted experiments on the VAST 2011 Mini Challenge 2 dataset and extracted features from the host and network logs.…”
Section: Log Feature Extraction-based Detectionmentioning
confidence: 99%
“…Unsupervised learning methods are usually used with unlabeled logs. Bohara et al [63] proposed an unsupervised learning detection method in the enterprise environment. They conducted experiments on the VAST 2011 Mini Challenge 2 dataset and extracted features from the host and network logs.…”
Section: Log Feature Extraction-based Detectionmentioning
confidence: 99%
“…Many researchers have tried to study machine learning used in a variety of algorithm-based intrusion detection. They may come in the form of unsupervised learning [15]- [17] clustering without target specification and supervised learning that is used for training to model in estimation before new data estimation. Semi-supervised learning [5], [13], [18]- [20] is another type involved in function estimation on labeled and unlabeled data, falling between unsupervised learning and supervised learning, and Ensemble Learning [21]- [23] which uses many classification models to vote on an estimation.…”
Section: Relate Studiesmentioning
confidence: 99%
“…Similar to LDA generalization that models specific processes when finishing without reusing, it is considered as a method suitable for modern IDS. Some studies might classify data by using distance function for clustering as well [15]- [17] that benefits detection of a newer intrusion when a large number are hidden in other intrusion datasets. It's because of using distance function without forming a model resulting in newer intrusion detection.…”
Section: Introductionmentioning
confidence: 99%
“…Therefore, correlation-based feature selection (CFS), deviation method, and feature value distributions are used to identify and remove any features that do not significantly contribute to clustering process. Pearson coefficient provides fairly accurate results with bounded feature value ranges when size of the dataset is large [8]. We use Pearson correlation coefficient R to measure the linear dependencies of strongly correlated features.…”
Section: Feature Reductionmentioning
confidence: 99%
“…A number of researchers have used machine learning (ML) algorithms to detect malicious traffic [7,21]. Their proposals use data mining [12], supervised ML [4], and unsupervised ML techniques [8,28] to build network intrusion detection systems (NIDS). Bekerman et al [7] used 942 features to identify malware by analysing network traffic.…”
Section: Comparison With Existing Approachesmentioning
confidence: 99%