首页> 外文会议>Advances in knowledge discovery and management >Mining Common Outliers for Intrusion Detection
【24h】

Mining Common Outliers for Intrusion Detection

机译:挖掘常见异常值进行入侵检测

获取原文
获取原文并翻译 | 示例

摘要

Data mining for intrusion detection can be divided into several sub-topics, among which unsupervised clustering (which has controversial properties). Unsu-pervised clustering for intrusion detection aims to i) group behaviours together depending on their similarity and ii) detect groups containing only one (or very few) behaviour(s). Such isolated behaviours seem to deviate from the model of normality; therefore, they are considered as malicious. Obviously, not all atypical behaviours are attacks or intrusion attempts. This represents one drawback of intrusion detection methods based on clustering. We take into account the addition of a new feature to isolated behaviours before they are considered malicious. This feature is based on the possible repeated occurrences of the bahaviour on many information systems. Based on this feature, we propose a new outlier mining method which we validate through a set of experiments.
机译:用于入侵检测的数据挖掘可以分为几个子主题,其中包括无监督聚类(具有争议的属性)。未经监督的用于入侵检测的聚类旨在:i)根据行为的相似性将行为分组在一起; ii)检测仅包含一个(或很少)行为的组。这种孤立的行为似乎偏离了正常模型。因此,它们被认为是恶意的。显然,并非所有非典型行为都是攻击或入侵尝试。这代表了基于聚类的入侵检测方法的一个缺点。在考虑孤立行为之前,我们会考虑添加新功能。此功能基于许多信息系统上行为的可能重复出现。基于此功能,我们提出了一种新的离群挖掘方法,我们通过一组实验对其进行了验证。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号