Please use this identifier to cite or link to this item: https://hdl.handle.net/2440/66401
Full metadata record
DC FieldValueLanguage
dc.contributor.authorZhang, Z.-
dc.contributor.authorShen, H.-
dc.contributor.authorSang, Y.-
dc.date.issued2007-
dc.identifier.citationInternational Journal of Network Security, 2007; 4(3):292-305-
dc.identifier.issn1816-353X-
dc.identifier.issn1816-3548-
dc.identifier.urihttp://hdl.handle.net/2440/66401-
dc.description.abstractIt is generally agreed that two key points always attract special concerns during the modelling of anomaly-based intrusion detection. One is the techniques about discerning two classes with different features, another is the construction/ selection of the observed sample of normally occurring patterns for system normality characterization. In this paper, instead of focusing on the design of specific anomaly detection models, we restrict our attention to the analysis of the anomaly detector’s operating environments, which facilitates us to insight into anomaly detectors’ operational capabilities, including their detection coverage and blind spots, and thus to evaluate them in convincing manners. Taking the similarity with the induction problem as the starting point, we cast anomaly detection in a statistical framework, which gives a formal analysis of anomaly detector’s anticipated behavior from a high level. Some existing problems and possible solutions about the normality characterization for the observable subjects that from hosts and networks are addressed respectively. As case studies, several typical anomaly detectors are analyzed and compared from the prospective of their operating environments, especially those factors causing their special detection coverage or blind spots. Moreover, the evaluation of anomaly detectors are also roughly discussed based on some existing benchmarks. Careful analysis shows that the fundamental understanding of the operating environments (i.e., properties of observable subjects) is the elementary but essential stage in the process of establishing an effective anomaly detection model, which therefore worth insightful exploration, especially when we face the dilemma between anomaly detection performance and the computational cost.-
dc.description.statementofresponsibilityZonghua Zhang, Hong Shen, Yingpeng Sang-
dc.language.isoen-
dc.publisherFemto Technique-
dc.rights© by IJNS. IJNS journal is an open access journal-
dc.source.urihttp://ijns.jalaxy.com.tw/download_paper.jsp?PaperID=IJNS-2005-08-03-1&PaperName=ijns-v4-n3/ijns-2007-v4-n3-p292-305.pdf-
dc.subjectAnomaly detection-
dc.subjectcomputer security-
dc.subjectinformation security-
dc.subjectintrusion detection-
dc.subjectmisuse detection-
dc.titleAn observation-centric analysis on the modeling of anomaly-based intrusion detection-
dc.typeJournal article-
pubs.publication-statusPublished-
dc.identifier.orcidShen, H. [0000-0002-3663-6591] [0000-0003-0649-0648]-
Appears in Collections:Aurora harvest
Computer Science publications

Files in This Item:
There are no files associated with this item.


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.