دانلود رایگان مقاله لاتین آشکارساز ناهنجاری برای دامنه امنیتی از سایت الزویر


عنوان فارسی مقاله:

یادگیری ترکیبی آشکارسازهای ناهنجاری برای دامنه های امنیتی


عنوان انگلیسی مقاله:

Learning combination of anomaly detectors for security domain


سال انتشار : 2016



برای دانلود رایگان مقاله آشکارساز ناهنجاری برای دامنه امنیتی اینجا کلیک نمایید.





مقدمه انگلیسی مقاله:

1. Introduction

Increasing numbers of attacks against computing infrastructure and the critical importance of the infrastructure for enterprises drives the need to deploy progressively more sophisticated defense solutions to protect network assets. An essential component of the defense are Intrusion Detection Systems (IDS) [1] searching for evidence of ongoing malicious activities (network attacks) in network traffic crossing the defense perimeter. Many intrusion detection systems are implemented as ensembles of relatively simple, yet heterogeneous detectors [2,3], where some of them can be specialized to particular types of intrusions, whereas others can be general anomaly detectors capable of detecting previously unseen attacks at the expense of higher false alarm rates. Such a setup has multiple advantages, including faster processing of the data stream, lower complexity of the detectors, and simpler inclusion of domain knowledge into the system. The main drawback is that combining outputs of individual detectors is a non-trivial problem. Although a vast prior art on the problem exists [4–6], we believe that peculiarities of the security domain, namely a highly imbalanced ratio of non-alarm and alarm samples in the data, lack of accurately labeled datasets, and the need of extremely low false positive rates, call for a tailored solution. The rationale behind the above specifics is that from the user perspective each raised alarm needs to be thoroughly investigated, which is expensive and can be done only for a small number of them. Hence reporting high numbers of false positives renders any intrusion detection system useless (recall that most of the samples are legitimate). Note that using a supervised method to learn the combination may bring the expense of lower generalization, but according to our experience completely unsupervised approaches rarely have false positive rate low enough to be usable in practice. Moreover, anomaly detectors and their features are usually selected based on the experience of the designer, which is a kind of proxy for labels and surely not guaranteed to be complete. Obtaining labeled data in security domains and in network intrusion detection especially can be difficult, time consuming, and expensive. Besides, labeled data frequently contains errors in labels of different sorts, for example some alerts might be missed and labeled as legitimate samples, or even worse, all samples of alerts of certain types might be missed and labeled as legitimate. The above concerns motivated the main goals and contributions of this paper, which are a method of finding a convex combination of outputs of a fixed set of anomaly detectors maximizing the number of true alarms in τ -fraction of most anomalous connections (samples)1 and an experimental study of the effect of different types of label noise in the training data on the accuracy of combinations obtained by different methods to better understand their advantages and drawbacks. Conducted experiments revealed that the proposed method is not only better than the state of the art, but also more robust with respect to various kinds of noise in labels we can expect in intrusion detection domains.



برای دانلود رایگان مقاله آشکارساز ناهنجاری برای دامنه امنیتی اینجا کلیک نمایید.






کلمات کلیدی:

Outlier Ensembles: An Introduction - Page 32 - Google Books Result https://books.google.com/books?isbn=3319547658 Charu C. Aggarwal, ‎Saket Sathe - 2017 - ‎Computers Anomaly Detection: A Survey, ACM Computing Surveys, 2009. N. Chawla ... Learning Combination of Anomaly Detectors for Security Domain. Computer ... [PDF]Outside the Closed World - The University of Texas at Dallas https://www.utdallas.edu/~muratk/courses/dmsec_files/oakland10-ml.pdf by R Sommer - ‎Cited by 482 - ‎Related articles Keywords-anomaly detection; machine learning; intrusion detection; network security. I. INTRODUCTION .... Spam detection is an example from the security domain of successfully ... combination as the primary reason for the lack of success. Learning Combination of Anomaly Detectors for Security Domain https://www.sparrho.com/...combination-of-anomaly-detectors-for-security-domain/8... Jun 1, 2016 - This paper presents a novel technique of finding a convex combination of outputs of anomaly detectors maximizing the accuracy in τ-quantile of ... [PDF]Anomaly Detection in the Surveillance Domain - DiVA https://www.diva-portal.org/smash/get/diva2:431243/FULLTEXT01.pdf by C Brax - ‎2011 - ‎Cited by 13 - ‎Related articles In the post September 11 era, the demand for security has increased in virtually all parts of the ... anomaly detection methods used in the surveillance domain. ..... of an anomaly detection method be improved by combining anomaly classi-. Innovative Approaches of Data Visualization and Visual Analytics https://books.google.com/books?isbn=1466643102 Huang, Mao Lin - 2013 - ‎Computers probability of not belonging to any component, anomaly, is proposed. ... In the civil security domain, anomaly detection is not as mature as it is the network ... method, based on a combination of SOMs and Gaussian Mixture Models (GMM).