首页> 外文会议>WIAR '2012; National Workshop on Information Assurance Research; Proceedings of >Combining Similarity and Dissimilarity: a Novel Approach for the Anomaly Intrusion Detection
【24h】

Combining Similarity and Dissimilarity: a Novel Approach for the Anomaly Intrusion Detection

机译:相似与不相似相结合:一种新的异常入侵检测方法

获取原文
获取原文并翻译 | 示例

摘要

In this paper, we study the anomaly detection problem with the goal of minimizing memory and time complexity. Prior works need to check the whole training database to detect anomalous objects, and hence they are not scalable for large training databases. In this paper, we propose two similarity (resp., dissimilarity) measures. We show that similarity and dissimilarity can be described by one linear equation. Based on this result, we take a novel approach to address the anomalybased intrusion detection. This approach converts all the profiles composing the training database into 2-dimensional geometric points such that these points lie on the the same line y = n-x. A simple comparison operation is sufficient to decide whether an object is normal or anomalous. Complexity analysis shows that our IDS outperforms the classical anomaly-based IDS in terms of memory and time complexity.
机译:本文以最小化内存和时间复杂度为目标,研究异常检测问题。先前的工作需要检查整个训练数据库以检测异常对象,因此它们不能用于大型训练数据库。在本文中,我们提出了两种相似性(分别,不相似性)措施。我们表明相似性和不相似性可以用一个线性方程来描述。基于此结果,我们采用一种新颖的方法来解决基于异常的入侵检测。这种方法将构成训练数据库的所有轮廓转换为二维几何点,以使这些点位于同一条线y = n-x上。一个简单的比较操作就足以确定一个对象是正常的还是异常的。复杂度分析表明,在内存和时间复杂度方面,我们的IDS优于传统的基于异常的IDS。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号