Username   Password       Forgot your password?  Forgot your username? 

ISSUES BY YEAR

Volume 14 - 2018

No.1 January 2018
No.1 January 2018
No.3 March 2018
No.3 March 2018
No.4 April 2018
No.4 April 2018
No.5 May 2018
No.5 May 2018
No.6 June 2018
No.6 June 2018
No.7 July 2018
No.7 July 2018
No.8 August 2018
No.8 August 2018

Volume 13 - 2017

No.4 July 2017
No.4 July 2017
No.5 September 2017
No.5 September 2017
No.7 November 2017
No.7 November 2017
No.8 December 2017
No.8 December 2017

Volume 12 - 2016

Volume 11 - 2015

Volume 10 - 2014

Volume 9 - 2013

Volume 8 - 2012

Volume 7 - 2011

Volume 6 - 2010

Volume 5 - 2009

Volume 4 - 2008

Volume 3 - 2007

Volume 2 - 2006

 

Intrusion Anomaly Detection based on Sequence

Volume 14, Number 2, February 2018, pp. 300-309
DOI: 10.23940/ijpe.18.02.p11.300309

Gangyue Lei

Hunan College of Information, ChangSha, 410200, China


 


 

Abstract:

For single event sequences, a new anomaly detection method based on SV-LFSP (Short Variable-Length Frequent Sequence Pattern) is presented in this paper. Considering the structure character of procedure calling sequences generated by computer programs, the method defines SV-LFSP and contains three fundamental elements in the program flow, sequence, iteration and selection. To build the SV-LFSP library, the SV-LFSP generation algorithm is used. Essentially, this algorithm follows the idea of TEIRESIAS, with an additional redundancy controlling mechanism. Event flow chart, which has the capability of describing program behavior accurately, is a visual version of the SV-LFSP library. This new method is superior to previously provided frequent episode pattern matching algorithms for compact detection models, with high detection efficiency and low time delays.

 

References: 12

    1. Saihua Cai, “Research on Component Security Anomaly Detection Method Based on Monitoring Log Mining”, Jiangsu University, 2016
    2. Jing Du, Yuanyuan Chen, “Anomaly Detection Based on Hidden Markov Model (HMM)”, Journal of Taiyuan University of Science and Technology, vol.9, pp. 16-19, 2008.
    3. A. Hofmeyr, A. Somayaji, and S. Forrest, “Intrusion Detection System Using Sequences of System Calls”, Journal of Computer Security, vol.6, no.3, pp.151-180, 1998
    4. Yu Ji, “Study on the Key Problems in the Process of Sequential Pattern Discovery”, HeFei University of Technology, 2008
    5. Guoyuan Lin, “Research on Anomaly Detection Based on Host Behavior”, Nanjing University, 2011
    6. Hongli Li, “Research on Behavior Matching and Evaluation of Time Series”, The PLA Information Engineering University, 2014
    7. Shangzhe Shi, “Anomaly Detection Based on Hidden Markov Model”, Yangzhou University, 2012
    8. Ying Sun, “Research and Implementation of the Key Problems in the Process of Sequential Pattern Discovery”, HeFei University of Technology, 2005
    9. Kai Xiong, “Research on Frequent Sequence and Closed Sequence Mining Method Based on Minimum Position”, Northeastern University, 2012
    10. Jifeng Yu, “Anomaly Detection Research of Web Application Based on Data Mining”, Huazhong University of Science and Technology, 2011
    11. Yang Yang, “Research on Intrusion Detection Technology Based on Linux Process Behavior”, University of Electronic Science and technology of China, 2014
    12. Jing Zhao, “Research and Application of Network Protocol Anomaly Detection Model”, Beijing Jiaotong University, 2010

       

      Please note : You will need Adobe Acrobat viewer to view the full articles.Get Free Adobe Reader

      Attachments:
      Download this file (IJPE-2018-02-11.pdf)IJPE-2018-02-11.pdf[Intrusion Anomaly Detection based on Sequence]327 Kb
       

      CURRENT ISSUE

      Prev Next

      Program Disturb Research and Error Avoidance Algorithm Design of 3D-TLC NAND Flash Memory

      Xiaoshan Yang, Ligu Zhu, Qicong Zhang, Meng Zhang, Fei Wu, and Wei Zhang

      Read more

      Data Complexity Analysis for Software Defect Detection

      Ying Ma, Yichang Li, Junwen Lu, Peng Sun, Yu Sun, and Xiatian Zhu

      Read more

      Fuzzy AHP-based Comprehensive Evaluation for Smart Grid in Energy Internet Systems

      Ying Ma, Yichang Li, Shunzhi Zhu, Nan Qin, Guang Zhao, and Chao Huang

      Read more

      User Group-based Method for Cold-Start Recommendation

      Jing He, Shuo Yuan, Yi Xiang, and Wei Zhou

      Read more

      Object Tracking Method based on 3D Cartoon Animation in Broadcast Soccer Videos

      Chunlong Xie, Zhiqian Zhang, Chunsheng Wang, and Zhengqing Liu

      Read more

      Image Encryption Method based on Hill Matrix and Dynamic DNA Encoding

      Xuncai Zhang, Zheng Zhou, Yishan Liu, Guangzhao Cui, Ying Niu, and Yanfeng Wang

      Read more

      Video Indexing and Retrieval based on Key Frame Extraction

      Wenshi Wang, Zhangqin Huang, Weidong Wang, Shuo Zhang, and Rui Tian

      Read more

      Modeling Approach Combining Performance and Reliability for Mobile Cloud System

      Han Xu, Haiqing Wang, Liang Luo, Xiwei Qiu, Sa Meng, and Xun Guo

      Read more

      Understanding the Similarity of Log Revision Behaviors in Open Source Software

      Xu Niu, Shanshan Li, Zhouyang Jia, Shulin Zhou, Wang Li, and Xiangke Liao

      Read more

      Learning to Predict Price based on E-commerce Online Auction Machine

      Xiaohui Li, Hongbin Dong, Xiaowei Wang, and Shuang Han

      Read more

      Rate Control Algorithm for Multiview Video Coding based on Human Visual Characteristics

      Tao Yan, In-Ho Ra, Qiuwen Zhang, Hui Wen, Hang Xu, and Shuqing Chen

      Read more
      This site uses encryption for transmitting your passwords. ratmilwebsolutions.com