2016
DOI: 10.1002/sec.1514
|View full text |Cite
|
Sign up to set email alerts
|

A refined filter for UHAD to improve anomaly detection

Abstract: Filtering is used in intrusion detection to remove the insignificant events from a log to facilitate the analysis method to focus on the significant events and to minimize processing overhead. Generally, filtering is performed using filtering rules, which are framed using a set of data (training data), or the known facts on anomalous events. This knowledge‐dependent nature confines the filterer to filter‐in only the recognized anomalies in the logs, making the rest unavailable for further scrutiny. This proble… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
2
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
5
2

Relationship

1
6

Authors

Journals

citations
Cited by 12 publications
(3 citation statements)
references
References 19 publications
0
2
0
Order By: Relevance
“…The precision created by 65.14% accuracy was provided by ID3, 72.32% by CART, 75.00% by LAD Tree, and 80.35% accuracy was generated by NB classifier. Several machine learning techniques such as Naive Bayes, K-Nearest Neighbors, Random Forests, Support Vector Machines, and Decision Trees have been studied in the paper published by Vijayalakshmi et al It was improved than other models using the dataset at hand (Asif Iqbal Hajamydeen, 2016). R is a computer language used for data mining applications.…”
Section: Literature Reviewmentioning
confidence: 99%
“…The precision created by 65.14% accuracy was provided by ID3, 72.32% by CART, 75.00% by LAD Tree, and 80.35% accuracy was generated by NB classifier. Several machine learning techniques such as Naive Bayes, K-Nearest Neighbors, Random Forests, Support Vector Machines, and Decision Trees have been studied in the paper published by Vijayalakshmi et al It was improved than other models using the dataset at hand (Asif Iqbal Hajamydeen, 2016). R is a computer language used for data mining applications.…”
Section: Literature Reviewmentioning
confidence: 99%
“…The limitation of the filtering component deployed in UHAD [10] is further improved with the refined filterer [52] by increasing the volume of retained abnormal events; hence, the other components of the framework [52] in are basically the same as UHAD [10]. The aim of the refined filterer is to retain all the abnormal events in the log for subsequent processing, irrespective of the existence of such events in larger number in the logs and the inaccuracies in clustering.…”
Section: Analyse Features To Identify Anomalous Eventsmentioning
confidence: 99%
“…Moreover, a portion of the results on the other three subsets, i.e., subset-2, subset-3, subset-4, were mentioned in Hajamydeen et.al. [52] for comparison purposes, but not detailed.…”
Section: Transferred Eventsmentioning
confidence: 99%