2004
DOI: 10.1007/978-3-540-30143-1_12
|View full text |Cite
|
Sign up to set email alerts
|

Anomaly Detection Using Layered Networks Based on Eigen Co-occurrence Matrix

Abstract: Abstract. Anomaly detection is a promising approach to detecting intruders masquerading as valid users (called masqueraders). It creates a user profile and labels any behavior that deviates from the profile as anomalous. In anomaly detection, a challenging task is modeling a user's dynamic behavior based on sequential data collected from computer systems. In this paper, we propose a novel method, called Eigen co-occurrence matrix (ECM), that models sequences such as UNIX commands and extracts their principal f… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
31
0

Year Published

2007
2007
2020
2020

Publication Types

Select...
7
1
1

Relationship

1
8

Authors

Journals

citations
Cited by 53 publications
(31 citation statements)
references
References 11 publications
0
31
0
Order By: Relevance
“…The authors enhanced it and presented a sequence alignment method using a binary scoring and a signature updating scheme to cope with concept drift [5]. Oka et al [12] noticed that the dynamic behavior of a user appearing in a sequence can be captured by correlating not only connected events, but also events that are not adjacent to each other while appearing within a certain distance (nonconnected events). To that extent, they have developed the layered networks approach based on the Eigen Co-occurrence Matrix (ECM).…”
Section: Related Workmentioning
confidence: 99%
“…The authors enhanced it and presented a sequence alignment method using a binary scoring and a signature updating scheme to cope with concept drift [5]. Oka et al [12] noticed that the dynamic behavior of a user appearing in a sequence can be captured by correlating not only connected events, but also events that are not adjacent to each other while appearing within a certain distance (nonconnected events). To that extent, they have developed the layered networks approach based on the Eigen Co-occurrence Matrix (ECM).…”
Section: Related Workmentioning
confidence: 99%
“…The results are the average results of all users at block size 100 for compatibility with the application of naive Bayes. Semi−global alignment,2008 [27] n−gram STF−IDF, 2011 [25] One−class SVM, 2010 [17] ECM, 2004 [24] HMM, 2011 [29] Two−class NB , 2004 [7] One−class Bayesian, 2011 [19] PHMM, 2011 [29] Sequence alignment,2008 [27] Two−class NB w updating, 2004 [7] One−class OCLEP, 2006 [18] Hybrid Markov, 2001 [11] As seen in the figure, the performance of the methods MC and MOCS,2 (exact matching of 2-length command sequences) are quite close. The users' behavior of typing the same command pairs could distinguish them from masqueraders as the command-based approaches.…”
Section: Analysis Of the Proposed Sequence-based Approachesmentioning
confidence: 99%
“…Work on masquerade detection (and, more generally, on profiling user behavior for security purposes) has proliferated over the last decade, especially concerning the study of different detection strategies. Some of the proposals include the use of Bayes classifiers and Support Vector Machines [12][13][14][15][16]; information-theoretic approaches [17,18]; hidden Markov models [19]; or sequence-and text-mining [20][21][22][23] schemes, among others. Despite the diversity of principles behind these methods, the reported results show that they all perform similarly in terms of accuracy.…”
Section: Evaluation Frameworkmentioning
confidence: 99%