摘要
This paper is focused on the analysis of the anomaly-based intrusion detectors' operational capabilities and drawbacks, from the perspective of their operating environments, instead of the schemes per se. Based on the similarity with the induction problem, anomaly detection is cast in a statistical framework for describing their general anticipated behaviors. Several key problems and corresponding potential solutions about the normality characterization for the observable subjects from hosts and networks are addressed respectively, together with the case studies of several representative detection models. Anomaly detectors' evaluation are also discussed briefly based on some existing achievements. Careful analysis shows that the fundamental understanding of the operating environments is the essential stage in the process of establishing an effective anomaly detection model, which therefore worth insightful exploration, especially when we face the dilemma between the detection performance and the computational cost.1
| 原文 | English |
|---|---|
| 頁(從 - 到) | 178-191 |
| 頁數 | 14 |
| 期刊 | Lecture Notes in Computer Science |
| 卷 | 3439 |
| DOIs | |
| 出版狀態 | Published - 2005 |
| 對外發佈 | 是 |
| 事件 | First International Conference on Information Security, Practice and Experience, ISPEC 2005 - , Singapore 持續時間: 11 4月 2005 → 14 4月 2005 |
指紋
深入研究「A brief observation-centric analysis on anomaly-based intrusion detection」主題。共同形成了獨特的指紋。引用此
- APA
- Author
- BIBTEX
- Harvard
- Standard
- RIS
- Vancouver