{"title":"基于统计的入侵检测异常检测技术分类学","authors":"A. Qayyum, M.H. Islam, M. Jamil","doi":"10.1109/ICET.2005.1558893","DOIUrl":null,"url":null,"abstract":"Security threats to the computer systems have raised the importance of intrusion detection systems. With the advent of new vulnerabilities to computer systems new techniques for intrusion detection have been implemented. Statistical based anomaly detection techniques use statistical properties and statistical tests to determine whether \"observed behavior\" deviate significantly from the \"expected behavior\". Statistical based anomaly detection has been a wide area of interest for researchers since it provides the base line for developing a promising technique. This paper presents a guideline for statistical based anomaly detection techniques with the perspective of various scenarios and areas of implementation. Inde.x TermsAnomaly detection, Intrusion detection, Security threats, Statistical analysis technique, Statistical models.","PeriodicalId":222828,"journal":{"name":"Proceedings of the IEEE Symposium on Emerging Technologies, 2005.","volume":"52 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2005-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"52","resultStr":"{\"title\":\"Taxonomy of statistical based anomaly detection techniques for intrusion detection\",\"authors\":\"A. Qayyum, M.H. Islam, M. Jamil\",\"doi\":\"10.1109/ICET.2005.1558893\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Security threats to the computer systems have raised the importance of intrusion detection systems. With the advent of new vulnerabilities to computer systems new techniques for intrusion detection have been implemented. Statistical based anomaly detection techniques use statistical properties and statistical tests to determine whether \\\"observed behavior\\\" deviate significantly from the \\\"expected behavior\\\". Statistical based anomaly detection has been a wide area of interest for researchers since it provides the base line for developing a promising technique. This paper presents a guideline for statistical based anomaly detection techniques with the perspective of various scenarios and areas of implementation. Inde.x TermsAnomaly detection, Intrusion detection, Security threats, Statistical analysis technique, Statistical models.\",\"PeriodicalId\":222828,\"journal\":{\"name\":\"Proceedings of the IEEE Symposium on Emerging Technologies, 2005.\",\"volume\":\"52 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2005-12-19\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"52\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings of the IEEE Symposium on Emerging Technologies, 2005.\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICET.2005.1558893\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the IEEE Symposium on Emerging Technologies, 2005.","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICET.2005.1558893","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Taxonomy of statistical based anomaly detection techniques for intrusion detection
Security threats to the computer systems have raised the importance of intrusion detection systems. With the advent of new vulnerabilities to computer systems new techniques for intrusion detection have been implemented. Statistical based anomaly detection techniques use statistical properties and statistical tests to determine whether "observed behavior" deviate significantly from the "expected behavior". Statistical based anomaly detection has been a wide area of interest for researchers since it provides the base line for developing a promising technique. This paper presents a guideline for statistical based anomaly detection techniques with the perspective of various scenarios and areas of implementation. Inde.x TermsAnomaly detection, Intrusion detection, Security threats, Statistical analysis technique, Statistical models.