异常检测的研究现状及应用

K. Burbeck
{"title":"异常检测的研究现状及应用","authors":"K. Burbeck","doi":"10.1109/WETICE.2005.27","DOIUrl":null,"url":null,"abstract":"Anomaly detection in IP networks, detection of deviations from what is considered normal, is an important complement to misuse detection based on known attack descriptions. Anomaly detection is at present time often implemented to some extent in available intrusion detection products. Still much effort is spent on anomaly detection research and many problems remains to be explored. Performing anomaly detection in real-time places hard requirements on the algorithms used. First, to deal with the massive data volumes one needs to have efficient data structures and indexing mechanisms. Secondly, the dynamic nature of today's information networks makes the characterization of normal requests and services difficult. What is considered as normal during some time interval may be classified as abnormal in a new context, and vice versa. These factors make many proposed data mining techniques less suitable for real-time intrusion detection. ADWICE (anomaly detection with fast incremental clustering) uses incremental clustering and an integrated grid-based index to implement fast, scalable and adaptive anomaly detection.","PeriodicalId":128074,"journal":{"name":"14th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprise (WETICE'05)","volume":"158 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2005-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Current research and use of anomaly detection\",\"authors\":\"K. Burbeck\",\"doi\":\"10.1109/WETICE.2005.27\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Anomaly detection in IP networks, detection of deviations from what is considered normal, is an important complement to misuse detection based on known attack descriptions. Anomaly detection is at present time often implemented to some extent in available intrusion detection products. Still much effort is spent on anomaly detection research and many problems remains to be explored. Performing anomaly detection in real-time places hard requirements on the algorithms used. First, to deal with the massive data volumes one needs to have efficient data structures and indexing mechanisms. Secondly, the dynamic nature of today's information networks makes the characterization of normal requests and services difficult. What is considered as normal during some time interval may be classified as abnormal in a new context, and vice versa. These factors make many proposed data mining techniques less suitable for real-time intrusion detection. ADWICE (anomaly detection with fast incremental clustering) uses incremental clustering and an integrated grid-based index to implement fast, scalable and adaptive anomaly detection.\",\"PeriodicalId\":128074,\"journal\":{\"name\":\"14th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprise (WETICE'05)\",\"volume\":\"158 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2005-06-13\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"14th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprise (WETICE'05)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/WETICE.2005.27\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"14th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprise (WETICE'05)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/WETICE.2005.27","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2

摘要

IP网络中的异常检测,即对正常情况的偏离检测,是对基于已知攻击描述的误用检测的重要补充。目前,在现有的入侵检测产品中,通常都实现了不同程度的异常检测。目前在异常检测方面的研究仍投入了大量的精力,还有许多问题有待探讨。实时执行异常检测对所使用的算法提出了很高的要求。首先,处理海量数据需要高效的数据结构和索引机制。其次,当今信息网络的动态性使得对正常请求和服务的描述变得困难。在一段时间内被认为是正常的事情,在新的上下文中可能被归类为异常,反之亦然。这些因素使得许多数据挖掘技术不太适合实时入侵检测。ADWICE(异常检测与快速增量聚类)使用增量聚类和集成的基于网格的索引来实现快速、可扩展和自适应的异常检测。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Current research and use of anomaly detection
Anomaly detection in IP networks, detection of deviations from what is considered normal, is an important complement to misuse detection based on known attack descriptions. Anomaly detection is at present time often implemented to some extent in available intrusion detection products. Still much effort is spent on anomaly detection research and many problems remains to be explored. Performing anomaly detection in real-time places hard requirements on the algorithms used. First, to deal with the massive data volumes one needs to have efficient data structures and indexing mechanisms. Secondly, the dynamic nature of today's information networks makes the characterization of normal requests and services difficult. What is considered as normal during some time interval may be classified as abnormal in a new context, and vice versa. These factors make many proposed data mining techniques less suitable for real-time intrusion detection. ADWICE (anomaly detection with fast incremental clustering) uses incremental clustering and an integrated grid-based index to implement fast, scalable and adaptive anomaly detection.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信