A Secure Network Detection System against Noisy Unlabeled Data
نویسندگان
چکیده
Today, the Internet along with the corporate network plays a major role in creating and advancing new business avenues. With the ever increasing deployment and usage of gigabit networks, traditional network anomaly detection based intrusion detection systems have not scaled accordingly. Most, if not all, systems deployed assume the availability of complete and clean data for the purpose of intrusion detection. We contend that this assumption is not valid. Factors like noise in the audit data, mobility of the nodes, and the large amount of data generated by the network make it difficult to build a normal traffic profile of the network for the purpose of anomaly detection. From this perspective, the leitmotif of the research effort described in this dissertation is the design of a novel intrusion detection system that has the capability to detect intrusions with high accuracy even when complete audit data is not available. In this dissertation, we take a holistic approach to anomaly detection to address the
منابع مشابه
Avoiding Cyber-attacks to DMZ and Capturing Forensics from Intruders Using Honeypots
Nowadays, honeypots are widely used to divert attackers from the original target and keep them busy within a decoy environment. DeMilitarized Zone (DMZ) is an important zone for network administrators, because many of the services to the public network is provided at this zone. Many of the security tools such as firewalls, intrusion detection systems and several other secu...
متن کاملAvoiding Cyber-attacks to DMZ and Capturing Forensics from Intruders Using Honeypots
Nowadays, honeypots are widely used to divert attackers from the original target and keep them busy within a decoy environment. DeMilitarized Zone (DMZ) is an important zone for network administrators, because many of the services to the public network is provided at this zone. Many of the security tools such as firewalls, intrusion detection systems and several other secu...
متن کاملA Secure Routing Algorithm for Underwater Wireless Sensor Networks
Recently, underwater Wireless Sensor Networks (UWSNs) attracted the interest of many researchers and the past three decades have held the rapid progress of underwater acoustic communication. One of the major problems in UWSNs is how to transfer data from the mobile node to the base stations and choosing the optimized route for data transmission. Secure routing in UWSNs is necessary for packet d...
متن کاملAnomaly Detection In Labeled Data
Noisy points in training data maybe due to incorrect class labels or erroneous recording of attribute values. These points greatly influence the orientation of the classification boundary. In this paper, we formalize two notions of noisy points: intrusive outliers and hard-to-classify points. We adapt two well-known distance-based notions of outliers in unlabeled data to formalize intrusive out...
متن کاملDetection of Signals from Noisy Chaotic Interference
On the basis of nonlinear dynamical modeling we investigate a chaos-based detector, which allows the extraction of signal frequencies in noisy chaotic interference.The detection scheme is tested by using both computer-generated chaotic data and real-life Lorenz-Sten£o (LS) chaotic circuit data respectively. The performance analysis demonstrates that signals hidden beneath the chaotic ambient no...
متن کامل