Negative Selection and Knuth Morris Pratt Algorithm for Anomaly Detection

作者: Cesar Byron Guevara Maldonado , Matilde Santos Penas , Maria Victoria Lopez Lopez

DOI: 10.1109/TLA.2016.7459637

关键词: Hidden Markov modelArtificial intelligenceComputer scienceSet (abstract data type)Data miningIdentification (information)ENCODEKnuth–Morris–Pratt algorithmAnomaly detectionDetectorMachine learningSimple (abstract algebra)

摘要: In this paper an algorithm for detecting anomalous behavior on computer systems is proposed. The work based information from the of authorized users who have performed various tasks a system over two years. study uses dynamic data structure that can encode current activities and their behaviors. identification most least frequent tasks, historical database each user, provides simple way creating single profile behavior. With profile, we apply negative selection techniques to obtain reasonable computational size set detectors. We then Knuth-Morris-Pratt locating detectors anomalies as indicators fraudulent This procedure has been tested real results prove effectiveness proposal motivate further research improve existing detection system.

参考文章(16)
Levent Ertöz, Aleksandar Lazarevic, Vipin Kumar, Jaideep Srivastava, Aysel Ozgur, A Comparative Study of Anomaly Detection Schemes in Network Intrusion Detection. siam international conference on data mining. pp. 25- 36 ,(2003)
Peter J. Bentley, Jungwon Kim, An evaluation of negative selection in an artificial immune system for network intrusion detection genetic and evolutionary computation conference. pp. 1330- 1337 ,(2001)
D. Dasgupta, K. KrishnaKumar, D. Wong, M. Berry, Negative Selection Algorithm for Aircraft Fault Detection international conference on artificial immune systems. pp. 1- 13 ,(2004) , 10.1007/978-3-540-30220-9_1
Fabio A. González, Dipankar Dasgupta, Anomaly Detection Using Real-Valued Negative Selection Genetic Programming and Evolvable Machines. ,vol. 4, pp. 383- 403 ,(2003) , 10.1023/A:1026195112518
Ahmad Taher Azar, Sanaa El-Ola Hanafy, Aboul Ella Hassanien, Amira Sayed A. Aziz, Negative Selection Approach Application in Network Intrusion Detection Systems arXiv: Networking and Internet Architecture. ,(2014)
Monowar H. Bhuyan, D. K. Bhattacharyya, J. K. Kalita, Network Anomaly Detection: Methods, Systems and Tools IEEE Communications Surveys and Tutorials. ,vol. 16, pp. 303- 336 ,(2014) , 10.1109/SURV.2013.052213.00046
Animesh Patcha, Jung-Min Park, None, An overview of anomaly detection techniques: Existing solutions and latest technological trends Computer Networks. ,vol. 51, pp. 3448- 3470 ,(2007) , 10.1016/J.COMNET.2007.02.001
Amlan Kundu, Shamik Sural, A. K. Majumdar, Database intrusion detection using sequence alignment International Journal of Information Security. ,vol. 9, pp. 179- 191 ,(2010) , 10.1007/S10207-010-0102-5
L.J.G. Villalba, A.L.S. Orozco, J.M. Vidal, Malware Detection System by Payload Analysis of Network Traffic IEEE Latin America Transactions. ,vol. 13, pp. 850- 855 ,(2015) , 10.1109/TLA.2015.7069114