File Download
There are no files associated with this item.
Links for fulltext
(May Require Subscription)
- Publisher Website: 10.1016/0164-1212(95)00106-9
- Scopus: eid_2-s2.0-0030129318
- WOS: WOS:A1996UC08000009
- Find via
Supplementary
- Citations:
- Appears in Collections:
Article: A data reduction method for intrusion detection
Title | A data reduction method for intrusion detection |
---|---|
Authors | |
Issue Date | 1996 |
Publisher | Elsevier Inc. The Journal's web site is located at http://www.elsevier.com/locate/jss |
Citation | Journal Of Systems And Software, 1996, v. 33 n. 1, p. 101-108 How to Cite? |
Abstract | This paper describes a technique for improving efficiency of data analysis involved in intrusion detection. Intrusion detection aims to detect security violations from abnormal patterns of system usage. It is required that user activities be monitored by the system and that monitoring data be analyzed to recognize behavior patterns of users. Multivariate data analysis may be used to achieve intrusion detection. Nevertheless, system monitoring typically records everything that each user performs in the system; hence, a massive volume of monitoring data is created. To allow analysis of monitoring data to be performed efficiently, it is essential to develop techniques that, without losing important information, reduce the amount of data to be processed. This paper presents a data reduction method that makes multivariate data analysis involved in intrusion detection more efficient. Our data reduction technique extracts, from the original data set, discriminating components that best characterize user behavior. This way, the amount of data to be processed by the multivariate data analysis module will be reduced substantially. |
Persistent Identifier | http://hdl.handle.net/10722/152256 |
ISSN | 2023 Impact Factor: 3.7 2023 SCImago Journal Rankings: 1.160 |
ISI Accession Number ID | |
References |
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Lam, KY | en_US |
dc.contributor.author | Hui, L | en_US |
dc.contributor.author | Chung, SL | en_US |
dc.date.accessioned | 2012-06-26T06:36:47Z | - |
dc.date.available | 2012-06-26T06:36:47Z | - |
dc.date.issued | 1996 | en_US |
dc.identifier.citation | Journal Of Systems And Software, 1996, v. 33 n. 1, p. 101-108 | en_US |
dc.identifier.issn | 0164-1212 | en_US |
dc.identifier.uri | http://hdl.handle.net/10722/152256 | - |
dc.description.abstract | This paper describes a technique for improving efficiency of data analysis involved in intrusion detection. Intrusion detection aims to detect security violations from abnormal patterns of system usage. It is required that user activities be monitored by the system and that monitoring data be analyzed to recognize behavior patterns of users. Multivariate data analysis may be used to achieve intrusion detection. Nevertheless, system monitoring typically records everything that each user performs in the system; hence, a massive volume of monitoring data is created. To allow analysis of monitoring data to be performed efficiently, it is essential to develop techniques that, without losing important information, reduce the amount of data to be processed. This paper presents a data reduction method that makes multivariate data analysis involved in intrusion detection more efficient. Our data reduction technique extracts, from the original data set, discriminating components that best characterize user behavior. This way, the amount of data to be processed by the multivariate data analysis module will be reduced substantially. | en_US |
dc.language | eng | en_US |
dc.publisher | Elsevier Inc. The Journal's web site is located at http://www.elsevier.com/locate/jss | en_US |
dc.relation.ispartof | Journal of Systems and Software | en_US |
dc.title | A data reduction method for intrusion detection | en_US |
dc.type | Article | en_US |
dc.identifier.email | Hui, L:hui@cs.hku.hk | en_US |
dc.identifier.authority | Hui, L=rp00120 | en_US |
dc.description.nature | link_to_subscribed_fulltext | en_US |
dc.identifier.doi | 10.1016/0164-1212(95)00106-9 | en_US |
dc.identifier.scopus | eid_2-s2.0-0030129318 | en_US |
dc.relation.references | http://www.scopus.com/mlt/select.url?eid=2-s2.0-0030129318&selection=ref&src=s&origin=recordpage | en_US |
dc.identifier.volume | 33 | en_US |
dc.identifier.issue | 1 | en_US |
dc.identifier.spage | 101 | en_US |
dc.identifier.epage | 108 | en_US |
dc.identifier.isi | WOS:A1996UC08000009 | - |
dc.publisher.place | United States | en_US |
dc.identifier.scopusauthorid | Lam, KY=7403657062 | en_US |
dc.identifier.scopusauthorid | Hui, L=8905728300 | en_US |
dc.identifier.scopusauthorid | Chung, SL=7404292662 | en_US |
dc.identifier.issnl | 0164-1212 | - |