The search functionality is under construction.

Keyword Search Result

[Keyword] anomaly detection(43hit)

41-43hit(43hit)

  • Robust QoS Control System for Mobile Multimedia Communication in IP-Based Cellular Network: Multipath Control and Proactive Control

    Akihito OKURA  Takeshi IHARA  Akira MIURA  Masami YABUSAKI  

     
    PAPER

      Vol:
    E88-B No:7
      Page(s):
    2784-2793

    This paper proposes "Multipath Control and Proactive Control" to realize a robust QoS control system for mobile multimedia communication in an IP-based cellular network. In this network, all kinds of traffic will share the same backbone network. This requires a QoS system that differentiates services according to the required quality. Though DiffServ is thought to be a promising technique for achieving QoS, an effective path control scheme and a technique that is suitable enough for rapid traffic changes are not yet available. Our solution is multipath control using linear optimization combined with proactive control using traffic anomaly detection. Simulation results show that multipath control and proactive control improve system performance in terms of throughput and packet loss when rapid traffic change takes place.

  • Efficient Masquerade Detection Using SVM Based on Common Command Frequency in Sliding Windows

    Han-Sung KIM  Sung-Deok CHA  

     
    PAPER-Application Information Security

      Vol:
    E87-D No:11
      Page(s):
    2446-2452

    Masqueraders who impersonate other users pose serious threat to computer security. Unfortunately, firewalls or misuse-based intrusion detection systems are generally ineffective in detecting masqueraders. Anomaly detection techniques have been proposed as a complementary approach to overcome such limitations. However, they are not accurate enough in detection, and the rate of false alarm is too high for the technique to be applied in practice. For example, recent empirical studies on masquerade detection using UNIX commands found the accuracy to be below 70%. In this research, we performed a comparative study to investigate the effectiveness of SVM (Support Vector Machine) technique using the same data set and configuration reported in the previous experiments. In order to improve accuracy of masquerade detection, we used command frequencies in sliding windows as feature sets. In addition, we chose to ignore commands commonly used by all the users and introduce the concept of voting engine. Though still imperfect, we were able to improve the accuracy of masquerade detection to 80.1% and 94.8%, whereas previous studies reported accuracy of 69.3% and 62.8% in the same configurations. This study convincingly demonstrates that SVM is useful as an anomaly detection technique and that there are several advantages SVM offers as a tool to detect masqueraders.

  • A Clustering-Based Anomaly Intrusion Detector for a Host Computer

    Sang Hyun OH  Won Suk LEE  

     
    PAPER-Application Information Security

      Vol:
    E87-D No:8
      Page(s):
    2086-2094

    For detecting the anomalous behavior of a user effectively, most researches have concentrated on statistical techniques. However, since statistical techniques mainly analyze the average behavior of a user's activities, some anomalies can be detected inaccurately. In addition, it is difficult to model intermittent activities performed periodically. In order to model the normal behavior of a user closely, a set of various features can be employed. Given an activity of a user, the values of those features that are related to the activity represent the behavior of the activity. Furthermore, activities performed in a session of a user can be regarded as a semantically atomic transaction. Although it is possible to apply clustering technique to these values to extract the normal behavior of a user, most of conventional clustering algorithms do not consider any transactional boundary in a data set. In this paper, a transaction-based clustering algorithm for modeling the normal behavior of a user is proposed. Based on the activities of the past transactions, a set of clusters for each feature can be found to represent the normal behavior of a user as a concise profile. As a result, any anomalous behavior in an online transaction of the user can be effectively detected based on the profile of the user.

41-43hit(43hit)