최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기韓國컴퓨터情報學會論文誌 = Journal of the Korea Society of Computer and Information, v.28 no.11, 2023년, pp.89 - 101
Juyeon Lee (Dept. of Computer Education, Korea National University of Education) , Daeseon Choi (Dept. of Software, Soongsil University) , Seung-Hyun Kim (Dept. of Computer Education, Korea National University of Education)
In order to prevent damages caused by cyber-attacks on nations, businesses, and other entities, anomaly detection techniques for early detection of attackers have been consistently researched. Real-time reduction and false positive reduction are essential to promptly prevent external or internal int...
Ministry of SMEs and Startups, "2022 Survey on the State of?Technology Protection in Small and Medium-sized Enterprises, ",?June 2022.
Min Seonhee, "Virtual Currency Exchange 'GDAC' Hit by Hacking,?23% of Custodial Assets Stolen," Yonhap News, April, 2023.
Sonicwall, 2023 Sonicwall Cyber Threat Report.
F. Hachmi, K. Boujenfa and M. Limam, "Enhancing the Accuracy?of Intrusion Detection Systems by Reducing the Rates of False?Positives and False Negatives Through Multi-objective?Optimization," J Netw Syst Manage, 27(1), pp. 93-120, Jan, 2019.?DOI:10.1007/s10922-018-9459-y.
S. Im, S. Kim, S. Shim, S. Koo, B. Cho, K. Kim and T. Kim,?"A Featurization Method to Improve Anomaly Detection?Performance Using Login Logs," The Journal of Korean Institute?of Communications and Information Sciences, 47(1), pp. 58-65,?Jan, 2022. DOI:10.7840/kics.2022.47.1.58.
X. Guan, W. Wang and X. Zhang, "Fast intrusion detection based?on a non-negative matrix factorization model," Journal of Network?and Computer Applications, 32(1), pp. 31-44, 2009. DOI:10.1016/j.jnca.2008.04.006.
G. Tandon, "Machine learning for host-based anomaly detection,"?PhD Thesis. Florida Institute of Technology, 2008.
D. Yuxin, Y. Xuebing, Z. Di, D. Li and A. Zhanchao, "Feature representation and selection in malicious code detection methods?based on static system calls," Computers & security, 30(6),?pp. 514-524, Sep, 2011. DOI:10.1016/j.cose.2011.05.007.
M. Xie, J. Hu, X. Yu and E. Chang, "Evaluating Host-Based?Anomaly Detection Systems: Application of the Frequency-Based?Algorithms to ADFA-LD," Network and System Security, pp.?542-549, 2014. DOI:10.1007/978-3-319-11698-3_44.
J. Arshad, P. Townend and J. Xu, "A novel intrusion severity?analysis approach for Clouds," Future generation computer systems,?29(1), pp. 416-428, Jan, 2013. DOI:10.1016/j.future.2011.08.009.
W. Khreich, S. S. Murtaza, A. Hamou-Lhadj and C. Talhi,?"Combining heterogeneous anomaly detectors for improved?software security," The Journal of systems and software, 137,?pp. 415-429, Mar 2018. DOI:10.1016/j.jss.2017.02.050.
D. Yeung and Y. Ding, "Host-based intrusion detection using?dynamic and static behavioral models," Pattern Recognition,?36(1), pp. 229-243, 2003. DOI:10.1016/s0031-3203(02)00026-2.
D. Mutz, F. Valeur, G. Vigna and C. Kruegel, "Anomalous system?call detection," ACM transactions on information and system?security, 9(1), pp. 61-93, Feb 01, 2006. DOI:10.1145/1127345.1127348.
Y. LeCun, Y. Bengio and G. Hinton, "Deep learning," Nature?(London), 521(7553), pp. 436-444, May 28, 2015. DOI:10.1038/nature14539.
S. Lv, J. Wang, Y. Yang and J. Liu, "Intrusion Prediction With?System-Call Sequence-to-Sequence Model," IEEE Access, 6, pp.?71413-71421 2018. DOI:10.1109/ACCESS.2018.2881561.
C. Kim, M. Jang, S. Seo, K. Park and P. Kang, "Intrusion?Detection Based on Sequential Information Preserving Log?Embedding Methods and Anomaly Detection Algorithms," IEEE?Access, 9, pp. 58088-58101 2021. DOI:10.1109/ACCESS.2021.3071763.
Sang-Hyun. Oh and Won-Suk Lee, "Anomaly Detection based?on Clustering User's Behaviors," The transactions of the Korea?Information Processing Society, 7(8), pp. 2411-2420. 2000.
E. Aghaei, "Machine Learning for Host-based Misuse and?Anomaly Detection in UNIX Environment," PhD Thesis.?University of Toledo, 2017.
M. Meijerink, "Anomaly-based detection of lateral movement in?a microsoft windows environment," Master's thesis, University?of Twente, 2019.
E. Besharati, M. Naderan and E. Namjoo, "LR-HIDS: logistic?regression host-based intrusion detection system for cloud?environments," J Ambient Intell Human Comput, 10(9), pp.?3669-3692, Sep, 2019. DOI:10.1007/s12652-018-1093-8.
B. A. Powell, "Detecting malicious logins as graph anomalies,"?Journal of information security and applications, 54, pp. 102557,?Oct 2020. DOI:10.1016/j.jisa.2020.102557.
G. Creech and Jiankun Hu, "A Semantic Approach to Host-Based?Intrusion Detection Systems Using Contiguousand Discontiguous?System Call Patterns," IEEE Transactions on Computers, 63(4),?pp. 807-819, Apr, 2014. DOI:10.1109/TC.2013.13.
S. Yoo and K. Kim, "Comparison of Anomaly Detection Performance?Based on GRU Model Applying Various Data Preprocessing?Techniques and Data Oversampling," Journal of The Korea Institute?of Information Security & Cryptology, 32(2), April 2022.
M. Liu, Z. Xue, X. Xu, C. Zhong and J. Chen, "Host-Based?Intrusion Detection System with System Calls," ACM computing?surveys, 51(5), pp. 1-36, Jan, 2019. DOI:10.1145/3214304.
S. A. Hofmeyr, S. Forrest and A. Somayaji, "Intrusion detection?using sequences of system calls," Journal of computer security,?6(3), pp. 151-180, 1998. DOI:10.3233/JCS-980109.
R. P. Lippmann, D. J. Fried, I. Graf, J. W. Haines, K. R. Kendall,?D. McClung, D. Weber, S. E. Webster, D. Wyschogrod, R. K.?Cunningham and M. A. Zissman, " Evaluating intrusion detection?systems: the 1998 DARPA off-line intrusion detection?evaluation," In Proceedings DARPA Information Survivability?Conference and Exposition, 2, pp. 12-26. 2000. DOI:10.1109/DISCEX.2000.821506.
W. Haider, J. Hu, J. Slay, B. P. Turnbull and Y. Xie, "Generating?realistic intrusion detection system dataset based on fuzzy qualitative?modeling," Journal of Network and Computer Applications, 87,?pp. 185-192, Jun, 2017. DOI:10.1016/j.jnca.2017.03.018.
I. J. King and H. H. Huang, "Euler: Detecting Network Lateral?Movement via Scalable Temporal Graph Link Prediction,"?Proceedings 2022 Network and Distributed System Security?Symposium, 2022. DOI:https://doi.org/10.1145/3588771
E. Muhati and D. B. Rawat, "Hidden-Markov-Model-Enabled?Prediction and Visualization of Cyber Agility in IoT Era," JIoT,?9(12), pp. 9117-9127, Jun 15, 2022. DOI:10.1109/JIOT.2021.3056118
M. T. Wojnowicz, S. Aeron, E. L. Miller and M. Hughes, "Easy?Variational Inference for Categorical Models via an Independent?Binary Approximation," International Conference on Machine?Learning, pp. 23857-23896, 2022.
K. Sim and K. Kim, "Insider Anomaly Behavior Detection?Method Using an Unsupervised Learning-Based Autoencoder,"?Journal of Digital Contents Society, 24(8), pp. 1929-1936, Aug?31, 2023. DOI:10.9728/dcs.2023.24.8.1929
M. K. Dahouda and I. Joe, "A Deep-Learned Embedding?Technique for Categorical Features Encoding," IEEE Access, 9,?pp. 114381-114391 2021. DOI:10.1109/ACCESS.2021.3104357.
PassMark, https://www.cpubenchmark.net/compare/2830vs3752/I?ntel-Xeon-E5-2667-v4-vs-Intel-Xeon-Silver-4210R, Sept 2023.
Y. Zhao, Z. Nasrullah and Z. Li, "Pyod: A python toolbox for?scalable outlier detection," Journal of Machine Learning?Research, 20, pp. 1-7 2019.
F. Pedregosa, G. Varoquaux, A. Gramfort, V. Michel, B. Thirion,?O. Grisel, M. Blondel, P. Prettenhofer, R. Weiss and V. Dubourg,?"Scikit-learn: Machine learning in Python," the Journal of?machine Learning research, 12, pp. 2825-2830 2011.
D. Jiang, W. Lin and N. Raghavan, "A Novel Framework for?Semiconductor Manufacturing Final Test Yield Classification?Using Machine Learning Techniques," IEEE Access, 8, pp.?197885-197895 2020. DOI:10.1109/ACCESS.2020.3034680.
*원문 PDF 파일 및 링크정보가 존재하지 않을 경우 KISTI DDS 시스템에서 제공하는 원문복사서비스를 사용할 수 있습니다.
Free Access. 출판사/학술단체 등이 허락한 무료 공개 사이트를 통해 자유로운 이용이 가능한 논문
※ AI-Helper는 부적절한 답변을 할 수 있습니다.